Static Detection of Atomic-Set-Serializability Violations
| dc.contributor.author | Kidd, Nicholas | en_US |
| dc.contributor.author | Reps, Thomas | en_US |
| dc.contributor.author | Dolby, Julian | en_US |
| dc.contributor.author | Vaziri, Mandana | en_US |
| dc.date.accessioned | 2012-03-15T17:22:51Z | |
| dc.date.available | 2012-03-15T17:22:51Z | |
| dc.date.created | 2007 | en_US |
| dc.date.issued | 2007 | |
| dc.description.abstract | Vaziri et al. propose a data-centric approach to synchronization. The key underlying concept of their work is the atomic set, which specifies the existence of an invariant that holds on a set of fields of an object type. In addition, they formalize a set of eleven data-access scenarios that completely specify the set of non-serializable interleaving patterns that can lead to an atomic-set serializability violation of the expressed invariant. We present an algorithm that uses state-space exploration techniques to statically detect atomic-set serializability violations. The key idea is that the data-access scenarios can be used as a property specification for a software model checker. We tested our technique on programs with known serialiability violations from the concurrency-testing benchmark created by Eytani et al. Of the ten programs analyzed, our tool reported eight atomic-set serializability violations, with seven of them being true bugs. | en_US |
| dc.format.mimetype | application/pdf | en_US |
| dc.identifier.citation | TR1623 | en_US |
| dc.identifier.uri | http://digital.library.wisc.edu/1793/60610 | |
| dc.publisher | University of Wisconsin-Madison Department of Computer Sciences | en_US |
| dc.title | Static Detection of Atomic-Set-Serializability Violations | en_US |
| dc.type | Technical Report | en_US |
Files
Original bundle
1 - 1 of 1