Analyzing BlobFlow: A Case Study Using Model Checking to Verify Parallel Scientific Software

被引:0
|
作者
Siegel, Stephen F. [1 ]
Rossi, Louis F. [2 ]
机构
[1] Univ Delaware, Dept Comp & Informat Sci, Verified Software Lab, Newark, DE 19716 USA
[2] Univ Delaware, Dept Math Sci, Newark, DE 19716 USA
基金
美国国家科学基金会;
关键词
D O I
暂无
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Model checking techniques are powerful tools for the analysis and verification of concurrent systems. This paper reports on a case study applying model checking techniques to a mature, MPI-based scientific program consisting of approximately 10K lines of code. The program, BLOBFLOW, implements a high order vortex method for solving the two-dimensional Navier-Stokes equations. Despite the complexity of the code, we verify properties including freedom from deadlock and the functional equivalence of sequential and parallel versions of the program. This has led to new insights into the technology that will be required to automate the modeling and verification process for complex scientific software.
引用
收藏
页码:274 / +
页数:2
相关论文
共 50 条
  • [1] Combination of Model Checking and Theorem Proving to Verify Embedded Software
    XIAO Jian-yu
    2. Institute of Laser and Information
    The Journal of China Universities of Posts and Telecommunications, 2005, (04) : 80 - 84
  • [2] A case study in model checking software systems
    Wing, JM
    VaziriFarahani, M
    SCIENCE OF COMPUTER PROGRAMMING, 1997, 28 (2-3) : 273 - 299
  • [3] Parallel Assignments in Software Model Checking
    Stokely, Murray
    Chaki, Sagar
    Ouaknine, Joel
    ELECTRONIC NOTES IN THEORETICAL COMPUTER SCIENCE, 2006, 157 (01) : 77 - 94
  • [4] Combining symbolic execution with model checking to verify parallel numerical programs
    Siegel, Stephen F.
    Mironova, Anastasia
    Avrunin, George S.
    Clarke, Lori A.
    ACM TRANSACTIONS ON SOFTWARE ENGINEERING AND METHODOLOGY, 2008, 17 (02)
  • [5] Feasibility of model checking software requirements: A case study
    Sreemani, T
    Atlee, JM
    COMPASS '96 - PROCEEDINGS OF THE ELEVENTH ANNUAL CONFERENCE ON COMPUTER ASSURANCE: SYSTEMS INTEGRITY, SOFTWARE SAFETY, PROCESS SECURITY, 1996, : 77 - 88
  • [6] Model checking aircraft controller software: a case study
    Chen, Zhe
    Gu, Yi
    Huang, Zhiqiu
    Zheng, Jun
    Liu, Chang
    Liu, Ziyi
    SOFTWARE-PRACTICE & EXPERIENCE, 2015, 45 (07): : 989 - 1017
  • [7] Software model checking in practice: An industrial case study
    Chandra, S
    Godefroid, P
    Palm, C
    ICSE 2002: PROCEEDINGS OF THE 24TH INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING, 2002, : 431 - 441
  • [8] Using Bounded Model Checking to Verify Consensus Algorithms
    Tsuchiya, Tatsuhiro
    Schiper, Andre
    DISTRIBUTED COMPUTING, PROCEEDINGS, 2008, 5218 : 466 - +
  • [9] Formally Analyzing Software Vulnerability Based on Model Checking
    Wang Chunlei
    Huang Minhuan
    He Ronghui
    NSWCTC 2009: INTERNATIONAL CONFERENCE ON NETWORKS SECURITY, WIRELESS COMMUNICATIONS AND TRUSTED COMPUTING, VOL 1, PROCEEDINGS, 2009, : 615 - +
  • [10] Using a hardware model checker to verify software
    Edwards, SA
    Ma, T
    Damiano, R
    2001 4TH INTERNATIONAL CONFERENCE ON ASIC PROCEEDINGS, 2001, : 85 - 90