Constraint-based verification of parameterized cache coherence Protocols

被引:47
|
作者
Delzanno, G [1 ]
机构
[1] Univ Genoa, Dipartimento Informat & Sci Informaz, I-16146 Genoa, Italy
关键词
cache coherence protocols; abstractions; constraints; symbolic model checking;
D O I
10.1023/A:1026276129010
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
We propose a new method for the parameterized verification of formal specifications of cache coherence protocols. The goal of parameterized verification is to establish system properties for an arbitrary number of caches. In order to achieve this purpose we define abstractions that allow us to reduce the original parameterized verification problem to a control state reachability problem for a system with integer data variables. Specifically, the methodology we propose consists of the following steps. We first define an abstraction in which we only keep track of the number of caches in a given state during the execution of a protocol. Then, we use linear arithmetic constraints to symbolically represent infinite sets of global states of the resulting abstract protocol. For reasons of efficiency, we relax the constraint operations by interpreting constraints over real numbers. Finally, we check parameterized safety properties of abstract protocols using symbolic backward reachability, a strategy that allows us to obtain sufficient conditions for termination for an interesting class of protocols. The latter problem can be solved by using the infinite-state model checker HYTECH: Henzinger, Ho, and Wong-Toi, "A model checker for hybrid systems," Proc. of the 9th International Conference on Computer Aided Verification ( CAV' 97), Lecture Notes in Computer Science, Springer, Haifa, Israel, 1997, Vol. 1254, pp. 460 - 463. HYTECH handles linear arithmetic constraints using the polyhedra library of Halbwachs and Proy, " Verification of real-time systems using linear relation analysis," Formal Methods in System Design, Vol. 11, No. 2, pp. 157 - 185, 1997. By using this methodology, we have automatically validated parameterized versions of widely implemented write-invalidate and write-update cache coherence protocols like Synapse, MESI, MOESI, Berkeley, Illinois, Firefly and Dragon ( Handy, The Cache Memory Book, Academic Press, 1993). With this application, we have shown that symbolic model checking tools like HYTECH, originally designed for the verification of hybrid systems, can be applied successfully to new classes of infinite-state systems of practical interest.
引用
收藏
页码:257 / 301
页数:45
相关论文
共 50 条
  • [1] Constraint-Based Verification of Parameterized Cache Coherence Protocols
    Giorgio Delzanno
    [J]. Formal Methods in System Design, 2003, 23 : 257 - 301
  • [2] Efficient Verification of Parameterized Cache Coherence Protocols
    Qu, WanXia
    Guo, Yang
    Pang, ZhengBin
    Yang, XiaoDong
    [J]. PROCEEDINGS OF THE 9TH INTERNATIONAL CONFERENCE FOR YOUNG COMPUTER SCIENTISTS, VOLS 1-5, 2008, : 154 - 159
  • [3] A Novel Approach to Parameterized Verification of Cache Coherence Protocols
    Li, Yongjian
    Duan, Kaiqiang
    Lv, Yi
    Pang, Jun
    Cai, Shaowei
    [J]. PROCEEDINGS OF THE 34TH IEEE INTERNATIONAL CONFERENCE ON COMPUTER DESIGN (ICCD), 2016, : 560 - 567
  • [4] A simple method for parameterized verification of cache coherence Protocols
    Chou, CT
    Mannava, PK
    Park, S
    [J]. FORMAL METHODS IN COMPUTER-AIDED DESIGN, 2004, 3312 : 382 - 398
  • [5] A simple method for parameterized verification of cache coherence protocols
    Chou, CT
    Mannava, PK
    Park, S
    [J]. FORMAL METHODS IN COMPUTER-AIDED DESIGN, PROCEEDINGS, 2004, 3312 : 382 - 398
  • [6] Exact and efficient verification of parameterized cache coherence protocols
    Emerson, EA
    Kahlon, V
    [J]. CORRECT HARDWARE DESIGN AND VERIFICATION METHODS, PROCEEDINGS, 2003, 2860 : 247 - 262
  • [7] An improved constraint-based system for the verification of security protocols
    Corin, R
    Etalle, S
    [J]. STATIC ANALYSIS, PROCEEDINGS, 2002, 2477 : 326 - 341
  • [8] Verification techniques for cache coherence protocols
    Pong, F
    Dubois, M
    [J]. ACM COMPUTING SURVEYS, 1997, 29 (01) : 82 - 126
  • [9] Mechanized proofs for the Parameter Abstraction and Guard Strengthening Principle in Parameterized Verification of Cache Coherence Protocols
    Li, Yongjian
    [J]. APPLIED COMPUTING 2007, VOL 1 AND 2, 2007, : 1534 - 1535
  • [10] An Automatic Parameterized Verification of FLASH Cache Coherence Protocol
    Li, Yongjian
    Cao, Jialun
    Duan, Kaiqiang
    [J]. 2018 IEEE INTERNATIONAL CONFERENCE ON SOFTWARE QUALITY, RELIABILITY AND SECURITY (QRS 2018), 2018, : 47 - 58