File Download

There are no files associated with this item.

  • Find it @ UNIST can give you direct access to the published full text of this article. (UNISTARs only)
Related Researcher

백웅기

Baek, Woongki
Intelligent System Software Lab.
Read More

Views & Downloads

Detailed Information

Cited time in webofscience Cited time in scopus
Metadata Downloads

Implementing and evaluating a model checker for transactional memory systems

Author(s)
Baek, WoongkiBronson, NathanKozyrakis, ChristosOlukotun, Kunle
Issued Date
2010-03-22
DOI
10.1109/ICECCS.2010.21
URI
https://scholarworks.unist.ac.kr/handle/201301/46833
Fulltext
http://www.scopus.com/record/display.url?eid=2-s2.0-79952032409&origin=resultslist&sort=plf-f&src=s&st1=10.1109%2fICECCS.2010.21&st2=&sid=5A34FC559EB2129B793FD551CD09FE5A.aXczxbyuHHiXgaIW6Ho7g%3a770&sot=b&sdt=b&sl=27&s=DOI%2810.1109%2fICECCS.2010.21%29&relpos=0&relpos=0&citeCnt=0&searchTerm=DOI%2810.1109%2FICECCS.2010.21%29
Citation
15th IEEE International Conference on Engineering of Complex Computer Systems, ICECCS 2010, pp.117 - 126
Abstract
Transactional Memory (TM) is a promising technique that addresses the difficulty of parallel programming. Since TM takes responsibility for all concurrency control, TM systems are highly vulnerable to subtle correctness errors. Due to the difficulty of fully proving the correctness of TM systems, many of them are used without any formal correctness guarantees. This paper presents ChkTM, a flexible model checking environment to verify the correctness of various TM systems. ChkTM aims to model TM systems close to the implementation level to reveal as many potential bugs as possible. For example, ChkTM accurately models the version control mechanism in timestamp-based software TMs (STMs). In addition, ChkTM can flexibly model TM systems that use additional hardware components or support nested parallelism. Using ChkTM, we model several TM systems including a widely-used industrial STM (TL2), a hybrid TM (SigTM) that uses hardware signatures, and an STM (NesTM) that supports nested parallel transactions. We then demonstrate how ChkTM can be used to find a previously unreported correctness bug in the current implementation of eager-versioning TL2. We also verify the serializability of TL2 and SigTM and strong isolation guarantees of SigTM. Finally, we quantitatively analyze ChkTM to understand the practical issues and motivate further research in model checking TM systems. © 2010 IEEE.
Publisher
15th IEEE International Conference on Engineering of Complex Computer Systems, ICECCS 2010

qrcode

Items in Repository are protected by copyright, with all rights reserved, unless otherwise indicated.