Abstract. We address the problem of fence inference in infinite-state concur-rent programs running on relaxed memory models such as TSO and PSO. We present a novel algorithm that can automatically synthesize the necessary fences for infinite-state programs. Our technique is based on two main ideas: (i) verification with numerical do-mains: we reduce verification under relaxed models to verification under sequen-tial consistency using integer and boolean variables. This enables us to combine abstraction refinement over booleans with powerful numerical abstractions over the integers. (ii) synthesis with refinement propagation: to synthesize fences for a program P, we combine abstraction refinements used for successful synthesis of programs co...
peer reviewedThis paper addresses the problem of verifying and correcting programs when they are mo...
Modern architectures rely on memory fences to prevent undesired weakenings of memory consistency. As...
International audienceCache coherence protocols using self-invalidation and self-downgrade have rece...
Modern architectures implement relaxed memory models which may reorder memory operations or execute ...
Abstract—This paper addresses the problem of placing mem-ory fences in a concurrent program running ...
Modern architectures provide weaker memory consistency guarantees than sequential consistency. These...
The work covered in this thesis concerns automatic analysis of correctness of parallel programs runn...
Modern architectures provide weaker memory consistency guarantees than sequential consistency. These...
For efficiency reasons, most modern processor architectures allow the reordering of CPU instructions...
Abstract. Modern architectures provide weaker memory consistency guarantees than sequential consiste...
Abstract. We introduce MEMORAX, a tool for the verification of control state reachability (i.e., saf...
Abstract. We introduce MEMORAX, a tool for the verification of control state reachability (i.e., saf...
Abstract. We present a new abstract interpretation based approach for automat-ically verifying concu...
Abstract. This paper addresses the problem of verifying and correcting programs when they are moved ...
International audienceWe address the problem of verifying concurrent programs under store-buffer-bas...
peer reviewedThis paper addresses the problem of verifying and correcting programs when they are mo...
Modern architectures rely on memory fences to prevent undesired weakenings of memory consistency. As...
International audienceCache coherence protocols using self-invalidation and self-downgrade have rece...
Modern architectures implement relaxed memory models which may reorder memory operations or execute ...
Abstract—This paper addresses the problem of placing mem-ory fences in a concurrent program running ...
Modern architectures provide weaker memory consistency guarantees than sequential consistency. These...
The work covered in this thesis concerns automatic analysis of correctness of parallel programs runn...
Modern architectures provide weaker memory consistency guarantees than sequential consistency. These...
For efficiency reasons, most modern processor architectures allow the reordering of CPU instructions...
Abstract. Modern architectures provide weaker memory consistency guarantees than sequential consiste...
Abstract. We introduce MEMORAX, a tool for the verification of control state reachability (i.e., saf...
Abstract. We introduce MEMORAX, a tool for the verification of control state reachability (i.e., saf...
Abstract. We present a new abstract interpretation based approach for automat-ically verifying concu...
Abstract. This paper addresses the problem of verifying and correcting programs when they are moved ...
International audienceWe address the problem of verifying concurrent programs under store-buffer-bas...
peer reviewedThis paper addresses the problem of verifying and correcting programs when they are mo...
Modern architectures rely on memory fences to prevent undesired weakenings of memory consistency. As...
International audienceCache coherence protocols using self-invalidation and self-downgrade have rece...