To improve efficiency of memory accesses, modern multiprocessor architectures implement a whole range of different weak memory models. The behavior of performance-critical code depends on the underlying hardware. There is a rising demand for verification tools that take the underlying memory model into account. This work examines a variety of prevalent problems in the field of program verification of increasing complexities: testing, reachability, portability and memory model synthesis. We give efficient tools to solve these problems. What sets the presented methods apart is that they are not limited to some few given architectures. They are universal: The memory model is given as part of the input. We make use of the CAT language to succi...
To improve automated verification techniques for ANSI-C software, I examine temporal logics for desc...
We address the verification problem of finite-state concurrent pro-grams running under weak memory m...
Formal verification techniques allow rigorous reasoning about the operation of computer systems and ...
This paper reports progress in verification tool engineering for weak memory models. We present two ...
We present Dartagnan, a bounded model checker (BMC) for concurrent programs under weak memory models...
We present Dartagnan, a bounded model checker (BMC) for concurrent programs under weak memory models...
Software verification is considered to be a hard computational problem vulnerable to the state explo...
Concurrency libraries can facilitate the development of multi-threaded programs by providing concurr...
Abstract—To improve performance, multiprocessor systems implement weak memory consistency models — a...
Formal verification of multithreaded software running on multi-core hardware has for long been chall...
Part 3: VerificationInternational audienceMemory safety plays a crucial role in concurrent hardware/...
dedicated to the memory of Kohei Honda Abstract Multiprocessors implement weak memory models, but pr...
As a consequence of the increasing use of software in safety-critical systems and the considerable r...
In this thesis, we describe and evaluate approaches for the efficient reasoning of realworld C progr...
Multiprocessors implement weak memory models, but program verifiers often assume Sequential Consiste...
To improve automated verification techniques for ANSI-C software, I examine temporal logics for desc...
We address the verification problem of finite-state concurrent pro-grams running under weak memory m...
Formal verification techniques allow rigorous reasoning about the operation of computer systems and ...
This paper reports progress in verification tool engineering for weak memory models. We present two ...
We present Dartagnan, a bounded model checker (BMC) for concurrent programs under weak memory models...
We present Dartagnan, a bounded model checker (BMC) for concurrent programs under weak memory models...
Software verification is considered to be a hard computational problem vulnerable to the state explo...
Concurrency libraries can facilitate the development of multi-threaded programs by providing concurr...
Abstract—To improve performance, multiprocessor systems implement weak memory consistency models — a...
Formal verification of multithreaded software running on multi-core hardware has for long been chall...
Part 3: VerificationInternational audienceMemory safety plays a crucial role in concurrent hardware/...
dedicated to the memory of Kohei Honda Abstract Multiprocessors implement weak memory models, but pr...
As a consequence of the increasing use of software in safety-critical systems and the considerable r...
In this thesis, we describe and evaluate approaches for the efficient reasoning of realworld C progr...
Multiprocessors implement weak memory models, but program verifiers often assume Sequential Consiste...
To improve automated verification techniques for ANSI-C software, I examine temporal logics for desc...
We address the verification problem of finite-state concurrent pro-grams running under weak memory m...
Formal verification techniques allow rigorous reasoning about the operation of computer systems and ...