DocumentCode :
2201253
Title :
The Permission Approach to Comprehend Lock-Based Synchronization Policy
Author :
Zhao, Yang ; Yu, Ligong ; Bei, Jia
Author_Institution :
Nanjing Univ. of Sci. & Technol., Nanjing, China
fYear :
2008
fDate :
20-22 Dec. 2008
Firstpage :
709
Lastpage :
713
Abstract :
Lock-based synchronization is widely used to avoid data races in multithreaded programs. However, it is usually painful to verify the safety and correctness of lock usage because there may be some unpredictable interferences among different threads in parallel. In order to assure the usage of mutual-exclusion locks, we propose to interpret the synchronization policy as permission representations. A permission is a value associated with some piece of state in a program and it is designed to permit certain operations. Permission includes a characteristic property: "nesting," such that one permission may be designed to be nested into the other, with which we are able to simulate lock protection annotations and hence detect whether high level annotations match with underlying program code.
Keywords :
multi-threading; program verification; reverse engineering; correctness verification; data race avoidance; lock-based synchronization policy comprehension; multithreaded programs; mutual-exclusion locks; permission approach; safety verification; Data engineering; Interference; Java; Multithreading; Performance analysis; Permission; Protection; Safety; Software performance; Yarn; Lock Usage; Permission; Synchronization Policy;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Advanced Computer Theory and Engineering, 2008. ICACTE '08. International Conference on
Conference_Location :
Phuket
Print_ISBN :
978-0-7695-3489-3
Type :
conf
DOI :
10.1109/ICACTE.2008.51
Filename :
4737049
Link To Document :
بازگشت