DocumentCode
2201253
Title
The Permission Approach to Comprehend Lock-Based Synchronization Policy
Author
Zhao, Yang ; Yu, Ligong ; Bei, Jia
Author_Institution
Nanjing Univ. of Sci. & Technol., Nanjing, China
fYear
2008
fDate
20-22 Dec. 2008
Firstpage
709
Lastpage
713
Abstract
Lock-based synchronization is widely used to avoid data races in multithreaded programs. However, it is usually painful to verify the safety and correctness of lock usage because there may be some unpredictable interferences among different threads in parallel. In order to assure the usage of mutual-exclusion locks, we propose to interpret the synchronization policy as permission representations. A permission is a value associated with some piece of state in a program and it is designed to permit certain operations. Permission includes a characteristic property: "nesting," such that one permission may be designed to be nested into the other, with which we are able to simulate lock protection annotations and hence detect whether high level annotations match with underlying program code.
Keywords
multi-threading; program verification; reverse engineering; correctness verification; data race avoidance; lock-based synchronization policy comprehension; multithreaded programs; mutual-exclusion locks; permission approach; safety verification; Data engineering; Interference; Java; Multithreading; Performance analysis; Permission; Protection; Safety; Software performance; Yarn; Lock Usage; Permission; Synchronization Policy;
fLanguage
English
Publisher
ieee
Conference_Titel
Advanced Computer Theory and Engineering, 2008. ICACTE '08. International Conference on
Conference_Location
Phuket
Print_ISBN
978-0-7695-3489-3
Type
conf
DOI
10.1109/ICACTE.2008.51
Filename
4737049
Link To Document