• DocumentCode
    2201253
  • Title

    The Permission Approach to Comprehend Lock-Based Synchronization Policy

  • Author

    Zhao, Yang ; Yu, Ligong ; Bei, Jia

  • Author_Institution
    Nanjing Univ. of Sci. & Technol., Nanjing, China
  • fYear
    2008
  • fDate
    20-22 Dec. 2008
  • Firstpage
    709
  • Lastpage
    713
  • Abstract
    Lock-based synchronization is widely used to avoid data races in multithreaded programs. However, it is usually painful to verify the safety and correctness of lock usage because there may be some unpredictable interferences among different threads in parallel. In order to assure the usage of mutual-exclusion locks, we propose to interpret the synchronization policy as permission representations. A permission is a value associated with some piece of state in a program and it is designed to permit certain operations. Permission includes a characteristic property: "nesting," such that one permission may be designed to be nested into the other, with which we are able to simulate lock protection annotations and hence detect whether high level annotations match with underlying program code.
  • Keywords
    multi-threading; program verification; reverse engineering; correctness verification; data race avoidance; lock-based synchronization policy comprehension; multithreaded programs; mutual-exclusion locks; permission approach; safety verification; Data engineering; Interference; Java; Multithreading; Performance analysis; Permission; Protection; Safety; Software performance; Yarn; Lock Usage; Permission; Synchronization Policy;
  • fLanguage
    English
  • Publisher
    ieee
  • Conference_Titel
    Advanced Computer Theory and Engineering, 2008. ICACTE '08. International Conference on
  • Conference_Location
    Phuket
  • Print_ISBN
    978-0-7695-3489-3
  • Type

    conf

  • DOI
    10.1109/ICACTE.2008.51
  • Filename
    4737049