Herding cats: Modelling, simulation, testing, and data mining for weak memory

J Alglave, L Maranget, M Tautschnig - ACM Transactions on …, 2014 - dl.acm.org
We propose an axiomatic generic framework for modelling weak memory. We show how to
instantiate this framework for Sequential Consistency (SC), Total Store Order (TSO), C++ …

Software verification for weak memory via program transformation

J Alglave, D Kroening, V Nimal… - European Symposium on …, 2013 - Springer
Multiprocessors implement weak memory models, but program verifiers often assume
Sequential Consistency (SC), and thus may miss bugs due to weak memory. We propose a …

Bounded model checking of multi-threaded C programs via lazy sequentialization

O Inverso, E Tomasco, B Fischer, S La Torre… - … 2014, Held as Part of the …, 2014 - Springer
Bounded model checking (BMC) has successfully been used for many practical program
verification problems, but concurrency still poses a challenge. Here we describe a new …

Stateless model checking for POWER

PA Abdulla, MF Atig, B Jonsson… - … Aided Verification: 28th …, 2016 - Springer
We present the first framework for efficient application of stateless model checking (SMC) to
programs running under the relaxed memory model of POWER. The framework combines …

Verification of programs under the release-acquire semantics

PA Abdulla, J Arora, MF Atig, S Krishna - Proceedings of the 40th ACM …, 2019 - dl.acm.org
We address the verification of concurrent programs running under the release-acquire (RA)
semantics. We show that the reachability problem is undecidable even in the case where the …

Ogre and Pythia: an invariance proof method for weak consistency models

J Alglave, P Cousot - Proceedings of the 44th ACM SIGPLAN …, 2017 - dl.acm.org
We design an invariance proof method for concurrent programs parameterised by a weak
consistency model. The calculational design of the invariance proof method is by abstract …

Unifying operational weak memory verification: an axiomatic approach

S Doherty, S Dalvandi, B Dongol… - ACM Transactions on …, 2022 - dl.acm.org
In this article, we propose an approach to program verification using an abstract
characterisation of weak memory models. Our approach is based on a hierarchical axiom …

[PDF][PDF] Robustness against transactional causal consistency

SM Beillahi, A Bouajjani… - Logical Methods in …, 2021 - lmcs.episciences.org
Distributed storage systems and databases are widely used by various types of applications.
Transactional access to these storage systems is an important abstraction allowing …

Counter-example guided fence insertion under TSO

PA Abdulla, MF Atig, YF Chen, C Leonardsson… - … 2012, Held as Part of the …, 2012 - Springer
We give a sound and complete fence insertion procedure for concurrent finite-state
programs running under the classical TSO memory model. This model allows “write to read” …

What's decidable about weak memory models?

MF Atig, A Bouajjani, S Burckhardt… - European Symposium on …, 2012 - Springer
We investigate the decidability of the state reachability problem in finite-state programs
running under weak memory models. In [3], we have shown that this problem is decidable …