Lightweight Verification of a Multi-Task Threaded Server: A Case Study With The Plural Tool
In this case study, we used the Plural tool to verify the design of a commercial multi-task threaded application (MTTS) implemented by Novabase, which has been used for massively parallelising computational tasks. The effort undertaken in this case study has revealed several issues related with the design of the MTTS, with programming practices used in its implementation, and with domain specific properties of the MTTS. This case study has also provided insight on how the analysis done by the Plural tool can be improved. The Plural tool performs lightweight verification of Java programs. Plural specification language combines typestates and access permissions, backed by Linear Logic. The Plural specifications we wrote for the MTTS are based on its code, its informal documentation, sometimes embedded in the code, and our discussions with Novabase’s engineers, who validated our understanding of the MTTS application.
KeywordsConcurrency Formal Methods Parallelism The Plural Tool Verification
Unable to display preview. Download preview PDF.
- 1.Ahmed, I., Cataño, N.: Architecture of Novabase’ MTTS application. Technical report, The University of Madeira (2010), http://www3.uma.pt/ncatano/aeminium/Documents_files/mtts.pdf
- 3.Bierhoff, K., Aldrich, J.: Modular typestate checking of aliased objects. In: Proceedings of the 22nd Annual ACM SIGPLAN Conference on Object-Oriented Programming Systems and Applications, OOPSLA, pp. 301–320 (2007)Google Scholar
- 5.Bierhoff, N.B.K., Aldrich, J.: Verifying correct usage of atomic blocks and typestate. In: OOPSLA (2008)Google Scholar
- 6.Boyland, J.: Checking interference with fractional permissions. In: Proceedings of the 10th International Conference on Static Analysis, SAS, pp. 55–72 (2003)Google Scholar
- 7.Burdy, L., Cheon, Y., Cok, D., Ernst, M.D., Kiniry, J., Leavens, G.T., Rustan, K., Leino, M., Poll, E.: An overview of JML tools and applications (2003)Google Scholar
- 8.Cataño, N., Wahls, T.: Executing JML specifications of java card applications: A case study. In: 24th ACM Symposium on Applied Computing, Software Engineering Track (SAC-SE), Honolulu, Hawaii, March 8-12, pp. 404–408 (2009)Google Scholar
- 9.DeLine, R., Fähndrich, M.: Enforcing high-level protocols in low-level software. In: Proceedings of the ACM SIGPLAN 2001 Conference on Programming Language Design and Implementation, PLDI, pp. 59–69 (2001)Google Scholar
- 10.DeLine, R., Fähndrich, M.: The Fugue protocol checker: Is your software baroque (2003)Google Scholar
- 13.Novabase, http://www.novabase.pt
- 14.The Plural Tool, http://code.google.com/p/pluralism/
- 15.Roux, P., Siminiceanu, R.: Model checking with edge-valued decision diagrams. In: NASA Formal Methods Symposium (NFM), NASA/CP-2010-216215, pp. 222–226. Langley Research Center, NASA (April 2010)Google Scholar
- 16.Stork, S., Marques, P., Aldrich, J.: Concurrency by default: using permissions to express dataflow in stateful programs. In: Conference on Object-Oriented Programming Systems and Applications, OOPSLA, pp. 933–940 (2009)Google Scholar