Runtime safety analysis of multithreaded programs

Koushik Sen, Grigore Rosu, Gul Agha

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Abstract

Foundational and scalable techniques for runtime safety analysis of multithreaded programs are explored in this paper. A technique based on vector clocks to extract the causal dependency order on state updates from a running multithreaded program is presented, together with algorithms to analyze a multithreaded computation against safety properties expressed using temporal logics. A prototype tool implementing our techniques, is also presented, together with examples where it can predict safety errors in multithreaded programs from successful executions of those programs. This tool is called Java MultiPathExplorer (JMPaX), and available for download on the web. To the best of our knowledge, JMPaX is the first tool of its kind.

Original languageEnglish (US)
Title of host publicationProceedings of the 9th European Software Engineering Conference Held Jointly with 11th ACM SIGSOFT International Symposium on Foundations of Software Engineering, ESEC/FSE-11
Pages337-346
Number of pages10
DOIs
StatePublished - 2003
Event9th European Software Engineering Conference Held Jointly with 11th ACM SIGSOFT International Symposium on Foundations of Software Engineering, ESEC/FSE-11 - Helsinki, Finland
Duration: Sep 1 2003Sep 5 2003

Publication series

NameProceedings of the ACM SIGSOFT Symposium on the Foundations of Software Engineering

Other

Other9th European Software Engineering Conference Held Jointly with 11th ACM SIGSOFT International Symposium on Foundations of Software Engineering, ESEC/FSE-11
Country/TerritoryFinland
CityHelsinki
Period9/1/039/5/03

Keywords

  • JMPaX
  • Java
  • LTL
  • multithreaded program
  • predictive analysis
  • runtime monitoring
  • safety analysis
  • vector clock

ASJC Scopus subject areas

  • Software

Fingerprint

Dive into the research topics of 'Runtime safety analysis of multithreaded programs'. Together they form a unique fingerprint.

Cite this