期刊文献+
共找到3篇文章
< 1 >
每页显示 20 50 100
An operational happens-before memory model 被引量:1
1
作者 Yang ZHANG Xinyu FENG 《Frontiers of Computer Science》 SCIE EI CSCD 2016年第1期54-81,共28页
Happens-before memory model (HMM) is used as the basis of Java memory model (JMM). Although HMM itself is simple, some complex axioms have to be introduced in JMM to prevent the causality loop, which causes absurd... Happens-before memory model (HMM) is used as the basis of Java memory model (JMM). Although HMM itself is simple, some complex axioms have to be introduced in JMM to prevent the causality loop, which causes absurd out-of-thin-air reads that may break the type safety and se- curity guarantee of Java. The resulting JMM is complex and difficult to understand. It also has many anti-intuitive behav- iors, as demonstrated by the "ugly examples" by Aspinall and ~ev6~ [1]. Furthermore, HMM (and JMM) specifies only what execution traces are acceptable, but says nothing about how these traces are generated. This gap makes it difficult for static reasoning about programs. In this paper we present OHMM, an operational variation of HMM. The model is specified by giving an operational semantics to a language running on an abstract machine de- signed to simulate HMM. Thanks to its generative nature, the model naturally prevents out-of-thin-air reads. On the other hand, it uses a novel replay mechanism to allow instruc- tions to be executed multiple times, which can be used to model many useful speculations and optimization. The model is weaker than JMM for lockless programs, thus can accom- modate more optimization, such as the reordering of inde- pendent memory accesses that is not valid in JMM. Program behaviors are more natural in this model than in JMM, and many of the anti-intuitive examples in JMM are no longer valid here. We hope OHMM can serve as the basis for new memory models for Java-like languages. 展开更多
关键词 relaxed memory model happens-before opera-tonal semantics DRF-Guarantee JMM
原文传递
竞态漏洞检测方法综述 被引量:2
2
作者 赵世斌 周天阳 +1 位作者 朱俊虎 王清贤 《计算机工程与应用》 CSCD 北大核心 2018年第3期1-10,共10页
并行化程序运行环境中资源竞争导致的竞态漏洞是当今操作系统安全的重要威胁之一,攻击者常常间接利用竞态漏洞实施诸如远程命令执行、本地提权等攻击行为。分析了不同条件下竞态漏洞的产生机理及其相互关系,提出了竞态漏洞检测基本范式... 并行化程序运行环境中资源竞争导致的竞态漏洞是当今操作系统安全的重要威胁之一,攻击者常常间接利用竞态漏洞实施诸如远程命令执行、本地提权等攻击行为。分析了不同条件下竞态漏洞的产生机理及其相互关系,提出了竞态漏洞检测基本范式和通用框架,分别综述了用户态和内核态竞态漏洞检测方法的技术思想和发展脉络,讨论了制约检测效率的瓶颈问题以及可能的解决方法,结合最新技术应用指出了未来发展趋势和亟待解决的问题。 展开更多
关键词 竞态漏洞检测 happens-before lock-set 共享资源操作轨迹
下载PDF
Understanding and identifying latent data races cross-thread interleaving
3
作者 Long ZHEN~ Xiaofei LIAO Song WU Xuepeng FAN Hai JIN 《Frontiers of Computer Science》 SCIE EI CSCD 2015年第4期524-539,共16页
Data races are ubiquitous in multi-threaded ap- plications, but they are by no means easy to detect. One of the most important reasons is the complexity of thread in- terleavings. A volume of research has been devoted... Data races are ubiquitous in multi-threaded ap- plications, but they are by no means easy to detect. One of the most important reasons is the complexity of thread in- terleavings. A volume of research has been devoted to the interleaving-insensitive detection. However, all the previous work focuses on the uniform detection (unknown to the char- acteristics of thread interleavings), thereby making the detec- tion defective in either reporting false positives or suffering from prohibitive overhead. To cope with the problem above, we propose an efficient, precise, and sound step-by-step res- olution based on the characteristics of thread interleavings. We first try to tease apart the categories of thread interleav- ings from the several typical sources arising from the lock synchronizations. We then conduct a brief study and find a new and complex pattern the previous work cannot detect. It is also revealed that the simple pattern with the majority of thread interleavings can be resolved by a simple processing to achieve a big profit for the previous reordering-based design. Our final experimental results demonstrate the effectiveness of our empiricism-based approach, and show that 51.0% of execution time and 52.3 % of trace size arising from the state- of-the-art reordering technique can be saved through a quick filtering of the simple pattern with a negligible (4.45%) per- formance overhead introduced on-the-fly. 展开更多
关键词 data race happens-before thread interleaving
原文传递
上一页 1 下一页 到第
使用帮助 返回顶部