Time-bounded analysis of real-time systems

Sagar Chaki, Arie Gurfinkel, Ofer Strichman

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

Abstract

Real-Time Embedded Software (RTES) constitutes an important sub-class of concurrent safety-critical programs. We consider the problem of verifying functional correctness of periodic RTES, a popular variant of RTES that execute periodic tasks in an order determined by Rate Monotonic Scheduling (RMS). A computational model of a periodic RTES is a finite collection of terminating tasks that arrive periodically and must complete before their next arrival. We present an approach for time-bounded verification of safety properties in periodic RTES. Our approach is based on sequentialization. Given an RTES C and a time-bound W, we construct (and verify) a sequential program S that over-approximates all executions of C up to time W, while respecting priorities and bounds on the number of preemptions implied by RMS. Our algorithm supports partial-order reduction, preemption locks, and priority locks. We implemented our approach for C programs, with properties specified via user-provided assertions. We evaluated our tool on several realistic examples, and were able to detect a subtle concurrency issue in a robot controller.

Original languageEnglish
Title of host publication2011 Formal Methods in Computer-Aided Design, FMCAD 2011
Pages72-80
Number of pages9
StatePublished - 2011
Event2011 Formal Methods in Computer-Aided Design, FMCAD 2011 - Austin, TX, United States
Duration: 30 Oct 20112 Nov 2011

Publication series

Name2011 Formal Methods in Computer-Aided Design, FMCAD 2011

Conference

Conference2011 Formal Methods in Computer-Aided Design, FMCAD 2011
Country/TerritoryUnited States
CityAustin, TX
Period30/10/112/11/11

All Science Journal Classification (ASJC) codes

  • Computational Theory and Mathematics
  • Computer Graphics and Computer-Aided Design

Fingerprint

Dive into the research topics of 'Time-bounded analysis of real-time systems'. Together they form a unique fingerprint.

Cite this