Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
10.1145/1929501.1929513acmconferencesArticle/Chapter ViewAbstractPublication PagespepmConference Proceedingsconference-collections
research-article

Verified resource guarantees using COSTA and KeY

Published: 24 January 2011 Publication History
  • Get Citation Alerts
  • Abstract

    Resource guarantees allow being certain that programs will run within the indicated amount of resources, which may refer to memory consumption, number of instructions executed, etc. This information can be very useful, especially in real-time and safety-critical applications. Nowadays, a number of automatic tools exist, often based on type systems or static analysis, which produce such resource guarantees. In spite of being based on theoretically sound techniques, the implemented tools may contain bugs which render the resource guarantees thus obtained not completely trustworthy. Performing full-blown verification of such tools is a daunting task, since they are large and complex. In this work we investigate an alternative approach whereby, instead of the tools, we formally verify the results of the tools. We have implemented this idea using COSTA, a state-of-the-art static analysis system, for producing resource guarantees and KeY, a state-of-the-art verification tool, for formally verifying the correctness of such resource guarantees. Our preliminary results show that the proposed tool cooperation can be used for automatically producing verified resource guarantees.

    References

    [1]
    E. Albert, P. Arenas, M. Codish, S. Genaim, G. Puebla, and D. Zanardini. Termination Analysis of Java Bytecode. In FMOODS'08, volume 5051 of LNCS, pages 2--18. Springer, 2008.
    [2]
    E. Albert, P. Arenas, S. Genaim, and G. Puebla. Closed-Form Upper Bounds in Static Cost Analysis. Journal of Automated Reasoning, 2010. To appear.
    [3]
    E. Albert, P. Arenas, S. Genaim, G. Puebla, and D. Zanardini. Cost Analysis of Java Bytecode. In ESOP'07, volume 4421 of LNCS, pages 157--172. Springer, 2007.
    [4]
    B. Beckert, R. Hähnle, and P. Schmitt, editors. Verification of a Object-Oriented Software: The KeY Approach, volume 4334 of LNCS. Springer, 2006.
    [5]
    K. Crary and S. Weirich. Resource Bound Certification. In POPL'05, pages 184--198. ACM Press, 2000.
    [6]
    G. Necula. Proof-Carrying Code. In POPL 1997. ACM Press, 1997.
    [7]
    A. Pnueli, M. Siegel, and E. Singerman. Translation Validation. In TACAS'98, volume 1384 of LNCS, pages 151--166. Springer, 1998.
    [8]
    A. Podelski and A. Rybalchenko. A Complete Method for the Synthesis of Linear Ranking Functions. In VMCAI'04, LNCS. Springer, 2004.

    Cited By

    View all
    • (2022)When COSTA Met KeY: Verified Cost BoundsThe Logic of Software. A Tasting Menu of Formal Methods10.1007/978-3-031-08166-8_2(19-37)Online publication date: 4-Jul-2022
    • (2019)Rateless Codes for Near-Perfect Load Balancing in Distributed Matrix-Vector MultiplicationProceedings of the ACM on Measurement and Analysis of Computing Systems10.1145/33667063:3(1-40)Online publication date: 17-Dec-2019
    • (2019)Mean Field Analysis of Join-Below-Threshold Load Balancing for Resource Sharing ServersProceedings of the ACM on Measurement and Analysis of Computing Systems10.1145/33667053:3(1-21)Online publication date: 17-Dec-2019
    • Show More Cited By

    Recommendations

    Comments

    Information & Contributors

    Information

    Published In

    cover image ACM Conferences
    PEPM '11: Proceedings of the 20th ACM SIGPLAN workshop on Partial evaluation and program manipulation
    January 2011
    72 pages
    ISBN:9781450304856
    DOI:10.1145/1929501
    Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

    Sponsors

    In-Cooperation

    Publisher

    Association for Computing Machinery

    New York, NY, United States

    Publication History

    Published: 24 January 2011

    Permissions

    Request permissions for this article.

    Check for updates

    Author Tags

    1. java
    2. resource guarantees
    3. static analysis

    Qualifiers

    • Research-article

    Conference

    POPL '11
    Sponsor:

    Acceptance Rates

    Overall Acceptance Rate 66 of 120 submissions, 55%

    Contributors

    Other Metrics

    Bibliometrics & Citations

    Bibliometrics

    Article Metrics

    • Downloads (Last 12 months)2
    • Downloads (Last 6 weeks)1
    Reflects downloads up to 29 Jul 2024

    Other Metrics

    Citations

    Cited By

    View all
    • (2022)When COSTA Met KeY: Verified Cost BoundsThe Logic of Software. A Tasting Menu of Formal Methods10.1007/978-3-031-08166-8_2(19-37)Online publication date: 4-Jul-2022
    • (2019)Rateless Codes for Near-Perfect Load Balancing in Distributed Matrix-Vector MultiplicationProceedings of the ACM on Measurement and Analysis of Computing Systems10.1145/33667063:3(1-40)Online publication date: 17-Dec-2019
    • (2019)Mean Field Analysis of Join-Below-Threshold Load Balancing for Resource Sharing ServersProceedings of the ACM on Measurement and Analysis of Computing Systems10.1145/33667053:3(1-21)Online publication date: 17-Dec-2019
    • (2019)Inferring Streaming Video Quality from Encrypted TrafficProceedings of the ACM on Measurement and Analysis of Computing Systems10.1145/33667043:3(1-25)Online publication date: 17-Dec-2019
    • (2017)Toward Understanding Work Characteristics in Software EngineeringACM SIGSOFT Software Engineering Notes10.1145/3011286.301130641:6(1-6)Online publication date: 5-Jan-2017
    • (2017)Exploring Underdetermined Specifications using Java PathFinderACM SIGSOFT Software Engineering Notes10.1145/3011286.301129541:6(1-5)Online publication date: 5-Jan-2017
    • (2017)Resource Contracts for JavaACM SIGSOFT Software Engineering Notes10.1145/3011286.301129441:6(1-5)Online publication date: 5-Jan-2017
    • (2017)Towards Exhaustive Testing of Websites using JPFACM SIGSOFT Software Engineering Notes10.1145/3011286.301129341:6(1-5)Online publication date: 5-Jan-2017
    • (2016)Analyzing Runtime and Size Complexity of Integer ProgramsACM Transactions on Programming Languages and Systems10.1145/286657538:4(1-50)Online publication date: 2-Aug-2016
    • (2016)Modular Verification of Termination and Execution Time Bounds Using Separation Logic2016 IEEE 17th International Conference on Information Reuse and Integration (IRI)10.1109/IRI.2016.22(110-117)Online publication date: Jul-2016
    • Show More Cited By

    View Options

    Get Access

    Login options

    View options

    PDF

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader

    Media

    Figures

    Other

    Tables

    Share

    Share

    Share this Publication link

    Share on social media