Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Thomas E. Hart is active.

Publication


Featured researches published by Thomas E. Hart.


Journal of Parallel and Distributed Computing | 2007

Performance of memory reclamation for lockless synchronization

Thomas E. Hart; Paul E. McKenney; Angela Demke Brown; Jonathan Walpole

Achieving high performance for concurrent applications on modern multiprocessors remains challenging. Many programmers avoid locking to improve performance, while others replace locks with non-blocking synchronization to protect against deadlock, priority inversion, and convoying. In both cases, dynamic data structures that avoid locking require a memory reclamation scheme that reclaims elements once they are no longer in use. The performance of existing memory reclamation schemes has not been thoroughly evaluated. We conduct the first fair and comprehensive comparison of three recent schemes-quiescent-state-based reclamation, epoch-based reclamation, and hazard-pointer-based reclamation-using a flexible microbenchmark. Our results show that there is no globally optimal scheme. When evaluating lockless synchronization, programmers and algorithm designers should thus carefully consider the data structure, the workload, and the execution environment, each of which can dramatically affect the memory reclamation performance. We discuss the consequences of our results for programmers and algorithm designers. Finally, we describe the use of one scheme, quiescent-state-based reclamation, in the context of an OS kernel-an execution environment which is well suited to this scheme.


automated software engineering | 2007

A buffer overflow benchmark for software model checkers

Kelvin Ku; Thomas E. Hart; Marsha Chechik; David Lie

Software model checking based on abstraction-refinement has recently achieved widespread success in verifying API conformance in device drivers, and we believe this success can be replicated for the problem of buffer overflow detection. This paper presents a publicly-available benchmark suite to help guide and evaluate this research. The benchmark consists of 298 code fragments of varying complexity capturing 22 buffer overflow vulnerabilities in 12 open source applications. We give a preliminary evaluation of the benchmark using the SatAbs model checker


sensor, mesh and ad hoc communications and networks | 2004

Simplified simulation models for indoor MANET evaluation are not robust

A.L. Cavilla; Gerard S. Baron; Thomas E. Hart; Lionel Litty; E. de Lara

We evaluate the robustness of simplified mobility and radio propagation models for indoor MANET simulations. A robust simplification allows researchers to extrapolate simulation results and reach reliable conclusions about the expected performance of protocols in real life. We show that common simplified mobility and radio propagation models are not robust. Experiments with DSR and DSDV, two representative MANET routing protocols, show that the simplifications affect the two protocols in very different manners. Even for a single protocol, the effects on perceived performance can vary erratically as parameters change. These results cast doubt on the soundness of evaluations of MANET routing protocols based on simplified mobility and radio propagation models, and expose the urgent need for more research on realistic MANET simulation.


international parallel and distributed processing symposium | 2006

Making lockless synchronization fast: performance implications of memory reclamation

Thomas E. Hart; Paul E. McKenney; Angela Demke Brown

Achieving high performance for concurrent applications on modern multiprocessors remains challenging. Many programmers avoid locking to improve performance, while others replace locks with non-blocking synchronization to protect against deadlock, priority inversion, and convoying. In both cases, dynamic data structures that avoid locking, require a memory reclamation scheme that reclaims nodes once they are no longer in use. The performance of existing memory reclamation schemes has not been thoroughly evaluated. We conduct the first fair and comprehensive comparison of three recent schemes -quiescent-state-based reclamation, epoch-based reclamation, and hazard-pointer-based reclamation - using a flexible microbenchmark. Our results show that there is no globally optimal scheme. When evaluating lockless synchronization, programmers and algorithm designers should thus carefully consider the data structure, the workload, and the execution environment, each of which can dramatically affect memory reclamation performance


automated software engineering | 2008

PtYasm: Software Model Checking with Proof Templates

Thomas E. Hart; Kelvin Ku; Arie Gurfinkel; Marsha Chechik; David Lie

We describe PTYASM, an enhanced version of the YASM software model checker which uses proof templates. These templates associate correctness arguments with common programming idioms, thus enabling efficient verification. We have used PTYASM to verify the safety of array accesses in programs derived from the Verisec suite. PTYASM is able to verify this property in the majority of testcases, while existing software model checkers fail to do so due to loop unrolling.


automated software engineering | 2008

Augmenting Counterexample-Guided Abstraction Refinement with Proof Templates

Thomas E. Hart; Kelvin Ku; Arie Gurfinkel; Marsha Chechik; David Lie

Existing software model checkers based on predicate abstraction and refinement typically perform poorly at verifying the absence of buffer overflows, with analyses depending on the sizes of the arrays checked. We observe that many of these analyses can be made efficient by providing proof templates for common array traversal idioms idioms, which guide the model checker towards proofs that are independent of array size. We have integrated this technique into our software model checker, PtYasm, and have evaluated our approach on a set of testcases derived from the Verisec suite, demonstrating that our technique enables verification of the safety of array accesses independently of array size.


Ad Hoc & Sensor Wireless Networks | 2007

On the Robustness of Simple Indoor MANET Simulation Models.

H. Andrés Lagar-Cavilla; Gerard S. Baron; Thomas E. Hart; Lionel Litty; Eyal de Lara


usenix security symposium | 2008

Security benchmarking using partial verification

Thomas E. Hart; Marsha Chechik; David Lie


Archive | 2007

A Buffer Overflow Benchmark for Software Model Checkers (Short Paper)

Kelvin Ku; Thomas E. Hart; Marsha Chechik; David Lie


Archive | 2005

Practical Concerns for Scalable Synchronization

Paul E. McKenney; Thomas E. Hart; Jonathan Walpole

Collaboration


Dive into the Thomas E. Hart's collaboration.

Top Co-Authors

Avatar

David Lie

University of Toronto

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Kelvin Ku

University of Toronto

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Researchain Logo
Decentralizing Knowledge