Instruction-level Reverse Execution for Debugging

Show simple item record

dc.contributor.author Akgul, Tankut en_US
dc.contributor.author Mooney, Vincent John, III
dc.date.accessioned 2005-06-17T17:41:43Z
dc.date.available 2005-06-17T17:41:43Z
dc.date.issued 2002 en_US
dc.identifier.uri http://hdl.handle.net/1853/6552
dc.description.abstract Reverse execution provides a programmer with the ability to return a program to a previous state in its execution history. The ability to execute a program in reverse is advantageous for shortening software development time. Conventional techniques for reverse execution rely on saving a state into a record before the state is destroyed. State saving introduces both memory and time overheads during forward execution. Our proposed method introduces a reverse execution methodology at the assembly instruction level with low memory and time overheads. The methodology generates from a program a reverse program by which a destroyed state is almost always regenerated rather than being restored from a record. This significantly reduces state saving. The methodology has been implemented on a PowerPC processor with a custom made debugger. As compared to previous work using state saving techniques, the experimental results show 2.5X to 400X memory overhead reduction for the tested benchmarks. Furthermore, the results with the same benchmarks show an average of 4.1X to 5.7X reduction in execution time overhead. en_US
dc.format.extent 913397 bytes
dc.format.mimetype application/pdf
dc.language.iso en_US
dc.publisher Georgia Institute of Technology en_US
dc.relation.ispartofseries CC Technical Report; GIT-CC-02-49 en_US
dc.subject Debugging in computer science
dc.subject Reverse execution
dc.subject Software development
dc.title Instruction-level Reverse Execution for Debugging en_US
dc.type Technical Report eng_US


Files in this item

Files Size Format View
GIT-CC-02-49.pdf 891.9Kb PDF View/ Open

This item appears in the following Collection(s)

Show simple item record