• Documents
  • Authors
  • Tables
  • Log in
  • Sign up
  • MetaCart
  • DMCA
  • Donate

CiteSeerX logo

Advanced Search Include Citations
Advanced Search Include Citations

A Methodology for Hardware Verification Based on Logic Simulation (1991)

by Randal E. Bryant
Venue:Journal of the ACM
Add To MetaCart

Tools

Sorted by:
Results 1 - 10 of 38
Next 10 →

Formal verification in hardware design: A survey

by Christoph Kern, et al. , 1997
"... In recent years, formal methods have emerged as an alternative approach to ensuring the quality and correctness of hardware designs, overcoming some of the limitations of traditional validation techniques such as simulation and testing. There are two main aspects to the application of formal methods ..."
Abstract - Cited by 113 (0 self) - Add to MetaCart
In recent years, formal methods have emerged as an alternative approach to ensuring the quality and correctness of hardware designs, overcoming some of the limitations of traditional validation techniques such as simulation and testing. There are two main aspects to the application of formal methods in a design process: The formal framework used to specify desired properties of a design, and the verification techniques and tools used to reason about the relationship between a specification and a corresponding implementation. We survey a variety of frameworks and techniques which have been proposed in the literature and applied to actual designs. The specification frameworks we describe include temporal logics, predicate logic, abstraction and refinement, as well as containment between!-regular languages. The verification techniques presented include model checking, automata-theoretic techniques, automated theorem proving, and approaches that integrate the above methods.

Formal Verification by Symbolic Evaluation of Partially-Ordered Trajectories

by Carl-johan H. Seger, Randal E. Bryant - Formal Methods in System Design , 1993
"... Symbolic trajectory evaluation provides a means to formally verify properties of a sequential system by a modified form of symbolic simulation. The desired system properties are expressed in a notation combining Boolean expressions and the temporal logic "next-time" operator. In its sim ..."
Abstract - Cited by 107 (24 self) - Add to MetaCart
Symbolic trajectory evaluation provides a means to formally verify properties of a sequential system by a modified form of symbolic simulation. The desired system properties are expressed in a notation combining Boolean expressions and the temporal logic "next-time" operator. In its simplest form, each property is expressed as an assertion [A =) C], where the antecedent A expresses some assumed conditions on the system state over a bounded time period, and the consequent C expresses conditions that should result. A generalization allows simple invariants to be established and proven automatically. The verifier operates on system models in which the state space is ordered by "information content". By suitable restrictions to the specification notation, we guarantee that for every trajectory formula, there is a unique weakest state trajectory that satisfies it. Therefore, we can verify an assertion [A =) C] by simulating the system over the weakest trajectory for A and testing...

An Industrially Effective Environment for Formal Hardware Verification

by C-J H Seger, R B Jones, J W O’Leary, T F Melham, M Aagaard, C Barrett, D Syme - IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems , 2005
"... ..."
Abstract - Cited by 46 (7 self) - Add to MetaCart
Abstract not found
(Show Context)

Citation Context

...E works on a very simple linear-time temporal logic, limited to implications between formulas built from only conjunction and the next-time operator. 3 In addition, STE is based on ternary simulation =-=[35]-=-, in which the Boolean data domain {0, 1} is extended with a third value “X” that stands for “either 0 or 1, but we do not know which.” As will be seen later, this gives STE very powerful automatic st...

Formal Hardware Verification with BDDs: An Introduction

by Alan J. Hu
"... This paper is a brief introduction to the main paradigms for using BDDs in formal hardware verification. The paper addresses two audiences: for people doing theoretical BDD research, the paper gives a glimpse of the problems in the main application area, and ..."
Abstract - Cited by 27 (0 self) - Add to MetaCart
This paper is a brief introduction to the main paradigms for using BDDs in formal hardware verification. The paper addresses two audiences: for people doing theoretical BDD research, the paper gives a glimpse of the problems in the main application area, and
(Show Context)

Citation Context

...ig to handle. Typically, circuits with up to a few hundred primary inputs can often be verified. For larger circuits, more sophisticated methods are needed. B. Symbolic Simulation Symbolic simulation =-=[4]-=- is a combination of the preceding ideas with conventional logic simulation. The advantage of a conventional logic simulator is accuracy. Detailed timing models, hazards, and oscillatory behavior can ...

Symbolic Trajectory Evaluation

by Scott Hazelhurst, Carl-johan H. Seger - Formal Hardware Verification , 1996
"... ion The main problem with model checking is the state explosion problem -- the state space grows exponentially with system size. Two methods have some popularity in attacking this problem: compositional methods and abstraction. While they cannot solve the problem in general, they do offer significa ..."
Abstract - Cited by 27 (6 self) - Add to MetaCart
ion The main problem with model checking is the state explosion problem -- the state space grows exponentially with system size. Two methods have some popularity in attacking this problem: compositional methods and abstraction. While they cannot solve the problem in general, they do offer significant improvements in performance. The direct method of verifying that a circuit has a property f is to show the model M satisfies f . The idea behind abstraction is that instead of verifying property f of model M , we verify property f A of model MA and the answer we get helps us answer the original problem. The system MA is an abstraction of the system M . One possibility is to build an abstraction MA that is equivalent (e.g. bisimilar [48]) to M . This sometimes leads to performance advantages if the state space of MA is smaller than M . This type of abstraction would more likely be used in model comparison (e.g. as in [38]). Typically, the behaviour of an abstraction is not equivalent...
(Show Context)

Citation Context

...model checking technique that grew out of multi-level simulation on the one hand, and symbolic simulation on the other hand. It is the formal verification method closest to traditional simulation. In =-=[14, 15]-=-, Bryant demonstrated the usefulness of ternary modelling for verifying a variety of circuits. The methodology is based on ternary simulation of VLSI circuits, where a third value U is added to the se...

Binary Decision Diagrams on Network of Workstations

by Rajeev Ranjan, Jagesh V. Sanghavi, Robert K. Brayton, Alberto Sangiovanni-vincentelli - Proc. of International Conference on Computer Design (ICCD'96 , 1996
"... The success of all binary decision diagram (BDD) based synthesis and verification algorithms depend on the ability to efficiently manipulate very large BDDs. We present algorithms for manipulation of very large Binary Decision Diagrams (BDDs) on a network of workstations (NOW). ANOW provides a colle ..."
Abstract - Cited by 26 (0 self) - Add to MetaCart
The success of all binary decision diagram (BDD) based synthesis and verification algorithms depend on the ability to efficiently manipulate very large BDDs. We present algorithms for manipulation of very large Binary Decision Diagrams (BDDs) on a network of workstations (NOW). ANOW provides a collection of main memories and disks which can be used effectively to create and manipulate very large BDDs. To make efficient use of memory resources of a NOW, while completing execution in a reasonable amount of wall clock time, extension of breadth-first technique is used to manipulate BDDs. BDDs are partitioned such that nodes for a set of consecutive variables are assigned to the same workstation. We present experimental results to demonstrate the capability of such an approach and point towards the potential impact for manipulating very large BDDs. 1 Introduction The manipulation of boolean functions is one of the most important operations in several areas of computer-aided design such a...
(Show Context)

Citation Context

...s of the BDD led to its widespread usage in the area of logic synthesis and testing. The application of BDD is further extended with its use in symbolic computation, which include symbolic simulation =-=[6]-=-, reachability analysis [8, 15], and BDD based formal design verification [4, 7, 11]. However the BDD representation suffers from the drawback that the size of a BDD required to represent a complex lo...

High Performance BDD Package Based on Exploiting Memory Hierarchy

by Rajeev Ranjan, Jagesh V. Sanghavi, Robert K. Brayton, Alberto Sangiovanni-vincentelli , 1996
"... The success of binary decision diagram (BDD) based algorithms for synthesis and/or verification depend on the availability of a high performance package to manipulate very large BDDs. State-ofthe -art BDD packages, based on the conventional depth-first technique, limit the size of the BDDs due to a ..."
Abstract - Cited by 20 (3 self) - Add to MetaCart
The success of binary decision diagram (BDD) based algorithms for synthesis and/or verification depend on the availability of a high performance package to manipulate very large BDDs. State-ofthe -art BDD packages, based on the conventional depth-first technique, limit the size of the BDDs due to a disorderly memory access patterns that results in unacceptably high elapsed time when the BDD size exceeds the main memory capacity. We present a high performance BDD package that enables manipulation of very large BDDs by using an iterative breadth-first technique directed towards localizing the memory accesses to exploit the memory system hierarchy. The new memory-oriented performance features of this package are 1) an architecture independent customized memory management scheme, 2) the ability to issue multiple independent BDD operations (superscalarity), and 3) the ability to perform multiple BDD operations even when the operands of some BDD operations are the result of some other operat...

FORMAL HARDWARE VERIFICATION BY SYMBOLIC TRAJECTORY EVALUATION

by Alok Jain , 1997
"... Formal verification uses a set of languages, tools, and techniques to mathematically reason about the correctness of a hardware system. The form of mathematical reasoning is dependent upon the hardware system. This thesis concentrates on hardware systems that have a simple deterministic high-level s ..."
Abstract - Cited by 18 (1 self) - Add to MetaCart
Formal verification uses a set of languages, tools, and techniques to mathematically reason about the correctness of a hardware system. The form of mathematical reasoning is dependent upon the hardware system. This thesis concentrates on hardware systems that have a simple deterministic high-level specification but have implementations that exhibit highly nondeterministic behaviors. A typical example of such hardware systems are processors. At the high level, the sequencing model inherent in processors is the sequential execution model. The underlying implementation, however, uses features such as nondeterministic interface protocols, instruction pipelines, and mul-tiple instruction issue which leads to nondeterministic behaviors. The goal is to develop a methodology with which a designer can show that a circuit fulfills the abstract specification of the desired system behavior. The abstract specification describes the high-level behavior of the system independent of any timing or implementation details. The natural specification of a processor is the instruction set architecture. The specification is defined as a set of abstract assertions defining the effect of each operation on the user-visible state. An implemen-tation mapping is used to relate abstract states to detailed circuit states. The mapping captures the micro-architecture of an implementation of the processor. Symbolic Trajectory Evaluation is used to verify that the circuit fulfills each individual abstract assertion under the implementation mapping. Symbolic Trajectory Evaluation can be considered to be a hybrid approach based on sym-bolic simulation and model checking algorithms. The methodology has been applied to the fixed point unit of a superscalar processor that imple-ments the PowerPC architecture. The processor represents a significant leap of complexity compared to previous attempts at formal verification of processors. Our approach seems to be the first one that can truly deal with the complexity of pipeline interlocks.

Parametric Circuit Representation Using Inductive Boolean Functions

by Aarti Gupta, Allan L. Fisher - In Computer Aided Verification, CAV '93, LNCS 697 , 1993
"... . We have developed a methodology based on symbolic manipulation of inductive Boolean functions (IBFs) for formal verification of inductively-defined hardware. This methodology combines the techniques of reasoning by induction and symbolic tautologychecking in an automated and potentially efficient ..."
Abstract - Cited by 17 (2 self) - Add to MetaCart
. We have developed a methodology based on symbolic manipulation of inductive Boolean functions (IBFs) for formal verification of inductively-defined hardware. This methodology combines the techniques of reasoning by induction and symbolic tautologychecking in an automated and potentially efficient way. In this paper, we describe a component of this methodology that regards various mechanisms used to represent inductivelydefined circuits in the form of IBFs. The focus is on general parameterization issues, such as multiple parameter functions, multiple output functions, interaction of different parameters for supporting compositions etc. These mechanisms, which may be useful in other applications involving parametric circuit descriptions, are illustrated through practical circuit examples along with preliminary results. We also describe an application of our formal verification methodology, where a proof by induction is performed by automatic symbolic manipulation of parametric circuit...
(Show Context)

Citation Context

...or implied, of the U.S. government. On the other hand, verification of non-parametric circuits has been successfully performed by various techniques based on symbolic manipulationof Boolean functions =-=[1, 4, 5, 6, 8, 10, 11, 18]-=-. The success of these techniques is largely due to the availability of automatic symbolic Boolean manipulation algorithms (using canonical Boolean function representations) that are efficient in prac...

High performance bdd package by exploiting memory hierarchy

by Jagesh V Sanghavi , Rajeev K Ranjan , Robert K Brayton , Alberto Sangiovanni-Vincentelli - In 33rd IEEE Design Automation Conference , 1996
"... Abstract The success of binary decision diagram (BDD) ..."
Abstract - Cited by 16 (0 self) - Add to MetaCart
Abstract The success of binary decision diagram (BDD)
Powered by: Apache Solr
  • About CiteSeerX
  • Submit and Index Documents
  • Privacy Policy
  • Help
  • Data
  • Source
  • Contact Us

Developed at and hosted by The College of Information Sciences and Technology

© 2007-2019 The Pennsylvania State University