In this paper, we emphasize the importance of efficient debugging in formal verification and present capabilities that we have developed in order to aid debugging in Intel's Formal Verification Environment. We hav...
详细信息
The BDD- and SAT-based model checking and verification methods normally require an initial state. Here we are concerned with sequential hardware verification, where an initial state must be one of the reset states. In...
详细信息
We propose a methodology to evaluate a rich set of BDD subsetting heuristics with respect to bug hunting and apply it to a set of real-life Intel designs. Our results illustrate that the evaluation metrics used to rat...
详细信息
The main focus of this paper is on using algorithms for design pattern matching to address the challenges of designs at RT and higher abstraction levels. The crux of our approach is modeling designs and patterns as gr...
详细信息
In this paper, we emphasize the importance of efficient debugging in formal verification and present capabilities that we have developed in order to augment debugging in Intel’s Formal Verification Environment. We ha...
详细信息
Our experience with semi-exhaustive verification shows a severe degradation in usability for the corner-case bugs, where the tuning effort becomes much higher and recovery from dead-ends is more and more difficult. Mo...
详细信息
The BDD- and SAT-based model checking and verification methods normally require an initial state. Here we are concerned with sequential hardware verification, where an initial state must be one of the reset states. In...
The BDD- and SAT-based model checking and verification methods normally require an initial state. Here we are concerned with sequential hardware verification, where an initial state must be one of the reset states. In practice, a reset state is not always given by the designer, and computing a reset state of a circuit is a hard problem. In this paper we propose a method allowing usage of SAT-based verification methods without a need for a user-given or a computed initial state. The idea is to employ a binary encoding of 3-valued modeling of circuits, and use the undefined state X as a reset state.
Sequential verification is a well known research framework that has attracted many researchers in the aca demic and industrial worlds during the last few decades. In this framework, initialization of synchronous model...
详细信息
Sequential verification is a well known research framework that has attracted many researchers in the aca demic and industrial worlds during the last few decades. In this framework, initialization of synchronous models is one of the fundamental and challenging research topics that is difficult to solve, especially when talking about large industrial strengths hardware models. Many researchers in this domain such as Pomeranz and Reddy (1994), Pixley and Beihl (1991), and Pixley, Jeong and Hachtel (1994), and others tried to analyze and propose solutions to this problem, however the majority of the approaches used were based on BDDs and classical reachability analysis methods, which by nature suffer from capacity and complexity limits. When talking about hardware formal equivalence verification, the Initialization issue becomes even more complex especially when trying to verify the logic equivalence of two large industrial circuits. In this note we propose a new adaptive and iterative approach that combines various symbolic simulation techniques and bounded model checking algorithms to initialize sequential circuits for the alignability equivalence verification. The novelty of our method has been employed on complex real life sequential models from Intel lead Pentium processor designs. These methods are already implemented in Intel's sequential verification engine, Insight.
In previous works, we introduced Stable Deterministic Residual Structures (SDRSs), Abstract Reduction Systems with an axiomatized residual relation which model orthogonal term and graph rewriting systems, and Determin...
详细信息
We propose a methodology to evaluate a rich set of BDD subsetting heuristics with respect to bug hunting and apply it to a set of real-life Intel designs. Our results illustrate that the evaluation metrics used to rat...
We propose a methodology to evaluate a rich set of BDD subsetting heuristics with respect to bug hunting and apply it to a set of real-life Intel designs. Our results illustrate that the evaluation metrics used to rate these heuristics in previous work were not tuned for bug-finding efficiency, which we believe is the major criterion that the heuristics need to meet.
暂无评论