DiffLo: A Graph-based Method for Functional Discrepancy Localization in High-level Synthesis

被引:0
|
作者
Chen, Liangji [1 ]
Liang, Tingyuan [1 ]
Zhang, Wei [1 ]
Sinha, Sharad [2 ]
机构
[1] Hong Kong Univ Sci & Technol, Hong Kong, Peoples R China
[2] Indian Inst Technol Goa, Ponda, India
关键词
Fault Localization; High-level Synthesis; Debugging;
D O I
10.1109/ICFPT59805.2023.00055
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
High-level synthesis (HLS) is becoming increasingly popular in hardware design. However, since current HLS tools are not fully verified, the semantics of a desired high-level design and the actual behavior of the HLS-generated hardware might be different, causing a functional discrepancy. Existing solutions locate functional discrepancies by adding checkpoints into the internal design, but they do not treat resource usage as a hard constraint. In this work, we propose a graph-based method, called DiffLo, which considers 1) coarse-grained localization effectiveness, 2) fine-grained localization effectiveness, and 3) resource usage, to selectively and analytically add checkpoints into the design under a resource constraint so that HLS users can reduce their effort to locate the portion in the high-level source code that relates to the functional discrepancy. Our experiments on our real example and the CHStone benchmarks show that the proposed method can significantly reduce the effort required for functional discrepancy localization.
引用
下载
收藏
页码:300 / 301
页数:2
相关论文
共 50 条
  • [41] A compositional model for the functional verification of high-level synthesis results
    Borrione, D
    Dushina, J
    Pierre, L
    IEEE TRANSACTIONS ON VERY LARGE SCALE INTEGRATION (VLSI) SYSTEMS, 2000, 8 (05) : 526 - 530
  • [42] Graph-based fast texture synthesis
    Zou, Kun
    Li, Wensheng
    Deng, Chunjian
    Journal of Computational Information Systems, 2011, 7 (13): : 4880 - 4889
  • [43] A graph-based method for improving GSAT
    Kask, K
    Dechter, R
    PROCEEDINGS OF THE THIRTEENTH NATIONAL CONFERENCE ON ARTIFICIAL INTELLIGENCE AND THE EIGHTH INNOVATIVE APPLICATIONS OF ARTIFICIAL INTELLIGENCE CONFERENCE, VOLS 1 AND 2, 1996, : 350 - 355
  • [44] Strengthening of a Graph-Based Cryptanalysis Method
    Ghasemzadeh, Mohammad
    Shirmohammadi, Mahsa
    2009 2ND IEEE INTERNATIONAL CONFERENCE ON COMPUTER SCIENCE AND INFORMATION TECHNOLOGY, VOL 2, 2009, : 118 - 121
  • [45] Graph-Based Relation Validation Method
    Rahman, Rashedur
    Grau, Brigitte
    Rosset, Sophie
    KNOWLEDGE ENGINEERING AND KNOWLEDGE MANAGEMENT, 2017, 10180 : 167 - 171
  • [46] A high-level synthesis system for digital signal processing based on data-flow graph enumeration
    Togawa, N
    Hisaki, T
    Yanagisawa, M
    Ohtsuki, T
    IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 1998, E81A (12) : 2563 - 2575
  • [47] GRAPH-BASED IMPLEMENTATION OF A FUNCTIONAL LOGIC LANGUAGE
    KUCHEN, H
    LOOGEN, R
    MORENONAVARRO, JJ
    RODRIGUEZARTALEJO, M
    LECTURE NOTES IN COMPUTER SCIENCE, 1990, 432 : 271 - 290
  • [48] Learning Graph-based Code Representations for Source-level Functional Similarity Detection
    Liu, Jiahao
    Zeng, Jun
    Wang, Xiang
    Liang, Zhenkai
    2023 IEEE/ACM 45TH INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING, ICSE, 2023, : 345 - 357
  • [49] Source Localization using Graph-based Optimization Technique
    Srirangarajan, Seshan
    Pesch, Dirk
    2013 IEEE WIRELESS COMMUNICATIONS AND NETWORKING CONFERENCE (WCNC), 2013, : 1127 - 1132
  • [50] VulChecker: Graph-based Vulnerability Localization in Source Code
    Mirsky, Yisroel
    Macon, George
    Brown, Michael
    Yagemann, Carter
    Pruett, Matthew
    Downing, Evan
    Mertoguno, Sukarno
    Lee, Andwenke
    PROCEEDINGS OF THE 32ND USENIX SECURITY SYMPOSIUM, 2023, : 6557 - 6574