Case study of ATPG-based bounded model checking: Verifying USB2.0 IP core

被引:1
|
作者
Qiang, Q [1 ]
Chang, CL [1 ]
Saab, DG [1 ]
Abraham, JA [1 ]
机构
[1] Case Western Reserve Univ, Cleveland, OH 44106 USA
关键词
D O I
10.1109/ICCD.2005.36
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
This paper presents the ATPG performances of verifying USB2.0 IP core. Using the USB protocol and typical properties, the ATPG-based bounded model checking mechanism is revealed. Heuristics to accelerate the ATPG search are presented and their impacts are analyzed. We feel that results from this case study are applicable to serial communication circuits of the same family and can be scaled to industrial-sized circuits.
引用
收藏
页码:461 / 463
页数:3
相关论文
共 21 条
  • [1] A Novel Verifying System of USB2.0 IP Core for SoC Applications
    Shi, Shenping
    Luo, Rong
    [J]. 2009 INTERNATIONAL CONFERENCE ON COMMUNICATIONS, CIRCUITS AND SYSTEMS PROCEEDINGS, VOLUMES I & II, 2009, : 1010 - 1013
  • [2] Fault-Tolerant Design and Testing of USB2.0 Peripheral Devices IP Core System
    白晓平
    韦援丰
    [J]. Tsinghua Science and Technology, 2007, (S1) : 197 - 201
  • [3] Emulation Based High-Accuracy Throughput Estimation for High-Speed Connectivities: Case Study of USB2.0
    Hong, Byungchul
    Shin, Chulho
    Ko, Daehyup
    [J]. PROCEEDINGS OF THE 48TH ACM/EDAC/IEEE DESIGN AUTOMATION CONFERENCE (DAC), 2011, : 609 - 614
  • [4] Verifying OSEK/VDX Applications: An Optimized SMT-based Bounded Model Checking Approach
    Zhang, Haitao
    Cheng, Zhuo
    Tian, Cong
    Lu, Yonggang
    Li, Guoqiang
    [J]. 2016 IEEE/ACIS 15TH INTERNATIONAL CONFERENCE ON COMPUTER AND INFORMATION SCIENCE (ICIS), 2016, : 615 - 620
  • [5] Verifying cooperative software: A SMT-based bounded model checking approach for deterministic scheduler
    Zhang, Haitao
    Li, Guoqiang
    Sun, Daniel
    Lu, Yonggang
    Hsu, Ching-Hsien
    [J]. JOURNAL OF SYSTEMS ARCHITECTURE, 2017, 81 : 7 - 16
  • [6] Verifying Multi-threaded Software using SMT-based Context-Bounded Model Checking
    Cordeiro, Lucas
    Fischer, Bernd
    [J]. 2011 33RD INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING (ICSE), 2011, : 331 - 340
  • [7] Verifying Real-Time Properties of Multi-agent Systems via SMT-Based Bounded Model Checking
    Zbrzezny, Agnieszka M.
    Zbrzezny, Andrzej
    [J]. PRIMA 2016: PRINCIPLES AND PRACTICE OF MULTI-AGENT SYSTEMS, 2016, 9862 : 149 - 167
  • [8] Bounded model checking of concurrent data types on relaxed memory models: A case study
    Burckhardt, Sebastian
    Alur, Rajeev
    Martin, Milo M. K.
    [J]. COMPUTER AIDED VERIFICATION, PROCEEDINGS, 2006, 4144 : 489 - 502
  • [9] A Method of Virtual Test Based on Model Checking and a Case Study
    Wuniri, Qiqige
    Li, Xiaoping
    Yang, Fan
    Ma, Shilong
    Liu, Yifan
    Li, Naihai
    [J]. PROCEEDINGS OF 2016 CHINESE INTELLIGENT SYSTEMS CONFERENCE, VOL I, 2016, 404 : 437 - 453
  • [10] Case Study: Discovering Hardware Trojans Based on model checking
    Zhao, Jianfeng
    [J]. ICCNS 2018: PROCEEDINGS OF THE 8TH INTERNATIONAL CONFERENCE ON COMMUNICATION AND NETWORK SECURITY, 2018, : 64 - 68