Exploiting constraints in transformation-based verification

被引:0
|
作者
Mony, H [1 ]
Baumgartner, J [1 ]
Aziz, A [1 ]
机构
[1] Univ Texas, Austin, TX 78712 USA
关键词
D O I
暂无
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
The modeling of design environments using constraints has gained widespread industrial application, and most verification languages include constructs for specifying constraints. It is therefore critical for verification tools to intelligently leverage constraints to enhance the overall verification process. However, little prior research has addressed the applicability of transformation algorithms to designs with constraints. Even when addressed, prior work lacks optimality and in cases violates constraint semantics. In this paper, we introduce the theory and practice of transformation-based verification in the presence of constraints. We discuss how various existing transformations, such as redundancy removal and retiming, may be optimally applied while preserving constraint semantics, including dead-end states. We additionally introduce novel constraint elimination, introduction, and simplification techniques that preserve property checking. We have implemented all of the techniques proposed in this paper, and have found their synergistic application to be critical to the automated solution of many complex verification problems with constraints.
引用
收藏
页码:269 / 284
页数:16
相关论文
共 50 条
  • [1] Transformation-based verification using generalized retiming
    Kuehlmann, A
    Baumgartner, J
    [J]. COMPUTER AIDED VERIFICATION, PROCEEDINGS, 2001, 2102 : 104 - 117
  • [2] Effective Liveness Verification using a Transformation-Based Framework
    Nalla, Pradeep Kumar
    Gajavelly, Raj Kumar
    Mony, Hari
    Baumgartner, Jason
    Kanzelman, Robert
    [J]. 2014 27TH INTERNATIONAL CONFERENCE ON VLSI DESIGN AND 2014 13TH INTERNATIONAL CONFERENCE ON EMBEDDED SYSTEMS (VLSID 2014), 2014, : 74 - 79
  • [3] Graph Transformation-Based Approach to Formal Modeling and Verification of Workflows
    Rafe, Vahid
    Rahmani, Adel T.
    [J]. ADVANCES IN COMPUTER SCIENCE AND ENGINEERING, 2008, 6 : 291 - 298
  • [4] Transformation-Based Approach to Security Verification for Cyber-Physical Systems
    Mili, Saoussen
    Nguyen, Nga
    Chelouah, Rachid
    [J]. IEEE SYSTEMS JOURNAL, 2019, 13 (04): : 3989 - 4000
  • [5] Transformation-based estimation
    Feng, Zhenghui
    Wang, Tao
    Zhu, Lixing
    [J]. COMPUTATIONAL STATISTICS & DATA ANALYSIS, 2014, 78 : 186 - 205
  • [6] Voice Transformation-based Spoofing of Text-Dependent Speaker Verification Systems
    Kons, Zvi
    Aronowitz, Hagai
    [J]. 14TH ANNUAL CONFERENCE OF THE INTERNATIONAL SPEECH COMMUNICATION ASSOCIATION (INTERSPEECH 2013), VOLS 1-5, 2013, : 945 - 949
  • [7] Adaptive, nonlinear state transformation-based control of motion in presence of hard constraints
    Kabzinski, J.
    Mosiolek, P.
    [J]. BULLETIN OF THE POLISH ACADEMY OF SCIENCES-TECHNICAL SCIENCES, 2020, 68 (05) : 963 - 971
  • [8] A transformation-based optimiser for Haskell
    Jones, SLP
    Santos, ALM
    [J]. SCIENCE OF COMPUTER PROGRAMMING, 1998, 32 (1-3) : 3 - 47
  • [9] Transformation-based spatial join
    Song, JW
    Whang, KY
    Lee, YK
    Lee, MJ
    Kim, SW
    [J]. PROCEEDINGS OF THE EIGHTH INTERNATIONAL CONFERENCE ON INFORMATION KNOWLEDGE MANAGEMENT, CIKM'99, 1999, : 15 - 26
  • [10] Analyzing transformation-based simulation metamodels
    Irizarry, MDL
    Kuhl, ME
    Lada, EK
    Subramanian, S
    Wilson, JR
    [J]. PROCEEDINGS OF THE 2000 WINTER SIMULATION CONFERENCE, VOLS 1 AND 2, 2000, : 773 - 781