Efficient bit-level model reductions for automated hardware verification

被引:2
|
作者
Tverdyshev, Sergey [1 ]
Alkassar, Eyad [1 ]
机构
[1] Univ Saarland, Saarland, Germany
关键词
D O I
10.1109/TIME.2008.11
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Transition systems which do not perform domain-specific operations on their state variables can be efficiently reduced. We present two different algorithms which automatically eliminate domain-specific operations and reduce the domains of occurring variables from infinite to small domains. Our work extends earlier techniques which are applicable solely to combinatorial properties to temporal properties of transition systems. We have implemented our algorithm as a proof method in the Isabelle/HOL theorem prover and applied it to bit-level hardware designs. To demonstrate the efficiency of our technique, we fully automatically verify a liveness property of a pipelined processor and correctness of a memory management unit.
引用
收藏
页码:164 / 172
页数:9
相关论文
共 50 条
  • [21] HCEM: A NEW CLASS OF BIT-LEVEL HYBRID CHANNEL ERROR MODEL
    Lu, Jia
    Han, Gang
    Wang, Junhui
    Li, Baoliang
    Dou, Wenhua
    PROCEEDINGS OF THE 3RD IEEE INTERNATIONAL CONFERENCE ON NETWORK INFRASTRUCTURE AND DIGITAL CONTENT (IEEE IC-NIDC 2012), 2012, : 8 - 12
  • [22] Verification of delay insensitivity in bit-level pipelined dual-rail threshold logic adders
    Ismailoglu, A. Neslin
    Askar, Murat
    ELECTRONICS AND COMMUNICATIONS: PROCEEDINGS OF THE 7TH WSEAS INTERNATIONAL CONFERENCE ON ELECTRONICS, HARDWARE, WIRELESS AND OPTICAL COMMUNICATIONS (EHAC '08), 2008, : 23 - +
  • [23] An improved architecture for bit-level matrix multiplication
    Grover, RS
    Shang, WJ
    Li, Q
    PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON PARALLEL AND DISTRIBUTED PROCESSING TECHNIQUES AND APPLICATIONS, VOLS I-V, 2000, : 2257 - 2264
  • [24] Low-cost design of stealthy hardware trojan for bit-level fault attacks on block ciphers
    Zhang, Fan
    Zhao, Xinjie
    He, Wei
    Bhasin, Shivam
    Guo, Shize
    SCIENCE CHINA-INFORMATION SCIENCES, 2017, 60 (04)
  • [25] Bit-level architectures for Montgomery's multiplication
    Nibouche, O
    Bouridane, A
    Nibouche, M
    ICECS 2001: 8TH IEEE INTERNATIONAL CONFERENCE ON ELECTRONICS, CIRCUITS AND SYSTEMS, VOLS I-III, CONFERENCE PROCEEDINGS, 2001, : 273 - 276
  • [26] Low-cost design of stealthy hardware trojan for bit-level fault attacks on block ciphers
    Fan ZHANG
    Xinjie ZHAO
    Wei HE
    Shivam BHASIN
    Shize GUO
    Science China(Information Sciences), 2017, 60 (04) : 235 - 237
  • [27] Bit-level Perceptron Prediction for Indirect Branches
    Garza, Elba
    Mirbagher, Samira
    Khan, Tahsin Ahmad
    Jimenez, Daniel A.
    PROCEEDINGS OF THE 2019 46TH INTERNATIONAL SYMPOSIUM ON COMPUTER ARCHITECTURE (ISCA '19), 2019, : 27 - 38
  • [28] A BIT-LEVEL SYSTOLIC IMPLEMENTATION OF THE MEDIAN FILTER
    HU, Z
    KING, GA
    MICROPROCESSORS AND MICROSYSTEMS, 1995, 19 (04) : 185 - 186
  • [29] Bit-Level Affixation Text Compression Algorithms
    Lewan, Prayat
    Khancome, Chouvalit
    2024 21ST INTERNATIONAL JOINT CONFERENCE ON COMPUTER SCIENCE AND SOFTWARE ENGINEERING, JCSSE 2024, 2024, : 161 - 166
  • [30] On Bit-Level Decoding of Nonbinary LDPC Codes
    Zhang, Mu
    Cai, Kui
    Huang, Qin
    Yuan, Shuai
    IEEE TRANSACTIONS ON COMMUNICATIONS, 2018, 66 (09) : 3736 - 3748