2020 57th ACM/IEEE Design Automation Conference (DAC) 2020
DOI: 10.1109/dac18072.2020.9218715
|View full text |Cite
|
Sign up to set email alerts
|

A-QED Verification of Hardware Accelerators

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
2

Citation Types

0
10
0

Year Published

2020
2020
2023
2023

Publication Types

Select...
6
1

Relationship

2
5

Authors

Journals

citations
Cited by 10 publications
(10 citation statements)
references
References 25 publications
0
10
0
Order By: Relevance
“…This paper presents both a formal foundation of A-QED 2 and an empirical evaluation that demonstrates its bug-finding capabilities in practice. We prove that A-QED's completeness guarantees [8] continue to hold for A-QED 2 -if the full HA under verification contains a bug, then A-QED 2 will detect that bug. Furthermore, we apply A-QED 2 to a wide variety of non-interfering LCAs (although our theoretical proofs apply to interfering LCAs as well): 109 different (buggy) versions of large open-source HAs of up to 200 million logic gates (including industrial HAs).…”
Section: Introductionmentioning
confidence: 88%
See 3 more Smart Citations
“…This paper presents both a formal foundation of A-QED 2 and an empirical evaluation that demonstrates its bug-finding capabilities in practice. We prove that A-QED's completeness guarantees [8] continue to hold for A-QED 2 -if the full HA under verification contains a bug, then A-QED 2 will detect that bug. Furthermore, we apply A-QED 2 to a wide variety of non-interfering LCAs (although our theoretical proofs apply to interfering LCAs as well): 109 different (buggy) versions of large open-source HAs of up to 200 million logic gates (including industrial HAs).…”
Section: Introductionmentioning
confidence: 88%
“…A-QED 2 builds on A-QED [8] and leverages BMC [11], [37]. Similar approaches based on self-consistency have been successfully applied to other classes of hardware designs, such as processor verification (as symbolic quick error detection (SQED) [38]- [43]), as well as to hardware security [44]- [49].…”
Section: Related Workmentioning
confidence: 99%
See 2 more Smart Citations
“…SQED employs the principle of self-consistency based on a mathematical interpretation of instructions as functions. That principle is also applied by accelerator quick error detection (A-QED) [24], a formal pre-silicon verification technique for HW accelerator designs. A-QED checks the functions implemented by an accelerator for functional consistency and, like SQED, does not require a formal specification.…”
Section: Related Workmentioning
confidence: 99%