Proceedings of the 19th ACM Great Lakes Symposium on VLSI 2009
DOI: 10.1145/1531542.1531637
|View full text |Cite
|
Sign up to set email alerts
|

Enhancing bug hunting using high-level symbolic simulation

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
4
0

Year Published

2010
2010
2022
2022

Publication Types

Select...
4
2

Relationship

2
4

Authors

Journals

citations
Cited by 6 publications
(4 citation statements)
references
References 13 publications
0
4
0
Order By: Relevance
“…The machine we used was a Dell PowerEdge 2900 (2GHz Xeon processor with 48 Gbytes of memory) running CentOS Linux 5.5. We implemented our algorithms on a commercial symbolic simulator [16] whose implementation detail can be found in [2], and the ABC package from University of California at Berkeley [18].…”
Section: Resultsmentioning
confidence: 99%
See 1 more Smart Citation
“…The machine we used was a Dell PowerEdge 2900 (2GHz Xeon processor with 48 Gbytes of memory) running CentOS Linux 5.5. We implemented our algorithms on a commercial symbolic simulator [16] whose implementation detail can be found in [2], and the ABC package from University of California at Berkeley [18].…”
Section: Resultsmentioning
confidence: 99%
“…The runtime of all benchmarks was within 1 minute. Note that the number of patterns to trigger each bug can be considerably different from [2], [14] because we were measuring the number of patterns to trigger the bug, while [2], [14] measured the number to observe the bug at primary outputs. We also observed that several bugs could not be covered by random simulation using one million patterns, and it is difficult to distinguish the coverability of those bugs unless more patterns are simulated to a point where at least one pattern covers all the bugtriggering condition.…”
Section: A Covmet Accuracy Evaluationmentioning
confidence: 99%
“…Their approaches focus on how to handle RTL Verilog constructs containing delay and array structures in a BDD-based symbolic simulator. Since BDD can explode quickly, modern symbolic simulators use other logic representations and call backend solvers when necessary [5]. Sunkari et al.…”
Section: B Symbolic Simulationmentioning
confidence: 99%
“…Even though some classes of vulnerabilities reoccurring all the way through the software background exist for a long time, for example buffer overflows and format string vulnerabilities, automatically detecting their incarnations in specific software projects is often still not possible without significant expert knowledge [2]. The techniques that have been proposed include source code auditing, static program analysis, dynamic program analysis, and formal verification [3][4][5]. However, many of the methods lie on dangerous conclusions of the range concerning the costeffectiveness as represented in Figure 1.1.…”
Section: Introductionmentioning
confidence: 99%