2020 Design, Automation &Amp; Test in Europe Conference &Amp; Exhibition (DATE) 2020
DOI: 10.23919/date48585.2020.9116515
|View full text |Cite
|
Sign up to set email alerts
|

Gap-free Processor Verification by S2QED and Property Generation

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
5
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
6
1

Relationship

2
5

Authors

Journals

citations
Cited by 8 publications
(5 citation statements)
references
References 10 publications
0
5
0
Order By: Relevance
“…As future work, it would be valuable to extend our framework to consider variants of SQED that operate with more fully symbolic initial states [22], [23]. The challenge will be to identify how this can be done while guaranteeing no spurious counterexamples.…”
Section: Discussionmentioning
confidence: 99%
See 2 more Smart Citations
“…As future work, it would be valuable to extend our framework to consider variants of SQED that operate with more fully symbolic initial states [22], [23]. The challenge will be to identify how this can be done while guaranteeing no spurious counterexamples.…”
Section: Discussionmentioning
confidence: 99%
“…It is also applicable to post-silicon validation. SQED was extended to operate with symbolic initial states [22], [23] to overcome the potential limitations of BMC when unrolling the transition relation of a design starting in a concrete initial state.…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…Noteworthy approaches that are based on model checking techniques are the OneSpin 360 DV RISC-V Verification App 19) and riscv-formal 20) . Recently, research approaches targeting RISC-V pipelined microarchitectures emerged that rely on formal methods and consider functional properties [27] as well as transient execution attacks [28]. However, formal verification methods should be complemented by simulation-based approaches due to their complexity and potential scalability issues.…”
Section: Risc-v Verificationmentioning
confidence: 99%
“…A-QED 2 builds on A-QED [8] and leverages BMC [11], [37]. Similar approaches based on self-consistency have been successfully applied to other classes of hardware designs, such as processor verification (as symbolic quick error detection (SQED) [38]- [43]), as well as to hardware security [44]- [49].…”
Section: Related Workmentioning
confidence: 99%