ICCAD-2005. IEEE/ACM International Conference on Computer-Aided Design, 2005.
DOI: 10.1109/iccad.2005.1560219
|View full text |Cite
|
Sign up to set email alerts
|

Transition-by-transition FSM traversal for reachability analysis in bounded model checking

Abstract: In bounded model checking (BMC)-based verification flows lack of reachability constraints often leads to false negatives. At present, it is daily practice of a verification engineer to identify the missing reachability constraints by manually inspecting the design code and by analyzing counterexamples. This, unfortunately, requires a lot of effort and is prone to errors. We propose an algorithm to determine reachability constraints automatically. The proposed approach applies to a design style where the operat… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1

Citation Types

0
4
0

Publication Types

Select...
2
1

Relationship

0
3

Authors

Journals

citations
Cited by 3 publications
(4 citation statements)
references
References 18 publications
0
4
0
Order By: Relevance
“…A survey [Shyam and Bertacco 2006] of these approaches shows that a wide range of techniques, ranging from theorem-proving and abstraction-guided counterexample search to symbolic/logic simulation and ATPG-based methods have been employed. The work in Shyam and Bertacco [2006] and Nguyen et al [2005] is most closely related to our approach. In both of these, the specification consists of properties only, unlike in our case where auxiliary state machines are present.…”
Section: Related Workmentioning
confidence: 97%
See 2 more Smart Citations
“…A survey [Shyam and Bertacco 2006] of these approaches shows that a wide range of techniques, ranging from theorem-proving and abstraction-guided counterexample search to symbolic/logic simulation and ATPG-based methods have been employed. The work in Shyam and Bertacco [2006] and Nguyen et al [2005] is most closely related to our approach. In both of these, the specification consists of properties only, unlike in our case where auxiliary state machines are present.…”
Section: Related Workmentioning
confidence: 97%
“…Our approach is different from STE-based approaches in view of the auxiliary state machines and the verification methodology adopted. Nguyen et al [2005] present a method for extracting reachability constraints to avoid false negatives in a bounded model checking setting. Their approach applies to a design style where the implementation of the design is a main FSM and a set of sub-FSMs.…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…For hardware, the abstraction is typically partitioned according to the design that usually is composed of submodules (see, e.g., [3,14]). For software, the partitioning is guided by the control-flow graph of the program.…”
Section: Introductionmentioning
confidence: 99%