Deterministic microcode machine generation

Abir M'Zah, Bruno Monsuez, Hycham Aboutaleb

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

Abstract

Microcode is a technique that is used to implement internal state machine sequencing in different type of controllers addressing a large range of different applications. It can be used to reduce the functional as well as the internal complexity of a design. A challenge in using microcode based IP-design in IPs that are designed to be used in critical applications is to ensure that the microprogram (i.e. a sequence of microcode instructions) will execute correctly in a possible harsh environment. A lot of work has been published on automatic generation of microcode as well as on proving that microcode generation is correct. However, very little work has been done on ensuring that microcode executes correctly in a harsh environment. In this paper, we propose a new deterministic solution that generates for a given set of valid internal state machine sequences the microcode as well as the embedded verification mechanism that verifies on the fly that the execution of the microcode sequence is correct and that the sequence is a valid sequence.

Original languageEnglish
Title of host publication2017 IEEE Conference on Dependable and Secure Computing
PublisherInstitute of Electrical and Electronics Engineers Inc.
Pages370-376
Number of pages7
ISBN (Electronic)9781509055692
DOIs
Publication statusPublished - 18 Oct 2017
Event2017 IEEE Conference on Dependable and Secure Computing - Taipei, Taiwan, Province of China
Duration: 7 Aug 201710 Aug 2017

Publication series

Name2017 IEEE Conference on Dependable and Secure Computing

Conference

Conference2017 IEEE Conference on Dependable and Secure Computing
Country/TerritoryTaiwan, Province of China
CityTaipei
Period7/08/1710/08/17

Keywords

  • Critical Applications
  • Determinism
  • Microcode
  • Performance
  • Reliability
  • Verification

Fingerprint

Dive into the research topics of 'Deterministic microcode machine generation'. Together they form a unique fingerprint.

Cite this