Improving the quality of bounded model checking by means of coverage estimation

Ulrich Kühne, Daniel Große, Rolf Drechsler

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

Abstract

Formal verification has become an important step in circuit and system design. A prominent technique is Bounded Model Checking (BMC) which is widely used in industry. In BMC it is checked if certain properties hold for the design. But even if all properties could be successfully verified, it is difficult to determine if the properties cover the entire functional behavior of the circuit. Recently, a new approach for estimating coverage in BMC has been presented that can easily be integrated in existing BMC tools. In this paper we give experimental results on the application of the technique to the block-level verification of a RISC CPU. The experiments show that the costs for coverage estimation are comparable to the verification costs. Furthermore it is demonstrated how the technique can be applied to achieve full coverage on a higher level. As an example, we investigate the instruction set verification of a RISC CPU.

Original languageEnglish
Title of host publicationProceedings - IEEE Computer Society Annual Symposium on VLSI
Subtitle of host publicationEmerging VLSI Technologies and Architectures
Pages165-170
Number of pages6
DOIs
Publication statusPublished - 28 Nov 2007
Externally publishedYes
EventIEEE Computer Society Annual Symposium on VLSI: Emerging VLSI Technologies and Architectures, ISVLSI'07 - Porto Alegre, Brazil
Duration: 9 Mar 200711 Mar 2007

Publication series

NameProceedings - IEEE Computer Society Annual Symposium on VLSI: Emerging VLSI Technologies and Architectures

Conference

ConferenceIEEE Computer Society Annual Symposium on VLSI: Emerging VLSI Technologies and Architectures, ISVLSI'07
Country/TerritoryBrazil
CityPorto Alegre
Period9/03/0711/03/07

Fingerprint

Dive into the research topics of 'Improving the quality of bounded model checking by means of coverage estimation'. Together they form a unique fingerprint.

Cite this