Safe IP Integration Using Container Modules

Rolf Drechsler, Ulrich Kuhne

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

Abstract

In modern hardware and system design flows, tight time-to-market constraints can only be met by reusing existing code. Building blocks like floating-point units, embedded processors or bus components are readily available as Intellectual Property (IP). However, this practice of putting together third-party components conflicts with the high quality requirements which are common in the domain of safety-critical systems, since the correctness of the used IP blocks is difficult or impossible to verify. In this paper, we propose an approach for safe IP integration by isolating suspicious blocks inside provably safe container modules. In this way, system level properties can be checked assuming the correct behavior of the wrapped IP blocks. As a first step in this direction, we show how a container module implementing a bus protocol can be generated and verified automatically. We rely on a model-driven design approach using a domain specific language and model-to-text transformations.

Original languageEnglish
Title of host publicationProceedings - 2014 5th International Symposium on Electronic System Design, ISED 2014
PublisherInstitute of Electrical and Electronics Engineers Inc.
Pages1-4
Number of pages4
ISBN (Electronic)9781479969654
DOIs
Publication statusPublished - 1 Jan 2014
Externally publishedYes
Event5th International Symposium on Electronic System Design, ISED 2014 - Surathkal, Mangalore, India
Duration: 15 Dec 201417 Dec 2014

Publication series

NameProceedings - 2014 5th International Symposium on Electronic System Design, ISED 2014

Conference

Conference5th International Symposium on Electronic System Design, ISED 2014
Country/TerritoryIndia
CitySurathkal, Mangalore
Period15/12/1417/12/14

Keywords

  • hardware design
  • safety
  • system level design

Fingerprint

Dive into the research topics of 'Safe IP Integration Using Container Modules'. Together they form a unique fingerprint.

Cite this