Verification of a network ASIC component using bounded model checking

被引:3
|
作者
Sun, X. [1 ]
Xie, F.
Wu, J.
Song, X.
机构
[1] Chinese Acad Sci, Chengdu Inst Comp Applicat, Chengdu 610041, Peoples R China
[2] Portland State Univ, Dept ECE, Portland, OR 97207 USA
[3] Portland State Univ, Dept CS, Portland, OR 97207 USA
[4] Univ Mannheim, Fak Math & Informat, D-68131 Mannheim, Germany
关键词
bounded model checking; formal verification; ATM; satisfiability ( SAT);
D O I
10.1080/00207210600963165
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Recently, a new technique called bounded model checking has been proposed that uses fast satisfiability solvers instead of binary decision diagrams (BDDs). This paper presents the experiences on formally verifying the behaviour and implementation of an Asynchronous Transfer Mode (ATM) network switching module using Nusmv2 tool. A number of properties described by linear temporal logic (LTL) are provided, and their veri. cation in reasonable central processing unit ( CPU) time is accomplished by estimating a more precise bound k which is determined by the circuit structure. Moreover, equivalence checking between the structural and behavioural descriptions of the whole switch module as one model is performed, and the results compared with those of the BDD-based approach. Based on that experience, bounded model checking will be the mainstream of industrial chip verification.
引用
收藏
页码:183 / 196
页数:14
相关论文
共 50 条
  • [1] Verification of ACTL properties by bounded model checking
    Zhang, Wenhui
    COMPUTER AIDED SYSTEMS THEORY- EUROCAST 2007, 2007, 4739 : 556 - 563
  • [2] Safety property verification using sequential SAT and bounded model checking
    Parthasarathy, G
    Iyer, MK
    Cheng, KT
    Wang, LC
    IEEE DESIGN & TEST OF COMPUTERS, 2004, 21 (02): : 132 - 143
  • [3] Bounded model checking and induction: From refutation to verification
    de Moura, L
    Ruess, H
    Sorea, M
    COMPUTER AIDED VERIFICATION, 2003, 2725 : 14 - 26
  • [4] Verification of Safety for Synchronous-Reactive System Using Bounded Model Checking
    Zhang, Xiaozhen
    Yang, Zhaoming
    Kong, Hui
    Kong, Weiqiang
    INTERNATIONAL JOURNAL OF SOFTWARE ENGINEERING AND KNOWLEDGE ENGINEERING, 2023, 33 (06) : 885 - 932
  • [5] Memory models for the formal verification of assembler code using bounded model checking
    Ecker, W
    Esen, V
    Steininger, T
    Zambaldi, M
    SEVENTH IEEE INTERNATIONAL SYMPOSIUM ON OBJECT-ORIENTED REAL-TIME DISTRIBUTED COMPUTING, PROCEEDINGS, 2004, : 129 - 135
  • [6] Verification of Flow-Based Computing Systems Using Bounded Model Checking
    Thijssen, Sven
    Singireddy, Suraj
    Rashed, Muhammad Rashedul Haq
    Jha, Sumit Kumar
    Ewetz, Rickard
    2023 IEEE/ACM INTERNATIONAL CONFERENCE ON COMPUTER AIDED DESIGN, ICCAD, 2023,
  • [7] Automatic verification of biochemical network using model checking method
    Kim, Jinkyung
    Lee, Younghee
    Moon, Il
    CHINESE JOURNAL OF CHEMICAL ENGINEERING, 2008, 16 (01) : 90 - 94
  • [8] Symbolic Causality Checking Using Bounded Model Checking
    Beer, Adrian
    Heidinger, Stephan
    Kuehne, Uwe
    Leitner-Fischer, Florian
    Leue, Stefan
    MODEL CHECKING SOFTWARE, SPIN 2015, 2015, 9232 : 203 - 221
  • [9] Formal Modelling and Verification of a Component Model using Coloured Petri Nets and Model Checking
    Oliveira, Elthon
    Almeida, Hyggo
    Silva, Leandro
    APPLIED COMPUTING 2007, VOL 1 AND 2, 2007, : 1427 - +
  • [10] Formal verification using bounded model checking: SAT versus sequential ATPG engines
    Saab, DG
    Abraham, JA
    Vedula, VM
    16TH INTERNATIONAL CONFERENCE ON VLSI DESIGN, PROCEEDINGS, 2003, : 243 - 248