Verification of a network ASIC component using bounded model checking

被引:3
|
作者
Sun, X. [1 ]
Xie, F.
Wu, J.
Song, X.
机构
[1] Chinese Acad Sci, Chengdu Inst Comp Applicat, Chengdu 610041, Peoples R China
[2] Portland State Univ, Dept ECE, Portland, OR 97207 USA
[3] Portland State Univ, Dept CS, Portland, OR 97207 USA
[4] Univ Mannheim, Fak Math & Informat, D-68131 Mannheim, Germany
关键词
bounded model checking; formal verification; ATM; satisfiability ( SAT);
D O I
10.1080/00207210600963165
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Recently, a new technique called bounded model checking has been proposed that uses fast satisfiability solvers instead of binary decision diagrams (BDDs). This paper presents the experiences on formally verifying the behaviour and implementation of an Asynchronous Transfer Mode (ATM) network switching module using Nusmv2 tool. A number of properties described by linear temporal logic (LTL) are provided, and their veri. cation in reasonable central processing unit ( CPU) time is accomplished by estimating a more precise bound k which is determined by the circuit structure. Moreover, equivalence checking between the structural and behavioural descriptions of the whole switch module as one model is performed, and the results compared with those of the BDD-based approach. Based on that experience, bounded model checking will be the mainstream of industrial chip verification.
引用
收藏
页码:183 / 196
页数:14
相关论文
共 50 条
  • [11] HW/SW co-verification of a RISC CPU using bounded model checking
    Grosse, Daniel
    Kuehne, Ulrich
    Drechsler, Rolf
    MTV 2005: SIXTH INTERNATIONAL WORKSHOP ON MICROPRESSOR TEST AND VERIFICATION: COMMON CHALLENGES AND SOLUTIONS, PROCEEDINGS, 2006, : 133 - +
  • [12] Automated Verification of Go Programs via Bounded Model Checking
    Dilley, Nicolas
    Lange, Julien
    2021 36TH IEEE/ACM INTERNATIONAL CONFERENCE ON AUTOMATED SOFTWARE ENGINEERING ASE 2021, 2021, : 1016 - 1027
  • [13] Disk based software verification via bounded model checking
    Brizzolari, Fernando
    Melatti, Igor
    Tronci, Enrico
    Della Penna, Giuseppe
    14TH ASIA-PACIFIC SOFTWARE ENGINEERING CONFERENCE, PROCEEDINGS, 2007, : 358 - +
  • [14] A Bounded Model Checking Approach for the Verification of Web Services Composition
    Zahoor, Ehtesham
    Munir, Kashif
    Perrin, Olivier
    Godart, Claude
    INTERNATIONAL JOURNAL OF WEB SERVICES RESEARCH, 2013, 10 (04) : 62 - 81
  • [15] Using bounded model checking with BOGOR
    Lee, Taehoon
    Cho, Mintaek
    Kwon, Gihwon
    SERA 2007: 5TH ACIS INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING RESEARCH, MANAGEMENT, AND APPLICATIONS, PROCEEDINGS, 2007, : 863 - +
  • [16] ebXML verification using model checking
    Di Sciascio, E
    Donini, FM
    Mongiello, M
    Piscitelli, G
    ITI 2004: PROCEEDINGS OF THE 26TH INTERNATIONAL CONFERENCE ON INFORMATION TECHNOLOGY INTERFACES, 2004, : 455 - 460
  • [17] Automated verification of concurrent go programs via bounded model checking
    Dilley, Nicolas
    Lange, Julien
    AUTOMATED SOFTWARE ENGINEERING, 2023, 30 (02)
  • [18] Application of symbolic and bounded model checking to the verification of logic control systems
    Loeis, Kingliana
    Younis, Mohammed Bani
    Frey, Georg
    ETFA 2005: 10TH IEEE INTERNATIONAL CONFERENCE ON EMERGING TECHNOLOGIES AND FACTORY AUTOMATION, VOL 1, PTS 1 AND 2, PROCEEDINGS, 2005, : 247 - 250
  • [19] Achieving completeness in the verification of action theories by Bounded Model Checking in ASP
    Giordano, Laura
    Martelli, Alberto
    Dupre, Daniele Theseider
    JOURNAL OF LOGIC AND COMPUTATION, 2015, 25 (06) : 1307 - 1330
  • [20] Efficient SAT-based bounded model checking for software verification
    Ivancic, Franio
    Yang, Zijiang
    Ganai, Malay K.
    Gupta, Aarti
    Ashar, Pranav
    THEORETICAL COMPUTER SCIENCE, 2008, 404 (03) : 256 - 274