Symbolic debugging scheme for optimized hardware and software

被引:1
|
作者
Koushanfar, F [1 ]
Kirovski, D [1 ]
Potkonjak, M [1 ]
机构
[1] Univ Calif Los Angeles, Dept Elect Engn, Los Angeles, CA 90095 USA
关键词
D O I
10.1109/ICCAD.2000.896448
中图分类号
T [工业技术];
学科分类号
08 ;
摘要
Symbolic debuggers are system development tools that can accelerate the validation speed of behavioral specifications by allowing a user to interact with an executing code at the source level. In response to a user query, the debugger retrieves the value of a source variable in a manner consistent with respect to the source state ment where execution has halted. However, when a behavioral specification has been optimized using transformations, values of variables may be inaccessible in the run-time state. We have developed a set of techniques that, given a behavioral specification CDFG, enforce computation of a selected subset V-cut of user variables such that (i) all other variables v is an element of CDFG can be computed from V-cut and (ii) this enforcement has minimal impact on the optimization potential of the computation. The implementation of the new debugging approach poses several optimization tasks. We have formulated the optimization tasks and developed heuristics to solve them. The effectiveness of the approach has been demonstrated on a set of benchmark designs.
引用
收藏
页码:40 / 43
页数:4
相关论文
共 50 条
  • [41] Debugging embedded software
    Gott, RA
    COMPUTER DESIGN, 1998, 37 (02): : 71 - 78
  • [42] SPAD: Software protection through anti-debugging using hardware-assisted virtualization
    Qi, Z., 1600, Institute of Information Science (28):
  • [43] ANALYSIS OF CROSS-CORRELATION OF SOFTWARE AND HARDWARE OF LOCAL COMPUTER-NETWORKS IN THE PROCESS OF THEIR DEBUGGING
    GORELIK, BP
    AVTOMATIKA I VYCHISLITELNAYA TEKHNIKA, 1986, (02): : 38 - 44
  • [44] SPAD: Software Protection Through Anti-Debugging Using Hardware-Assisted Virtualization
    Qi, Zhengwei
    Li, Bingyu
    Lin, Qian
    Yu, Miao
    Xia, Mingyuan
    Guan, Haibing
    JOURNAL OF INFORMATION SCIENCE AND ENGINEERING, 2012, 28 (05) : 813 - 827
  • [45] Design of a Hybrid Encryption Scheme Based on Software and Hardware Collaboratin
    Liu, Xuankai
    Li, Bing
    2024 9TH INTERNATIONAL CONFERENCE ON SIGNAL AND IMAGE PROCESSING, ICSIP, 2024, : 399 - 403
  • [46] Reli: Hardware/Software Checkpoint and Recovery Scheme for Embedded Processors
    Li, Tuo
    Ragel, Roshan
    Parameswaran, Sri
    DESIGN, AUTOMATION & TEST IN EUROPE (DATE 2012), 2012, : 875 - 880
  • [47] Implemented scheme with software-hardware for function computations in supercomputer
    Zhang, Minxuan
    Guofang Keji Daxue Xuebao/Journal of National University of Defense Technology, 1996, 18 (03): : 115 - 120
  • [48] A Software Licensing Authorization Scheme Based on Hardware Component Identifiers
    Huang, Jyun-Yao
    Li, I-Hui
    Liao, I-En
    2014 INTERNATIONAL CONFERENCE ON INFORMATION SCIENCE, ELECTRONICS AND ELECTRICAL ENGINEERING (ISEEE), VOLS 1-3, 2014, : 1672 - +
  • [49] A software/hardware secure watermarking scheme for Internet of Things applications
    Dalbouchi, Roukaya
    Zitouni, Abdelkrim
    MULTIMEDIA TOOLS AND APPLICATIONS, 2023,
  • [50] Hardware/software co-verification scheme for MSTP ASIC
    Wu, Tao
    Wang, Peng
    Jin, Depeng
    Zeng, Lieguang
    ASICON 2007: 2007 7TH INTERNATIONAL CONFERENCE ON ASIC, VOLS 1 AND 2, PROCEEDINGS, 2007, : 998 - 1001