Scalable Specification Mining for Verification and Diagnosis

被引:0
|
作者
Li, Wenchao [1 ]
Forin, Alessandro [2 ]
Seshia, Sanjit A. [1 ]
机构
[1] Univ Calif Berkeley, Berkeley, CA 94720 USA
[2] Microsoft Res, Redmond, WA USA
关键词
Formal specification; verification; assertions; diagnosis; debugging; error localization; post-silicon validation;
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Effective system verification requires good specifications. The lack of sufficient specifications can lead to misses of critical bugs, design re-spins, and time-to-market slips. In this paper, we present a new technique for mining temporal specifications from simulation or execution traces of a digital hardware design. Given an execution trace, we mine recurring temporal behaviors in the trace that match a set of pattern templates. Subsequently, we synthesize them into complex patterns by merging events in time and chaining the patterns using inference rules. We specifically designed our algorithm to make it highly efficient and meaningful for digital circuits. In addition, we propose a pattern-mining diagnosis framework where specifications mined from correct and erroneous traces are used to automatically localize an error. We demonstrate the effectiveness of our approach on industrial-size examples by mining specifications from traces of over a million cycles in a few minutes and use them to successfully localize errors of different types to within module boundaries.
引用
收藏
页码:755 / 760
页数:6
相关论文
共 50 条
  • [1] Specification and verification of behavioural properties of fault diagnosis
    Terstyanszky, G
    UKACC INTERNATIONAL CONFERENCE ON CONTROL '98, VOLS I&II, 1998, : 398 - 403
  • [2] A scalable and modular approach to verification of ATM switching system using reverse specification
    Chung, CS
    Lee, MK
    Jeong, MS
    1998 ASIA PACIFIC SOFTWARE ENGINEERING CONFERENCE, PROCEEDINGS, 1998, : 278 - 285
  • [3] Scalable Computing Through Reusability: Encapsulation, Specification, and Verification for a Navigable Tree Position
    Mbwambo, Nicodemus M. J.
    Sun, Yu-Shan
    Krone, Joan
    Sitaraman, Murali
    INTELLIGENT COMPUTING, VOL 1, 2022, 506 : 58 - 74
  • [4] VLSI SPECIFICATION AND VERIFICATION
    ANTOLA, A
    MICROPROCESSING AND MICROPROGRAMMING, 1990, 30 (1-5): : 403 - 403
  • [5] Security specification and verification
    Fenkam, P
    16TH ANNUAL INTERNATIONAL CONFERENCE ON AUTOMATED SOFTWARE ENGINEERING (ASE 2001), PROCEEDINGS, 2001, : 434 - 434
  • [6] Scalable templates for specification reuse
    Chiang, CC
    Urban, JE
    COMPSAC 97 : TWENTY-FIRST ANNUAL INTERNATIONAL COMPUTER SOFTWARE & APPLICATIONS CONFERENCE, 1997, : 396 - 401
  • [7] Adversarial Specification Mining
    Kang, Hong Jin
    Lo, David
    ACM TRANSACTIONS ON SOFTWARE ENGINEERING AND METHODOLOGY, 2021, 30 (02)
  • [8] Deep Specification Mining
    Le, Tien-Duy B.
    Lo, David
    ISSTA'18: PROCEEDINGS OF THE 27TH ACM SIGSOFT INTERNATIONAL SYMPOSIUM ON SOFTWARE TESTING AND ANALYSIS, 2018, : 106 - 117
  • [9] Properties as processes: Their specification and verification
    Kelso, J
    Milne, G
    FORMAL TECHNIQUES FOR NETWORKED AND DISTRIBUTED SYSTEMS - FORTE 2005, 2005, 3731 : 503 - 517
  • [10] SPECIFICATION AND VERIFICATION OF VLSI SYSTEMS
    WILK, A
    PNUELI, A
    1989 IEEE INTERNATIONAL CONFERENCE ON COMPUTER-AIDED DESIGN: DIGEST OF TECHNICAL PAPERS, 1989, : 460 - 463