Memory models for the formal verification of assembler code using bounded model checking

被引:2
|
作者
Ecker, W
Esen, V
Steininger, T
Zambaldi, M
机构
关键词
D O I
10.1109/ISORC.2004.1300338
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
The formal verification of assembler code using hardware verification tools requires memory components which e.g. hold the code itself and the processed data. Since the count of variables to be proven usually rises with both data-size and address-space, complexity boundaries of formal tools can be reached quickly. Since bounded model checking (BMC) always involves a certain time window and therefore the count of memory accesses is limited, it is possible to optimize the applied memory as far as the address-space and the size in the count of gates is concerned. In this paper we introduce various memory models, which decrease the complexity of formal proofs by applying such optimizations. We will provide examples of models with limitations either of the address-space or the amount of storable data. Our analysis will show that these models remarkably enhance the performance, while verifying the instruction-set of a given processor-unit with our in-house BMC-Tool.
引用
收藏
页码:129 / 135
页数:7
相关论文
共 50 条
  • [31] Formal specification and security verification of the IDKE protocol using FDR model checking
    Soltwisch, R
    Tegeler, F
    Hogrefe, D
    2005 13TH IEEE INTERNATIONAL CONFERENCE ON NETWORKS JOINTLY HELD WITH THE 2005 7TH IEEE MALAYSIA INTERNATIONAL CONFERENCE ON COMMUNICATIONS, PROCEEDINGS 1 AND 2, 2005, : 329 - 334
  • [32] Formal Verification of SDG via Symbolic Model Checking
    Ning, Ning
    Zhang, Jun
    Gao, Xiang-Yang
    Xue, Jing
    ICICTA: 2009 SECOND INTERNATIONAL CONFERENCE ON INTELLIGENT COMPUTATION TECHNOLOGY AND AUTOMATION, VOL IV, PROCEEDINGS, 2009, : 521 - 524
  • [33] Formal Verification of ALICA Multi-agent Plans Using Model Checking
    Thao Nguyen Van
    Fredivianus, Nugroho
    Huu Tam Tran
    Geihs, Kurt
    Thi Thanh Binh Huynh
    PROCEEDINGS OF THE NINTH INTERNATIONAL SYMPOSIUM ON INFORMATION AND COMMUNICATION TECHNOLOGY (SOICT 2018), 2018, : 351 - 358
  • [34] Checking formal verification models for human-automation interaction
    van Paassen, M. M.
    Bolton, Matthew L.
    Jimenez, Noelia
    2014 IEEE INTERNATIONAL CONFERENCE ON SYSTEMS, MAN AND CYBERNETICS (SMC), 2014, : 3709 - 3714
  • [35] EDA formal verification - Expanding static verification with model checking and formal design rule checks
    Czeck, E
    Sandler, S
    ELECTRONIC ENGINEERING, 1999, 71 (869): : 35 - +
  • [36] Formal Verification of Software Designs in Hierarchical State Transition Matrix with SMT-based Bounded Model Checking
    Kong, Weiqiang
    Katahira, Noriyuki
    Watanabe, Masahiko
    Katayama, Tetsuro
    Hisazumi, Kenji
    Fukuda, Akira
    2011 18TH ASIA-PACIFIC SOFTWARE ENGINEERING CONFERENCE (APSEC 2011), 2011, : 81 - 88
  • [37] Bounded LTL model checking with stable models
    Heljanko, K
    Niemelä, I
    THEORY AND PRACTICE OF LOGIC PROGRAMMING, 2003, 3 : 519 - 550
  • [38] Bounded model checking of concurrent data types on relaxed memory models: A case study
    Burckhardt, Sebastian
    Alur, Rajeev
    Martin, Milo M. K.
    COMPUTER AIDED VERIFICATION, PROCEEDINGS, 2006, 4144 : 489 - 502
  • [39] Symbolic Causality Checking Using Bounded Model Checking
    Beer, Adrian
    Heidinger, Stephan
    Kuehne, Uwe
    Leitner-Fischer, Florian
    Leue, Stefan
    MODEL CHECKING SOFTWARE, SPIN 2015, 2015, 9232 : 203 - 221
  • [40] HW/SW co-verification of a RISC CPU using bounded model checking
    Grosse, Daniel
    Kuehne, Ulrich
    Drechsler, Rolf
    MTV 2005: SIXTH INTERNATIONAL WORKSHOP ON MICROPRESSOR TEST AND VERIFICATION: COMMON CHALLENGES AND SOLUTIONS, PROCEEDINGS, 2006, : 133 - +