Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
10.1145/775832.775834acmconferencesArticle/Chapter ViewAbstractPublication PagesdacConference Proceedingsconference-collections
Article

High level formal verification of next-generation microprocessors

Published: 02 June 2003 Publication History

Abstract

Formal property verification has been an effective complement to pre-silicon validation of several Intel Pentium 4 CPU designs at Intel Corporation. The principal objective of this program has been to prove design correctness rather than hunt for bugs. In the process, we have evolved our tools and methodology and are now applying FPV techniques to protocol level properties. Moving forward, new technologies such as GSTE and SAT offer the potential to significantly increase the scope of what can be formally verified. This paper will discuss the application of FPV to validation of the Intel Pentium 4 microarchitecture and some approaches being considered to broaden the application of FV techniques, particularly at a higher level of design abstraction.

References

[1]
R. Beers, R. Ghughal, and M. Aagaard, "Applications of Hierarchical Verification in Model Checking." FMCAD 2000 (published in CHARM 2001 proceedings).]]
[2]
B. Bentley, "High level validation of next-generation microprocessors", IEEE International Workshop on High Level Design Validation and Test, 2002.]]
[3]
F. Copty, L. Fix, R. Fraer, E. Giunchiglia, G. Kamhi, A. Tacchella, and M. Y. Vardi, "Benefits of Bounded Model Checking in an Industrial Setting", International Conference on Computer-Aided Verification (CAV), 2001.]]
[4]
R.Fraer, G.Kamhi, B.Ziv, M.Vardi, L.Fix, "Efficient Reachability Computation Both for Verification and Falsification", Proceedings of International Conference on Computer-Aided Design, (CAV'00).]]
[5]
S. Hazelhurst and C-J Seger, "Symbolic trajectory evaluation." In T. Kropf, editor, Formal Hardware Verification, chapter 1, pagers 3--78. Springer Verlag; New York, 1997.]]
[6]
R. Kaivola and K. Kohatsu, "Proof Engineering in the Large: Formal Verification of Pentium 4 FP Divider", CHARM 2001.]]
[7]
N. Narasimhan and R. Kaivola, "Verification of Pentium 4 Multiplier with Symbolic Simulation & Theorem Proving", DATE 2001.]]
[8]
J. O'Leary, S. Zhao, R. Gerth, and C.-J. H. Seger, "Formally Verifying IEEE Compliance of Floating-Point Hardware <http://developer.intel.com/technology/itj/q11999/articles/art_5.htm>", Intel Technology Journal, Q1 1999.]]
[9]
C.-J. H. Seger and R. E. Bryant, "Symbolic trajectory evaluation", Formal Methods in System Design, 1994.]]
[10]
J. Yang and A. Goel, "GSTE through a case study", International Conference on Computer-Aided Design ICCAD, 2002.]]
[11]
J. Yang and C.-J. H. Seger, "Introduction to Generalized Symbolic Trajectory Evaluation", International Conference on Computer Design (ICCD), 2001. A revised version will appear in IEEE Transactions on VLSI.]]
[12]
J. Yang and C.-J. H. Seger, "Generalized Symbolic Trajectory Evaluation: Abstraction in action", Fourth International Symposium on Formal Methods in Computer-Aided Design (FMCAD), 2002.]]

Cited By

View all
  • (2014)Introduction to Assertion-Based Formal VerificationSVA: The Power of Assertions in SystemVerilog10.1007/978-3-319-07139-8_20(453-466)Online publication date: 8-Jul-2014
  • (2013)Counterexample Ranking Using Mined InvariantsIEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems10.1109/TCAD.2013.227662732:12(1978-1991)Online publication date: 1-Dec-2013
  • (2012)Formal methods for ranking counterexamples through assumption miningProceedings of the Conference on Design, Automation and Test in Europe10.5555/2492708.2492937(911-916)Online publication date: 12-Mar-2012
  • Show More Cited By

Index Terms

  1. High level formal verification of next-generation microprocessors

    Recommendations

    Comments

    Information & Contributors

    Information

    Published In

    cover image ACM Conferences
    DAC '03: Proceedings of the 40th annual Design Automation Conference
    June 2003
    1014 pages
    ISBN:1581136889
    DOI:10.1145/775832
    Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

    Sponsors

    Publisher

    Association for Computing Machinery

    New York, NY, United States

    Publication History

    Published: 02 June 2003

    Permissions

    Request permissions for this article.

    Check for updates

    Author Tag

    1. formal property verification

    Qualifiers

    • Article

    Conference

    DAC03
    Sponsor:

    Acceptance Rates

    DAC '03 Paper Acceptance Rate 152 of 628 submissions, 24%;
    Overall Acceptance Rate 1,770 of 5,499 submissions, 32%

    Upcoming Conference

    DAC '25
    62nd ACM/IEEE Design Automation Conference
    June 22 - 26, 2025
    San Francisco , CA , USA

    Contributors

    Other Metrics

    Bibliometrics & Citations

    Bibliometrics

    Article Metrics

    • Downloads (Last 12 months)6
    • Downloads (Last 6 weeks)0
    Reflects downloads up to 12 Sep 2024

    Other Metrics

    Citations

    Cited By

    View all
    • (2014)Introduction to Assertion-Based Formal VerificationSVA: The Power of Assertions in SystemVerilog10.1007/978-3-319-07139-8_20(453-466)Online publication date: 8-Jul-2014
    • (2013)Counterexample Ranking Using Mined InvariantsIEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems10.1109/TCAD.2013.227662732:12(1978-1991)Online publication date: 1-Dec-2013
    • (2012)Formal methods for ranking counterexamples through assumption miningProceedings of the Conference on Design, Automation and Test in Europe10.5555/2492708.2492937(911-916)Online publication date: 12-Mar-2012
    • (2012)Formal methods for ranking counterexamples through assumption mining2012 Design, Automation & Test in Europe Conference & Exhibition (DATE)10.1109/DATE.2012.6176627(911-916)Online publication date: Mar-2012
    • (2012)IntroductionSystem-Level Validation10.1007/978-1-4614-1359-2_1(1-17)Online publication date: 25-Sep-2012
    • (2011)NeVerAnnals of Mathematics and Artificial Intelligence10.1007/s10472-011-9243-062:3-4(403-425)Online publication date: 1-Jul-2011
    • (2009)A Faithful Semantics for Generalised Symbolic Trajectory EvaluationLogical Methods in Computer Science10.2168/LMCS-5(2:1)20095:2Online publication date: 8-Apr-2009
    • (2009)Assume-guarantee validation for STE properties within an SVA environment2009 Formal Methods in Computer-Aided Design10.1109/FMCAD.2009.5351133(108-115)Online publication date: Nov-2009
    • (2008)on the design of a formal debugger for system architectureProceedings of the 12th WSEAS international conference on Circuits10.5555/1576429.1576511(462-467)Online publication date: 22-Jul-2008
    • (2008)Pre-RTL formal verificationProceedings of the 45th annual Design Automation Conference10.1145/1391469.1391675(806-811)Online publication date: 8-Jun-2008
    • Show More Cited By

    View Options

    Get Access

    Login options

    View options

    PDF

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader

    Media

    Figures

    Other

    Tables

    Share

    Share

    Share this Publication link

    Share on social media