A survey on assertion-based hardware verification

H Witharana, Y Lyu, S Charles, P Mishra - ACM Computing Surveys …, 2022 - dl.acm.org
Hardware verification of modern electronic systems has been identified as a major
bottleneck due to the increasing complexity and time-to-market constraints. One of the major …

Mining hardware assertions with guidance from static analysis

S Hertz, D Sheridan… - IEEE Transactions on …, 2013 - ieeexplore.ieee.org
We present GoldMine, a methodology for generating assertions automatically in hardware.
Our method involves a combination of data mining and static analysis of the register transfer …

Automatic extraction of assertions from execution traces of behavioural models

A Danese, T Ghasempouri… - 2015 Design, Automation …, 2015 - ieeexplore.ieee.org
Several approaches exist for specification mining of hardware designs. Most of them work at
RTL and they extract assertions in the form of temporal relations between Boolean variables …

Survey of machine learning for software-assisted hardware design verification: Past, present, and prospect

N Wu, Y Li, H Yang, H Chen, S Dai, C Hao… - ACM Transactions on …, 2024 - dl.acm.org
With the ever-increasing hardware design complexity comes the realization that efforts
required for hardware verification increase at an even faster rate. Driven by the push from …

Harm: a hint-based assertion miner

S Germiniani, G Pravadelli - IEEE Transactions on Computer …, 2022 - ieeexplore.ieee.org
This article presents HARM, a tool to generate linear temporal logic (LTL) assertions starting
from a set of user-defined hints and the simulation traces of the design under verification …

Survey on machine learning algorithms enhancing the functional verification process

KA Ismail, MAAE Ghany - Electronics, 2021 - mdpi.com
The continuing increase in functional requirements of modern hardware designs means the
traditional functional verification process becomes inefficient in meeting the time-to-market …

Isadora: Automated information flow property generation for hardware designs

C Deutschbein, A Meza, F Restuccia… - Proceedings of the 5th …, 2021 - dl.acm.org
Isadora is a methodology for creating information flow specifications of hardware designs.
The methodology combines information flow tracking and specification mining to produce a …

Isadora: automated information-flow property generation for hardware security verification

C Deutschbein, A Meza, F Restuccia, R Kastner… - Journal of Cryptographic …, 2023 - Springer
Isadora is a specification mining tool for creating information-flow properties for hardware.
Isadora combines hardware information-flow tracking and specification mining to produce …

[PDF][PDF] Machine-guided solution to mathematical word problems

B Amnueypornsakul, S Bhat - Proceedings of the 28th Pacific Asia …, 2014 - aclanthology.org
Mathematical word problems (MWP) test critical aspects of reading comprehension in
conjunction with generating a solution that agrees with the “story” in the problem. In this …

Mining security critical linear temporal logic specifications for processors

C Deutschbein, C Sturton - 2018 19th International Workshop …, 2018 - ieeexplore.ieee.org
This paper presents UNDINE, a tool to automatically generate security critical Linear
Temporal Logic (LTL) properties of processor architectures. UNDINE handles complex …