A survey on assertion-based hardware verification
Hardware verification of modern electronic systems has been identified as a major
bottleneck due to the increasing complexity and time-to-market constraints. One of the major …
bottleneck due to the increasing complexity and time-to-market constraints. One of the major …
A framework for evaluating the effect of view angle, clothing and carrying condition on gait recognition
Gait recognition has gained increasing interest from researchers, but there is still no
standard evaluation method to compare the performance of different gait recognition …
standard evaluation method to compare the performance of different gait recognition …
Experience of data analytics in EDA and test—principles, promises, and challenges
LC Wang - IEEE Transactions on Computer-Aided Design of …, 2016 - ieeexplore.ieee.org
Applying modern data mining in electronic design automation and test has become an area
of growing interest in recent years. This paper reviews some of the recent developments in …
of growing interest in recent years. This paper reviews some of the recent developments in …
(Security) assertions by large language models
The security of computer systems typically relies on a hardware root of trust. As
vulnerabilities in hardware can have severe implications on a system, there is a need for …
vulnerabilities in hardware can have severe implications on a system, there is a need for …
Automated generation of security assertions for rtl models
System-on-Chip (SoC) security is vital in designing trustworthy systems. Detecting and fixing
a vulnerability in the early stages is easier and cost-effective. Assertion-based verification is …
a vulnerability in the early stages is easier and cost-effective. Assertion-based verification is …
Mining hardware assertions with guidance from static analysis
S Hertz, D Sheridan… - IEEE Transactions on …, 2013 - ieeexplore.ieee.org
We present GoldMine, a methodology for generating assertions automatically in hardware.
Our method involves a combination of data mining and static analysis of the register transfer …
Our method involves a combination of data mining and static analysis of the register transfer …
Harm: a hint-based assertion miner
This article presents HARM, a tool to generate linear temporal logic (LTL) assertions starting
from a set of user-defined hints and the simulation traces of the design under verification …
from a set of user-defined hints and the simulation traces of the design under verification …
Automatic extraction of assertions from execution traces of behavioural models
A Danese, T Ghasempouri… - 2015 Design, Automation …, 2015 - ieeexplore.ieee.org
Several approaches exist for specification mining of hardware designs. Most of them work at
RTL and they extract assertions in the form of temporal relations between Boolean variables …
RTL and they extract assertions in the form of temporal relations between Boolean variables …
Integration of data mining and static analysis for hardware design verification
(57) ABSTRACT A method of generating assertions for verification of a hard ware design
expressed at a register transfer level (RTL) includes running simulation traces through the …
expressed at a register transfer level (RTL) includes running simulation traces through the …
Efficient validation input generation in RTL by hybridized source code analysis
We present HYBRO, an automatic methodology to generate high coverage input vectors for
Register Transfer Level (RTL) designs based on branch-coverage directed approach …
Register Transfer Level (RTL) designs based on branch-coverage directed approach …