A survey on assertion-based hardware verification

H Witharana, Y Lyu, S Charles, P Mishra - ACM Computing Surveys …, 2022 - dl.acm.org
Hardware verification of modern electronic systems has been identified as a major
bottleneck due to the increasing complexity and time-to-market constraints. One of the major …

A framework for evaluating the effect of view angle, clothing and carrying condition on gait recognition

S Yu, D Tan, T Tan - 18th international conference on pattern …, 2006 - ieeexplore.ieee.org
Gait recognition has gained increasing interest from researchers, but there is still no
standard evaluation method to compare the performance of different gait recognition …

Experience of data analytics in EDA and test—principles, promises, and challenges

LC Wang - IEEE Transactions on Computer-Aided Design of …, 2016 - ieeexplore.ieee.org
Applying modern data mining in electronic design automation and test has become an area
of growing interest in recent years. This paper reviews some of the recent developments in …

(Security) assertions by large language models

R Kande, H Pearce, B Tan… - IEEE Transactions …, 2024 - ieeexplore.ieee.org
The security of computer systems typically relies on a hardware root of trust. As
vulnerabilities in hardware can have severe implications on a system, there is a need for …

Automated generation of security assertions for rtl models

H Witharana, A Jayasena, A Whigham… - ACM Journal on …, 2023 - dl.acm.org
System-on-Chip (SoC) security is vital in designing trustworthy systems. Detecting and fixing
a vulnerability in the early stages is easier and cost-effective. Assertion-based verification is …

Mining hardware assertions with guidance from static analysis

S Hertz, D Sheridan… - IEEE Transactions on …, 2013 - ieeexplore.ieee.org
We present GoldMine, a methodology for generating assertions automatically in hardware.
Our method involves a combination of data mining and static analysis of the register transfer …

Harm: a hint-based assertion miner

S Germiniani, G Pravadelli - IEEE Transactions on Computer …, 2022 - ieeexplore.ieee.org
This article presents HARM, a tool to generate linear temporal logic (LTL) assertions starting
from a set of user-defined hints and the simulation traces of the design under verification …

Automatic extraction of assertions from execution traces of behavioural models

A Danese, T Ghasempouri… - 2015 Design, Automation …, 2015 - ieeexplore.ieee.org
Several approaches exist for specification mining of hardware designs. Most of them work at
RTL and they extract assertions in the form of temporal relations between Boolean variables …

Efficient validation input generation in RTL by hybridized source code analysis

L Liu, S Vasudevan - 2011 Design, Automation & Test in …, 2011 - ieeexplore.ieee.org
We present HYBRO, an automatic methodology to generate high coverage input vectors for
Register Transfer Level (RTL) designs based on branch-coverage directed approach …