Rewriting rules and Positive Equality [4] are combined in an automatic way in order to formally verify out-of-order processors that have a Reorder Buffer, and can issue/retire multiple instructions per clock cycle. Only register-register instructions are implemented, and can be executed out-of-order, as soon as their data operands can be either read from the Register File, or forwarded as results of instructions ahead in program order in the Reorder Buffer. The verification is based on the Burch and Dill correctness criterion [6]. Rewriting rules are used to prove the correct execution of instructions that are initially in the Reorder Buffer, and to remove them from the correctness formula. Positive Equality is then employed to prove the co...
The Completion Functions Approach was proposed in [HSG98] as a systematic way to decompose the proof...
Abstract — In this paper, we propose a verification method for pipelined microprocessors with out-of...
Modern processors deploy a variety of weak memory models, which for efficiency reasons may (appear t...
We study the applicability of the logic of Positive Equality with Uninterpreted Functions (PEUF) [2]...
We study the applicability of the logic of Positive Equality with Uninterpreted Functions (PEUF) [2...
Superscalar processors can achieve increased performance by issuing instructions out-of-order from t...
Abstract. We study the problem of formally verifying shared memory multiprocessor executions against...
The complex and powerful out-of-order issue logic dismisses the repetitive nature of the code, unlik...
Abstract. Modern reorder buffers (ROBs) were conceived to improve processor performance by allowing ...
Current superscalar processors use a Reorder Buffer (ROB) to support speculation, precise exceptions...
We present a collection of ideas that allows the pipeline verification method pioneered by Burch an...
In using the logic of equality with unininterpreted functions to verify hardware systems, specific ...
rjonesOichips.intel.com Abstract. Several methods have recently been proposed for verifying processo...
We describe an efficient validity checker for the quantifier-free logic of equality with uninterpret...
In microprocessors, achieving an efficient utilization of the execution units is a key factor in imp...
The Completion Functions Approach was proposed in [HSG98] as a systematic way to decompose the proof...
Abstract — In this paper, we propose a verification method for pipelined microprocessors with out-of...
Modern processors deploy a variety of weak memory models, which for efficiency reasons may (appear t...
We study the applicability of the logic of Positive Equality with Uninterpreted Functions (PEUF) [2]...
We study the applicability of the logic of Positive Equality with Uninterpreted Functions (PEUF) [2...
Superscalar processors can achieve increased performance by issuing instructions out-of-order from t...
Abstract. We study the problem of formally verifying shared memory multiprocessor executions against...
The complex and powerful out-of-order issue logic dismisses the repetitive nature of the code, unlik...
Abstract. Modern reorder buffers (ROBs) were conceived to improve processor performance by allowing ...
Current superscalar processors use a Reorder Buffer (ROB) to support speculation, precise exceptions...
We present a collection of ideas that allows the pipeline verification method pioneered by Burch an...
In using the logic of equality with unininterpreted functions to verify hardware systems, specific ...
rjonesOichips.intel.com Abstract. Several methods have recently been proposed for verifying processo...
We describe an efficient validity checker for the quantifier-free logic of equality with uninterpret...
In microprocessors, achieving an efficient utilization of the execution units is a key factor in imp...
The Completion Functions Approach was proposed in [HSG98] as a systematic way to decompose the proof...
Abstract — In this paper, we propose a verification method for pipelined microprocessors with out-of...
Modern processors deploy a variety of weak memory models, which for efficiency reasons may (appear t...