Abstract. We describe the techniques we have used to search for bugs in the memory subsystem of a next-generation Alpha microprocessor. Our approach is based on two model checking methods that use satisfiability (SAT) solvers rather than binary decision diagrams (BDDs). We show that the first method, bounded model checking, can reduce the verification runtime from days to minutes on real, deep, microprocessor bugs when compared to a state-of-the-art BDD-based model checker. We also present experimental results showing that the second method, a version of symbolic trajectory evaluation that uses SAT-solvers instead of BDDs, can find as deep bugs, with even shorter runtimes. The tradeoff is that we have to spend more time writing specificatio...
Traditional fault-tolerant multi-threading architectures provide good fault tolerance by re-executin...
Concurrent systems are ubiquitous, ranging from multi-core processors to large-scale distributed sys...
In this paper, we describe a fast and convenient verification method-ology for microprocessor using ...
The usefulness of Bounded Model Checking (BMC) based on propositional satisfiability (SAT) methods f...
With increasing design complexity, verification becomes a more and more important aspect of the desi...
Designs of hardware and software systems have grown in complexity to meet the demand for improved pe...
Complex hardware systems become more and more ubiquitous in mission critical applications such as mi...
In [1] Bounded Model Checking with the aid of satisfiability solving (SAT) was introduced as an alt...
Verifying the memory subsystem in a modern shared-memory multiprocessor is a big challenge. Optimize...
We compare SAT-checkers and decision diagrams on the evaluation of Boolean formulas produced in the...
In this paper, we study the application of propositional deci-sion procedures in hardware verificati...
Digital's Alpha-based DECchip 21 164 processor was verified extensively prior to fabrication of...
Finding the cause of a bug can be one of the most time-consuming activities in design verification. ...
AbstractWe compare SAT-checkers and decision diagrams on the evaluation of Boolean formulae produced...
One of the most succesfull approach to automatic soft-ware verification is SAT based Bounded Model C...
Traditional fault-tolerant multi-threading architectures provide good fault tolerance by re-executin...
Concurrent systems are ubiquitous, ranging from multi-core processors to large-scale distributed sys...
In this paper, we describe a fast and convenient verification method-ology for microprocessor using ...
The usefulness of Bounded Model Checking (BMC) based on propositional satisfiability (SAT) methods f...
With increasing design complexity, verification becomes a more and more important aspect of the desi...
Designs of hardware and software systems have grown in complexity to meet the demand for improved pe...
Complex hardware systems become more and more ubiquitous in mission critical applications such as mi...
In [1] Bounded Model Checking with the aid of satisfiability solving (SAT) was introduced as an alt...
Verifying the memory subsystem in a modern shared-memory multiprocessor is a big challenge. Optimize...
We compare SAT-checkers and decision diagrams on the evaluation of Boolean formulas produced in the...
In this paper, we study the application of propositional deci-sion procedures in hardware verificati...
Digital's Alpha-based DECchip 21 164 processor was verified extensively prior to fabrication of...
Finding the cause of a bug can be one of the most time-consuming activities in design verification. ...
AbstractWe compare SAT-checkers and decision diagrams on the evaluation of Boolean formulae produced...
One of the most succesfull approach to automatic soft-ware verification is SAT based Bounded Model C...
Traditional fault-tolerant multi-threading architectures provide good fault tolerance by re-executin...
Concurrent systems are ubiquitous, ranging from multi-core processors to large-scale distributed sys...
In this paper, we describe a fast and convenient verification method-ology for microprocessor using ...