Digital Version of Green's Theorem and its Application to The Coverage Problem in Formal Verification
نویسندگان
چکیده
We present a novel scheme to the coverage problem, introducing a quantitative way to estimate the interaction between a block an its environment. This is achieved by setting a discrete version of Green’s Theorem, specially adapted for Model Checking based verification of integrated circuits. This method is best suited for the coverage problem since it enables one to quantify the incompleteness or, on the other hand, the redundancy of a set of rules, describing the model under verification. Moreover this can be done continuously throughout the verification process, thus enabling the user to pinpoint the stages at which incompleteness/redundancy occurs. Although the method is presented locally on a small hardware example, we additionally show its possibility to provide precise coverage estimation also for large scale systems. We compare this method to others by checking it on the same test-cases.
منابع مشابه
A Digital Version of Green’s Theorem and Its Application to the Coverage Problem in Formal Verification
We present a novel scheme to the coverage problem, introducing a quantitative way to estimate the interaction between a block an its environment. This is achieved by setting a discrete version of Green’s Theorem, specially adapted for Model Checking based verification of integrated circuits. This method is best suited for the coverage problem since it enables one to quantify the incompleteness ...
متن کاملA short introduction to two approaches in formal verification of security protocols: model checking and theorem proving
In this paper, we shortly review two formal approaches in verification of security protocols; model checking and theorem proving. Model checking is based on studying the behavior of protocols via generating all different behaviors of a protocol and checking whether the desired goals are satisfied in all instances or not. We investigate Scyther operational semantics as n example of this...
متن کاملA model for specification, composition and verification of access control policies and its application to web services
Despite significant advances in the access control domain, requirements of new computational environments like web services still raise new challenges. Lack of appropriate method for specification of access control policies (ACPs), composition, verification and analysis of them have all made the access control in the composition of web services a complicated problem. In this paper, a new indepe...
متن کاملFormal Verificaction of the ADSP-2100 Processor Using the HOL Theorem Prover
In this technical report, we present the application of formal verification to digital signal processors of the family ADSP-2100 using the HOL (Higher Order Logic) theorem prover. To solve the problem of complexity related to the big number of parameters of the processor, we used a structured method based on our knowledge about this processors family. In this method, we worked on the units of t...
متن کاملDesign and formal verification of DZMBE+
In this paper, a new broadcast encryption scheme is presented based on threshold secret sharing and secure multiparty computation. This scheme is maintained to be dynamic in that a broadcaster can broadcast a message to any of the dynamic groups of users in the system and it is also fair in the sense that no cheater is able to gain an unfair advantage over other users. Another important feature...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید
ثبت ناماگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید
ورودعنوان ژورنال:
- CoRR
دوره cs.SC/0309008 شماره
صفحات -
تاریخ انتشار 2003