Skip to main content

An Introduction to Symbolic Trajectory Evaluation

  • Conference paper
  • 827 Accesses

Part of the book series: Lecture Notes in Computer Science ((LNPSE,volume 3965))

Abstract

The rapid growth in hardware complexity has lead to a need for formal verification of hardware designs to prevent bugs from entering the final silicon. Model-checking [3] is by far the most popular technique for automatically verifying properties of designs. In model-checking, a model of a design is exhaustively checked against a property, often specified in some temporal logic. Today, all major hardware companies use model-checkers in order to reduce the number of bugs in their designs.

Most model-checking techniques are state-based. This means that some kind of representation of all reachable states of the design is used when checking that the temporal properties are fulfilled. One popular way of representing the set of reachable states of a design is by using Binary Decision Diagrams (BDDs) [2]. A BDD is a canonical way of representing a boolean formula over a fixed set of variables. When the set of reachable states of a design can be calculated using BDDs, state-based model-checking techniques work very well. However, for some types of designs, it is very hard to represent all reachable states by BDDs; they grow exponentially in size and lead to a BDD blow-up.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Bjesse, P., Leonard, T., Mokkedem, A.: Finding bugs in an alpha microprocessor using satisfiability solvers. In: Berry, G., Comon, H., Finkel, A. (eds.) CAV 2001. LNCS, vol. 2102, p. 454. Springer, Heidelberg (2001)

    Chapter  Google Scholar 

  2. Bryant, R.E.: Graph-based algorithms for boolean function manipulation. IEEE Trans. Comput. 35(8), 677–691 (1986)

    Article  MATH  Google Scholar 

  3. Clarke, E.M., Grumberg, O., Peled, D.A.: Model Checking. MIT Press, Cambridge (2001)

    Book  Google Scholar 

  4. FORTE, http://www.intel.com/software/products/opensource/tools1/verification

  5. Harrison, J.: Marktoberdorf 2003 Page (2003), http://www.cl.cam.ac.uk/users/jrh/marktoberdorf

  6. Melham, T.F., Jones, R.B.: Abstraction by symbolic indexing transformations. In: Aagaard, M.D., O’Leary, J.W. (eds.) FMCAD 2002. LNCS, vol. 2517, pp. 1–18. Springer, Heidelberg (2002)

    Chapter  Google Scholar 

  7. Pandey, M., Raimi, R., Bryant, R.E., Abadir, M.S.: Formal verification of content addressable memories using symbolic trajectory evaluation. In: DAC 1997 (1997)

    Google Scholar 

  8. Roorda, J.-W.: Symbolic trajectory evaluation using a satisfiability solver. Licentiate thesis, Computing Science, Chalmers University of Technology (2005)

    Google Scholar 

  9. Roorda, J.-W., Claessen, K.: A new SAT-based algorithm for symbolic trajectory evaluation. In: Borrione, D., Paul, W. (eds.) CHARME 2005. LNCS, vol. 3725, pp. 238–253. Springer, Heidelberg (2005)

    Chapter  Google Scholar 

  10. Roorda, J.-W., Claessen, K.: Explaining Symbolic Trajectory Evaluation by Giving It a Faithful Semantics. In: Grigoriev, D., Harrison, J., Hirsch, E.A. (eds.) CSR 2006. LNCS, vol. 3967, pp. 555–566. Springer, Heidelberg (2006)

    Chapter  Google Scholar 

  11. Roorda, J.-W., Claessen, K.: SAT-based assistance in abstraction refinement for Symbolic Trajectory Evaluation. Technical Report 2006:5, Chalmers University of Technology, Göteborg, Sweden (2006)

    Google Scholar 

  12. Seger, C., Jones, R., O’Leary, J., Melham, T., Aagaard, M., Barrett, C., Syme, D.: An industrially effective environment for hardware verification. IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems 24(9), 1381–1405 (2005)

    Article  Google Scholar 

  13. Seger, C.-J.H., Bryant, R.E.: Formal verification by symbolic evaluation of partially-ordered trajectories. Formal Methods in System Design 6(2) (1995)

    Google Scholar 

  14. Yang, J., Gil, R., Singerman, E.: satGSTE: Combining the abstraction of GSTE with the capacity of a SAT solver. In: Designing Correct Circuits (DCC 2004) (2004)

    Google Scholar 

  15. Yang, J., Goel, A.: GSTE through a case study. In: Proceedings of the 2002 IEEE/ACM international conference on Computer-aided design, pp. 534–541. ACM Press, New York (2002)

    Google Scholar 

  16. Yang, J., Seger, C.-J.H.: Introduction to generalized symbolic trajectory evaluation. In: IEEE International Conference on Computer Design: VLSI in Computers & Processors (ICCD 2001), Washington - Brussels - Tokyo, pp. 360–367. IEEE, Los Alamitos (2001)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2006 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Claessen, K., Roorda, JW. (2006). An Introduction to Symbolic Trajectory Evaluation. In: Bernardo, M., Cimatti, A. (eds) Formal Methods for Hardware Verification. SFM 2006. Lecture Notes in Computer Science, vol 3965. Springer, Berlin, Heidelberg. https://doi.org/10.1007/11757283_3

Download citation

  • DOI: https://doi.org/10.1007/11757283_3

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-34304-2

  • Online ISBN: 978-3-540-34305-9

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics