Computing Reviews
Today's Issue Hot Topics Search Browse Recommended My Account Log In
Review Help
Search
Digital system verification : a combined formal methods and simulation framework
Li L., Thornton M., Morgan and Claypool Publishers, San Rafael, CA, 2010. 100 pp. Type: Book (978-1-608451-78-4)
Date Reviewed: Oct 24 2011

Digital systems verification is a very important topic of research and industrial practice. Anecdotally, about 70 percent of silicon design efforts today go into validation/verification.

Formal verification has made some inroads into industrial verification teams after the Pentium floating-point division bug fiasco, and subsequent demonstration of formal verification of the floating-point division implementation. At the moment, no top-of-the-line microprocessor design team lets a floating-point unit go without formal verification. However, control-oriented designs with large data paths pose a challenge. Simulation-based verification does not have adequate coverage; hence, it needs to be enhanced by some formal modeling and techniques, whether for more coverage-driven test generation, or for formal verification.

This book is a very short overview of formal and simulation-based verification. This vast topic could easily cover volumes, and books of about 900 pages exist that cover only model checking. There are books on discrete-event simulation that are equally large. One cannot expect, then, to learn a lot from a 79-page overview-type discourse on the two topics and their combination.

Consequently, the authors intend for this book to familiarize engineers and engineering managers--who might be completely new to pre-silicon validation and its terminologies--with the topic, and to briefly outline the most prevalent concepts. If I were a manager just taking over responsibility of a validation team from a past design-oriented job, I might read this book in a few hours to become familiar with the concepts.

The book covers a good range of concepts. It discusses behavior-driven development (BDD), satisfiability (SAT) and SAT solvers, state machines, pre/post image computation and combining BDD and SAT for state space “tunneling” (the term glorified by Jasper Design Automation), and genetic algorithm methods, giving each no more than one to two pages. The book then covers simulation techniques, briefly discussing compiled versus event-driven simulation, pros and cons, and simulation with more than two-valued signal logic. Finally, the book discusses combining simulation with formal verification, emphasizing symbolic simulation.

The authors seem to have collected a set of freely available tools--including Verification Interacting with Synthesis (VIS); Symbolic Trajectory Evaluation (STE); Speed5 (a five-valued simulation engine); and the Southern Methodist University Equivalence Checker (SMU-EQ)--and created a combination methodology and environment where they are available for design validation engineers to use in combination to achieve their goals. Industry validation managers such as Intel’s Bob Bentley have, in various invited talks, actually emphasized numerous times the need for combining all of these methods; hence, this is a useful chapter for the heretofore uninitiated engineer.

In summary, the book is cursory and is not a good source for teaching material or for in-depth learning of techniques. However, reading this book will give the uninitiated a quick overview to help them quickly grasp the big picture; busy professionals could read it in a few hours.

Reviewer:  Sandeep Shukla Review #: CR139521 (1204-0340)
Bookmark and Share
  Reviewer Selected
 
 
Verification (D.4.6 ... )
 
 
Formal Methods (D.2.4 ... )
 
 
Model Checking (D.2.4 ... )
 
 
Simulation (D.4.8 ... )
 
Would you recommend this review?
yes
no
Other reviews under "Verification": Date
Muse--a computer assisted verification system
Halpern J., Owre S., Proctor N., Wilson W. IEEE Transactions on Software Engineering SE-13(2): 151-156, 1987. Type: Article
Dec 1 1987
The Specification and Modeling of Computer Security
McLean J. Computer 23(1): 9-16, 1990. Type: Article
Oct 1 1990
 Formal verification of information flow security for a simple ARM-based separation kernel
Dam M., Guanciale R., Khakpour N., Nemati H., Schwarz O.  CCS 2013 (Proceedings of the 2013 ACM SIGSAC Conference on Computer & Communications Security, Berlin, Germany, Nov 4-8, 2013)223-234, 2013. Type: Proceedings
Jan 27 2014
more...

E-Mail This Printer-Friendly
Send Your Comments
Contact Us
Reproduction in whole or in part without permission is prohibited.   Copyright 1999-2024 ThinkLoud®
Terms of Use
| Privacy Policy