Export Citations
Save this search
Please login to be able to save your searches and receive alerts for new content matching your search criteria.
- research-articleOctober 2024JUST ACCEPTED
DeLoSo: Detecting Logic Synthesis Optimization Faults Based on Configuration Diversity
ACM Transactions on Design Automation of Electronic Systems (TODAES), Just Accepted https://doi.org/10.1145/3701232Logic synthesis tools are the core components of digital circuit design, which convert programs written in hardware description languages into gate-level netlists, and optimize the netlists. However, the netlist optimization is complex, with numerous ...
- research-articleOctober 2024
Assertion-Based Validation using Clustering and Dynamic Refinement of Hardware Checkers
ACM Transactions on Design Automation of Electronic Systems (TODAES), Volume 29, Issue 6Article No.: 104, Pages 1–22https://doi.org/10.1145/3696108Post-silicon validation is a vital step in System-on-Chip (SoC) design cycle. A major challenge in post-silicon validation is the limited observability of internal signal states using trace buffers. Hardware assertions are promising to improve ...
- research-articleAugust 2024
Automatic Correction of Arithmetic Circuits in the Presence of Multiple Bugs by Groebner Basis Modification
ACM Transactions on Design Automation of Electronic Systems (TODAES), Volume 29, Issue 5Article No.: 76, Pages 1–19https://doi.org/10.1145/3672559One promising approach to verify large arithmetic circuits is making use of Symbolic Computer Algebra (SCA), where the circuit and the specification are translated to a set of polynomials, and the verification is performed by the ideal membership testing. ...
- surveyJune 2024
Survey of Machine Learning for Software-assisted Hardware Design Verification: Past, Present, and Prospect
ACM Transactions on Design Automation of Electronic Systems (TODAES), Volume 29, Issue 4Article No.: 59, Pages 1–42https://doi.org/10.1145/3661308With the ever-increasing hardware design complexity comes the realization that efforts required for hardware verification increase at an even faster rate. Driven by the push from the desired verification productivity boost and the pull from leap-ahead ...
- research-articleMay 2024
Incremental Concolic Testing of Register-Transfer Level Designs
ACM Transactions on Design Automation of Electronic Systems (TODAES), Volume 29, Issue 3Article No.: 55, Pages 1–23https://doi.org/10.1145/3655621Concolic testing is a scalable solution for automated generation of directed tests for validation of hardware designs. Unfortunately, concolic testing fails to cover complex corner cases such as hard-to-activate branches. In this article, we propose an ...
-
- research-articleFebruary 2024
Application-level Validation of Accelerator Designs Using a Formal Software/Hardware Interface
- Bo-Yuan Huang,
- Steven Lyubomirsky,
- Yi Li,
- Mike He,
- Gus Henry Smith,
- Thierry Tambe,
- Akash Gaonkar,
- Vishal Canumalla,
- Andrew Cheung,
- Gu-Yeon Wei,
- Aarti Gupta,
- Zachary Tatlock,
- Sharad Malik
ACM Transactions on Design Automation of Electronic Systems (TODAES), Volume 29, Issue 2Article No.: 35, Pages 1–25https://doi.org/10.1145/3639051Ideally, accelerator development should be as easy as software development. Several recent design languages/tools are working toward this goal, but actually testing early designs on real applications end-to-end remains prohibitively difficult due to the ...
- research-articleOctober 2023
SoC Protocol Implementation Verification Using Instruction-Level Abstraction Specifications
ACM Transactions on Design Automation of Electronic Systems (TODAES), Volume 28, Issue 6Article No.: 89, Pages 1–24https://doi.org/10.1145/3610292In modern systems-on-chips, several hardware protocols are used for communication and interaction among different modules. These protocols are complex and need to be implemented correctly for correct operation of the system-on-chip. Therefore, protocol ...
- research-articleSeptember 2023
A Brain-Inspired Hardware Architecture for Evolutionary Algorithms Based on Memristive Arrays
ACM Transactions on Design Automation of Electronic Systems (TODAES), Volume 28, Issue 5Article No.: 82, Pages 1–32https://doi.org/10.1145/3598421Brain-inspired computing takes inspiration from the brain to create energy-efficient hardware systems for information processing, capable of performing highly sophisticated tasks. Systems built with emerging electronics, such as memristive devices, can ...
- research-articleDecember 2022
CoVerPlan: A Comprehensive Verification Planning Framework Leveraging PSS Specifications
ACM Transactions on Design Automation of Electronic Systems (TODAES), Volume 28, Issue 1Article No.: 9, Pages 1–32https://doi.org/10.1145/3543175With increasing design complexity, the portability of tests across different designs and platforms becomes a key criterion for accelerating verification closure. The Portable Test and Stimulus Standard (PSS) is an emerging industry standard prepared by ...
- research-articleJuly 2020
Improving FPGA-Based Logic Emulation Systems through Machine Learning
ACM Transactions on Design Automation of Electronic Systems (TODAES), Volume 25, Issue 5Article No.: 46, Pages 1–20https://doi.org/10.1145/3399595We present a machine learning (ML) framework to improve the use of computing resources in the FPGA compilation step of a commercial FPGA-based logic emulation flow. Our ML models enable highly accurate predictability of the final place and route design ...
- research-articleMay 2020
SCRIPT: A CAD Framework for Power Side-channel Vulnerability Assessment Using Information Flow Tracking and Pattern Generation
ACM Transactions on Design Automation of Electronic Systems (TODAES), Volume 25, Issue 3Article No.: 26, Pages 1–27https://doi.org/10.1145/3383445Power side-channel attacks (SCAs) have been proven to be effective at extracting secret keys from hardware implementations of cryptographic algorithms. Ideally, the power side-channel leakage (PSCL) of hardware designs of a cryptographic algorithm ...
- research-articleJanuary 2020
LBNoC: Design of Low-latency Router Architecture with Lookahead Bypass for Network-on-Chip Using FPGA
ACM Transactions on Design Automation of Electronic Systems (TODAES), Volume 25, Issue 1Article No.: 9, Pages 1–26https://doi.org/10.1145/3365994An FPGA-based Network-on-Chip (NoC) using a low-latency router with a look-ahead bypass (LBNoC) is discussed in this article. The proposed design targets the optimized area with improved network performance. The techniques such as single-cycle router ...
- research-articleMarch 2019
A Cross-level Verification Methodology for Digital IPs Augmented with Embedded Timing Monitors
ACM Transactions on Design Automation of Electronic Systems (TODAES), Volume 24, Issue 3Article No.: 27, Pages 1–23https://doi.org/10.1145/3308565Smart systems are characterized by the integration in a single device of multi-domain subsystems of different technological domains, namely, analog, digital, discrete and power devices, MEMS, and power sources. Such challenges, emerging from the ...
- research-articleFebruary 2019
Formal Modeling and Verification of a Victim DRAM Cache
ACM Transactions on Design Automation of Electronic Systems (TODAES), Volume 24, Issue 2Article No.: 20, Pages 1–23https://doi.org/10.1145/3306491The emerging Die-stacking technology enables DRAM to be used as a cache to break the “Memory Wall” problem. Recent studies have proposed to use DRAM as a victim cache in both CPU and GPU memory hierarchies to improve performance. DRAM caches are large ...
- research-articleDecember 2018Best Paper
Instruction-Level Abstraction (ILA): A Uniform Specification for System-on-Chip (SoC) Verification
ACM Transactions on Design Automation of Electronic Systems (TODAES), Volume 24, Issue 1Article No.: 10, Pages 1–24https://doi.org/10.1145/3282444Modern Systems-on-Chip (SoC) designs are increasingly heterogeneous and contain specialized semi-programmable accelerators in addition to programmable processors. In contrast to the pre-accelerator era, when the ISA played an important role in ...
- short-paperNovember 2018
CASCA: A Design Automation Approach for Designing Hardware Countermeasures Against Side-Channel Attacks
ACM Transactions on Design Automation of Electronic Systems (TODAES), Volume 23, Issue 6Article No.: 69, Pages 1–17https://doi.org/10.1145/3241047Implementing a cryptographic circuit poses challenges not always acknowledged in the backing mathematical theory. One of them is the vulnerability against side-channel attacks. A side-channel attack is a procedure that uses information leaked by the ...
- research-articleAugust 2018
Guiding Formal Verification Orchestration Using Machine Learning Methods
ACM Transactions on Design Automation of Electronic Systems (TODAES), Volume 23, Issue 5Article No.: 62, Pages 1–33https://doi.org/10.1145/3224206Typical modern HW designs include many blocks associated with thousands of design properties. Having today's commercial formal verifiers utilize a complementary set of state-of-art formal algorithms is a key in enabling the formal verification tools to ...
- research-articleJuly 2017
Proof-Carrying Hardware via Inductive Invariants
ACM Transactions on Design Automation of Electronic Systems (TODAES), Volume 22, Issue 4Article No.: 61, Pages 1–23https://doi.org/10.1145/3054743Proof-carrying hardware (PCH) is a principle for achieving safety for dynamically reconfigurable hardware systems. The producer of a hardware module spends huge effort when creating a proof for a safety policy. The proof is then transferred as a ...
- research-articleDecember 2016
Scalable SMT-Based Equivalence Checking of Nested Loop Pipelining in Behavioral Synthesis
ACM Transactions on Design Automation of Electronic Systems (TODAES), Volume 22, Issue 2Article No.: 22, Pages 1–22https://doi.org/10.1145/2953879In this article, we present a novel methodology based on SMT-solvers to verify equality of a high-level described specification and a pipelined RTL implementation produced by a high-level synthesis tool. The complex transformations existing in the high-...
- research-articleJanuary 2016
Auxiliary Variables in Temporal Specifications: Semantic and Practical Analysis for System-Level Requirements
ACM Transactions on Design Automation of Electronic Systems (TODAES), Volume 21, Issue 2Article No.: 20, Pages 1–29https://doi.org/10.1145/2811260Assertion-based verification (ABV) for IP blocks given as synchronous RTL (register transfer level) descriptions has now widely gained acceptance. The challenge addressed here is ABV for systems on chip (SoC) modeled at the system level in SystemC TLM (...