Verifying Heterogeneous Systems

Processors present engineers with some of the biggest challenges faced in verification. For example, complexity in the design to extract maximum performance per watt of power, and multiple dependencies between instructions in one or multiple instruction streams, processor resources, and memory accesses create a verification space that is impossible to cover using simulation, let alone identify the key verification. This challenge used to be in the hands of a few companies with large teams and dedicated resources built on a commercial model, allowing them to invest heavily in verification. This is not necessarily the case for RISC-V developers.

Formal verification has always offered the potential to cover large verification spaces completely and therefore seems to be a natural choice for processor verification. This full afternoon DVClub will explore that potential In more detail offering real case studies, practical solutions, and suggestions that can be followed up back in the office.

Event at a Glance:

  • Thu 4 Dec 2025
  • 12:00 PM – 6:00 PM GMT
  • University of Cambridge 15 J.J. Thomson Avenue, Cambridge, CB3 0FD

Agenda (GMT)

TimeSession DescriptionPresentationsVideos
12.00Arrival, registration, networking, light refreshments
13.00MileSan: Detecting Exploitable Microarchitectural Leakage via Differential Hardware-Software Taint Tracking by Tobias Kovats, ETH Zurich
13:15Pathfinder: Constructing Cycle-accurate Taint Graphs for Analyzing Information Flow Traces by Katharina Ceesay-Seitz, ETH Zurich
13:30Encarsia: Evaluating CPU Fuzzers via Automatic Bug Injection by Matej Bölcskei, ETH Zurich
13:45Crossing the Model Checking/Theorem Proving Gap for Ibex Correctness by Louis-Emile Ploix, lowRISC CIC
14:15Break with refreshments/networking
14:45Taming formal to define verification Quality by Surinder Sood, Arm
15:15Processor Datapath Verification Made Easy with Jasper C2RTL by Barbara Jobstmann, Cadence Design System
16:45Speaker 7 – TBA
17:15Refreshments & Pizza/networking