Verifying Heterogeneous Systems
Processors present engineers with some of the biggest challenges faced in verification. For example, complexity in the design to extract maximum performance per watt of power, and multiple dependencies between instructions in one or multiple instruction streams, processor resources, and memory accesses create a verification space that is impossible to cover using simulation, let alone identify the key verification. This challenge used to be in the hands of a few companies with large teams and dedicated resources built on a commercial model, allowing them to invest heavily in verification. This is not necessarily the case for RISC-V developers.
Formal verification has always offered the potential to cover large verification spaces completely and therefore seems to be a natural choice for processor verification. This full afternoon DVClub will explore that potential In more detail offering real case studies, practical solutions, and suggestions that can be followed up back in the office.
Agenda (GMT)
| Time | Session Description | Presentations | Videos |
|---|---|---|---|
| 12.00 | Arrival, registration, networking, light refreshments | ||
| 13.00 | MileSan: Detecting Exploitable Microarchitectural Leakage via Differential Hardware-Software Taint Tracking by Tobias Kovats, ETH Zurich | ||
| 13:15 | Pathfinder: Constructing Cycle-accurate Taint Graphs for Analyzing Information Flow Traces by Katharina Ceesay-Seitz, ETH Zurich | ||
| 13:30 | Encarsia: Evaluating CPU Fuzzers via Automatic Bug Injection by Matej Bölcskei, ETH Zurich | ||
| 13:45 | Crossing the Model Checking/Theorem Proving Gap for Ibex Correctness by Louis-Emile Ploix, lowRISC CIC | ||
| 14:15 | Break with refreshments/networking | ||
| 14:45 | Taming formal to define verification Quality by Surinder Sood, Arm | ||
| 15:15 | Processor Datapath Verification Made Easy with Jasper C2RTL by Barbara Jobstmann, Cadence Design System | ||
| 16:45 | Speaker 7 – TBA | ||
| 17:15 | Refreshments & Pizza/networking |
