期刊文献+

基于符号模拟和约束逻辑编程的RTL级Verilog谓词抽象方法 被引量:1

Predicate Abstraction of RT-Levei Verilog Using Symbolic Simulation and Constraint Logic Programming
下载PDF
导出
摘要 利用人工智能最新研究成果——约束逻辑编程对Verilog描述进行谓词抽象,并与目前基于SAT的方法进行了比较.首先通过符号模拟建立Verilog的形式化模型,然后结合要抽象的谓词,将谓词抽象问题转化为约束逻辑编程问题并进行求解.该方法的优点是在计算抽象系统时,不需要像基于SAT的方法那样将字级约束打散成位级约束,求解效率显著提高;提供了一个统一的框架用于描述各种约束.实验结果表明,与基于SAT的抽象技术相比,基于约束逻辑编程的抽象方法的求解速度有显著提高. Abstraction is one of the most effective ways to address state explosion problem in model checking, and predicate abstraction has been applied successfully to large software and now to hardware descriptions, such as Verilog. This paper evaluates the state-of-the-art AI techniques, constraint logic programming (CLP), to improve the performance of predicate abstraction of circuits, and compared it with the SAT-based predicate abstraction techniques. With CLP- based techniques, we can model various constraints in a unified framework; we can also model the word-level constraints without flattening them into bit-level ones as SAT-based method dose. Experimental results have showed the promising improvements on the performance of predicate abstraction of hardware designs.
出处 《计算机学报》 EI CSCD 北大核心 2007年第7期1138-1144,共7页 Chinese Journal of Computers
基金 本课题得到国家自然科学基金(60403048 60573173)资助
关键词 谓词抽象 Verilog约束逻辑编程 模型检验 符号模拟 predicate abstraction Verilog constraint logic programming model checking symbolic simulation
  • 相关文献

参考文献22

  • 1Joao Marques Silva.BLIF2CNF.sat.inesc-id.pt/~jpms/scripts/bin/blif2cnf.
  • 2Sun Microsystems.PicoJava technology.http://www.sun.com/microelectronics/communitysource/picojava,1999.
  • 3Clarke E,Grumberg O,Peled D.Model Checking.Cambridge,MA:MIT Press,1999
  • 4Graf S,Saidi H.Construction of abstract state graphs with PVS//Proceedings of the 9th International Conference on Computer Aided Verification (CAV'97).Haifa,Isreal,1997:72-83
  • 5Ball T,Cook B,Lahiri S K,Zhang Lin-Tao.Zapato:Automatic theorem proving for predicate abstraction refinement//Proceedings of the Computer Added Verificatoin (CAV'2004).Boston,MA,USA,2004:457-461
  • 6Detlefs D,Nelson G,Saxe J B.Simplify:A theorem prover for program checking.Journal of the ACM,2005,52 (3):365-473
  • 7Ball T,Rajamani S K.Boolean programs:A model and process for software analysis.Cambridge,UK:Microsoft Research,Technical Report 2000-14,2000
  • 8Flanagan C,Qadeer S.Predicate abstraction for software verification//Proceedings of the 29th ACM SIGPLAN-SIGACT Symposium on Principles of Programming Languages(POPL'02).Portland,Oregon,2002:191-202
  • 9Ball T,Majumdar R,Millstein T D,Rajamani S K.Automatic predicate abstraction of C programs//Proceedings of the ACM Conference on Programming Language Design and Implementation (PLDI'2001).Snowbird,Utah,USA,2001:203-213
  • 10Ball T,Rajamani S K.Automatically validating temporal safety properties of interfaces//Proceedings of the 8th International SPIN Workshop on Model Checking of Software(SPIN'2001).Toronto,Canada,2001:103-122

同被引文献19

  • 1沈昌祥,张焕国,冯登国,曹珍富,黄继武.信息安全综述[J].中国科学(E辑),2007,37(2):129-150. 被引量:358
  • 2Reith M, Niu Jian-wei, Winborough W. Apply Model Checking to Security Analysis in Trust Management[C]//lEEE 23rd International Conference on Data Engineering. 2007:734-743.
  • 3Sandhu R S. The Typed Access Matrix Model[C]//IEEE Symposium on Research in Security and Privacy. 1992:122-136.
  • 4Bertino E, Kan L R, Sandhu R, et al. Secure Knowledge Management..Confidentiality,Trust,and Privacy[J]. IEEE Transaction on Systems, Man, and Cybernetics, Part A, 2006,36(3) : 429-438.
  • 5Park J, Sandhu R. The UCONABC Usage Control Model [J]. ACM Transactions on Information and System Security,2004,7 (1) :128-174.
  • 6Zhang Xin-wen, Parisi-Presicce F, Sandhu R, et al. Formal Model and Policy Specification of Usage Control [J]. ACM Transactions on Information and System Security, 2005,8(4) : 351-387.
  • 7Wang D. SAT-based abstraction refinement for hardware verification[D]. Pittsburgh.- Carnegie Mellon University, 2003.
  • 8Wu Q, Hsiao M S. A new simulation-based property checking algorithm based on partitioned alternative Search Space Traversal[J]. IEEE Transactions on Computers, 2006, 55 (11): 1325-1334.
  • 9Graf S, Saidi H. Construction of abstract state graphs with PVS [C]//LNCS 1524. Haifa, 1997 : 72-83.
  • 10Das S. Predicate Abstraction[D]. Stanford: Stanford University, 2003.

引证文献1

二级引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部