TY - GEN
T1 - Runtime verification
T2 - 2nd International Conference on Runtime Verification, RV 2011
AU - Malik, Sharad
PY - 2012
Y1 - 2012
N2 - A major challenge in hardware verification is managing the state explosion problem in pre-silicon verification. This is seen in the high cost and low coverage of simulation, and capacity limitations of formal verification. Runtime verification, through on-the-fly property checking of the current trace and a low-cost error recovery mechanism, provides us an alternative attack in dealing with this problem. There are several interesting examples of runtime verification that have been proposed in recent years in the computer architecture community. These have also been motivated by the resiliency needs of future technology generations in the face of dynamic errors due to device failures. I will first highlight the key ideas in hardware runtime verification through specific examples from the uni-processor and multi-processor contexts. Next, I will discuss the challenges in implementing some of these solutions. Finally I will discuss how the strengths of runtime verification and model checking can be used in a complementary fashion for hardware.
AB - A major challenge in hardware verification is managing the state explosion problem in pre-silicon verification. This is seen in the high cost and low coverage of simulation, and capacity limitations of formal verification. Runtime verification, through on-the-fly property checking of the current trace and a low-cost error recovery mechanism, provides us an alternative attack in dealing with this problem. There are several interesting examples of runtime verification that have been proposed in recent years in the computer architecture community. These have also been motivated by the resiliency needs of future technology generations in the face of dynamic errors due to device failures. I will first highlight the key ideas in hardware runtime verification through specific examples from the uni-processor and multi-processor contexts. Next, I will discuss the challenges in implementing some of these solutions. Finally I will discuss how the strengths of runtime verification and model checking can be used in a complementary fashion for hardware.
UR - http://www.scopus.com/inward/record.url?scp=84861210281&partnerID=8YFLogxK
UR - http://www.scopus.com/inward/citedby.url?scp=84861210281&partnerID=8YFLogxK
U2 - 10.1007/978-3-642-29860-8_5
DO - 10.1007/978-3-642-29860-8_5
M3 - Conference contribution
AN - SCOPUS:84861210281
SN - 9783642298592
T3 - Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
SP - 49
EP - 62
BT - Runtime Verification - Second International Conference, RV 2011, Revised Selected Papers
Y2 - 27 September 2011 through 30 September 2011
ER -