Leveraging Datapath Propagation in IC3 for Hardware Model Checking

被引:0
|
作者
Fan, Hongyu [1 ]
He, Fei [1 ]
机构
[1] Tsinghua Univ, Sch Software, KLISS, BNRist, Beijing 100084, Peoples R China
基金
中国国家自然科学基金;
关键词
Hardware; Safety; Model checking; Integrated circuits; Design automation; Symbols; Hardware design languages; Datapath abstraction; datapath propagation; hardware verification; reachability safety;
D O I
10.1109/TCAD.2024.3360022
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
IC3 is a famous bit-level framework for safety verification. By incorporating datapath abstraction, a notable enhancement in the efficiency of hardware verification can be achieved. However, datapath abstraction entails a coarse level of abstraction where all datapath operations are approximated as uninterpreted functions (UFs). This level of abstraction, albeit useful, can lead to an increased computational burden during the verification process as it necessitates extensive exploration of redundant abstract state space. In this article, we introduce a novel approach called datapath propagation. Our method involves leveraging concrete constant values to iteratively compute the outcomes of relevant datapath operations and their associated UFs. Meanwhile, we generate potentially useful datapath propagation lemmas in abstract state space and tighten the datapath abstraction. With this technique, the abstract state space can be reduced, and the verification efficiency is significantly improved. We implemented the proposed approach and conducted extensive experiments. The results show promising improvements of our approach compared to the state-of-the-art verifiers.
引用
收藏
页码:2215 / 2228
页数:14
相关论文
共 28 条
  • [1] SAT-based Model Checking: Interpolation, IC3, and Beyond
    Grumberg, Orna
    Shoham, Sharon
    Vizel, Yakir
    SOFTWARE SYSTEMS SAFETY, 2014, 36 : 17 - 41
  • [2] Infinite-state invariant checking with IC3 and predicate abstraction
    Cimatti, Alessandro
    Griggio, Alberto
    Mover, Sergio
    Tonetta, Stefano
    FORMAL METHODS IN SYSTEM DESIGN, 2016, 49 (03) : 190 - 218
  • [3] Infinite-state invariant checking with IC3 and predicate abstraction
    Alessandro Cimatti
    Alberto Griggio
    Sergio Mover
    Stefano Tonetta
    Formal Methods in System Design, 2016, 49 : 190 - 218
  • [4] Model checking: A hardware design perspective
    Pixley C.
    Singhal V.
    International Journal on Software Tools for Technology Transfer, 1999, 2 (3) : 288 - 306
  • [5] Efficient Model Checking of Hardware Using Conditioned Slicing
    Vasudevan, Shobha
    Emerson, E. Allen
    Abraham, Jacob A.
    ELECTRONIC NOTES IN THEORETICAL COMPUTER SCIENCE, 2005, 128 (06) : 279 - 294
  • [6] Hardware Model Checking Algorithms and Techniques
    Cabodi, Gianpiero
    Camurati, Paolo Enrico
    Palena, Marco
    Pasini, Paolo
    ALGORITHMS, 2024, 17 (06)
  • [7] HMC: Model Checking for Hardware Memory Models
    Kokologiannakis, Michalis
    Vafeiadis, Viktor
    TWENTY-FIFTH INTERNATIONAL CONFERENCE ON ARCHITECTURAL SUPPORT FOR PROGRAMMING LANGUAGES AND OPERATING SYSTEMS (ASPLOS XXV), 2020, : 1157 - 1171
  • [8] DeepIC3: Guiding IC3 Algorithms by Graph Neural Network Clause Prediction
    Hu, Guangyu
    Tang, Jianheng
    Yu, Changyuan
    Zhang, Wei
    Zhang, Hongce
    29TH ASIA AND SOUTH PACIFIC DESIGN AUTOMATION CONFERENCE, ASP-DAC 2024, 2024, : 262 - 268
  • [9] A methodology for hardware verification using compositional model checking
    McMillan, KL
    SCIENCE OF COMPUTER PROGRAMMING, 2000, 37 (1-3) : 279 - 309
  • [10] Word level bitwidth reduction for unbounded hardware model checking
    Per Bjesse
    Formal Methods in System Design, 2009, 35 : 56 - 72