Formal Verification of SUBLEQ Microcode implementing the RV32I ISA

被引:1
作者
Klemmer, Lucas [1 ]
Gurtner, Sonja [1 ]
Grosse, Daniel [1 ]
机构
[1] Johannes Kepler Univ Linz, Inst Complex Syst, Linz, Austria
来源
PROCEEDINGS OF THE 2022 FORUM ON SPECIFICATION & DESIGN LANGUAGES (FDL) | 2022年
关键词
COVERAGE;
D O I
10.1109/FDL56239.2022.9925662
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
The open and royalty free nature as well as the extendable design of the RISC-V Instruction Set Architecture (ISA) has lead to a sprawling ecosystem of RISC-V software and hardware. One of the domains explored by the RISC-V community are processors with minimal area footprints. To reduce the area footprint to the minimum, typically performance is traded for a much more compact design. A promising approach to realizing very small RISC-V processors is to base them on a single instruction, such as SUBLEQ, and using a microcode layer. However, the minimalism of SUBLEQ makes writing correct microcode procedures challenging. In this paper, we target the formal verification of SUBLEQ microcode procedures. We present our verification framework and show that we can handle complex SUBLEQ procedures in practical times. In our experiments we consider a set of SUBLEQ procedures which implements the RV32I ISA and passes all official RISC-V compliance tests. However, based on our approach we found 9 intricate bugs in the SUBLEQ procedures.
引用
收藏
页数:8
相关论文
共 33 条
[1]  
Arons T, 2005, LECT NOTES COMPUT SC, V3576, P185
[2]  
Barrett Clark, 2011, Computer Aided Verification. Proceedings 23rd International Conference, CAV 2011, P171, DOI 10.1007/978-3-642-22110-1_14
[3]  
Bormann J., 2007, DVCON
[4]  
Burch J. R., 1994, Computer Aided Verification. 6th International Conference, CAV '94. Proceedings, P68
[5]  
Crepaldi M., 2021, IEEE ACCESS, V9
[6]  
Dapeng Gao, 2021, 2021 Formal Methods in Computer Aided Design (FMCAD), P24, DOI 10.34727/2021/isbn.978-3-85448-046-4_10
[7]  
Davis Jared, 2014, Interactive Theorem Proving. 5th International Conference, ITP 2014, Held as Part of the Vienna Summer of Logic, VSL 2014. Proceedings: LNCS 8558, P1, DOI 10.1007/978-3-319-08970-6_1
[8]   Z3: An efficient SMT solver [J].
de Moura, Leonardo ;
Bjorner, Nikolaj .
TOOLS AND ALGORITHMS FOR THE CONSTRUCTION AND ANALYSIS OF SYSTEMS, 2008, 4963 :337-340
[9]  
Devarajegowda K, 2020, DES AUT TEST EUROPE, P526, DOI 10.23919/DATE48585.2020.9116515
[10]   A Formal Approach for Detecting Vulnerabilities to Transient Execution Attacks in Out-of-Order Processors [J].
Fadiheh, Mohammad Rahmani ;
Mueller, Johannes ;
Brinkmann, Raik ;
Mitra, Subhasish ;
Stoffel, Dominik ;
Kunz, Wolfgang .
PROCEEDINGS OF THE 2020 57TH ACM/EDAC/IEEE DESIGN AUTOMATION CONFERENCE (DAC), 2020,