Industry Expert Blogs
Formal verification best practices: sign-off and wrap-upCodasip Blog - Laurent Arditi, CodasipOct. 16, 2023 |
Hi again, friends. Here we are. This is the last episode of our series on formal verification best practices. As the last step, let’s discuss signing off with formal verification, and wrap up. After our efforts using formal verification to verify our cache controller, we went beyond expectations. We reproduced and qualified the design fix for a known deadlock. We also verified data integrity and protocol compliance. However, we did all that without looking at the cache microarchitecture, therefore we don’t have any embedded assertions.
Now the questions are: Are we done? Is this verification sufficient? With a few tricks we were able to get proof convergences, but are we observing all possible bugs? We can typically answer these by looking at formal coverage.
Related Blogs
- Mitigating Side-Channel Attacks In Post Quantum Cryptography (PQC) With Secure-IC Solutions
- Formal verification best practices: checking data corruption
- Intel Embraces the RISC-V Ecosystem: Implications as the Other Shoe Drops
- Design for Verification - a natural next step?
- Arm and Arteris Drive Innovation in Automotive SoCs