Skip to main content
Log in

Evaluating and Constraining Hardware Assertions with Absent Scenarios

  • Regular Paper
  • Published:
Journal of Computer Science and Technology Aims and scope Submit manuscript

Abstract

Mining from simulation data of the golden model in hardware design verification is an effective solution to assertion generation. While the simulation data is inherently incomplete, it is necessary to evaluate the truth values of the mined assertions. This paper presents an approach to evaluating and constraining hardware assertions with absent scenarios. A Belief-failRate metric is proposed to predict the truth/falseness of generated assertions. By considering both the occurrences of free variable assignments and the conflicts of absent scenarios, we use the metric to sort true assertions in higher ranking and false assertions in lower ranking. Our Belief-failRate guided assertion constraining method leverages the quality of generated assertions. The experimental results show that the Belief-failRate framework performs better than the existing methods. In addition, the assertion evaluating and constraining procedure can find more assertions that cover new design functionality in comparison with the previous methods.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Similar content being viewed by others

References

  1. Vasudevan S, Sheridan D, Tcheng D, Tuohy B, Johnson D. GoldMine: Automatic assertion generation using data mining and static analysis. In Proc. the 13th Int. Conf. Design, Automation & Test in Europe, March 2010, pp.626-629.

  2. Hertz S, Sheridan D, Vasudevan S. Mining hardware assertions with guidance from static analysis. IEEE Trans. Computer Aided Design, 2013, 32(6): 952-965.

    Article  Google Scholar 

  3. Sheridan D, Liu L, Kim H, Vasudevan S. A coverage guided mining approach for automatic generation of succinct assertions. In Proc. the 27th Int. Conf. VLSI Design, January 2014, pp.68-73.

  4. Liu L, Lin C H, Vasudevan S. Word level feature discovery to enhance quality of assertion mining. In Proc. the 15th Int. Conf. Computer-Aided Design, March 2012, pp.210-217.

  5. Chang P, Wang L C. Automatic assertion extraction via sequential data mining of simulation traces. In Proc. the 15th Int. Conf. Asia and South Pacific Design Automation, January 2010, pp.607-612.

  6. Bertasi M, Guglielmo G, Pravadelli G. Automatic generation of compact formal properties for effective error detection. In Proc. the 11th Int. Conf. Hardware/Software Codesign and System Synthesis, September 2013, pp.1-10.

  7. Danese A, Ghasempouri T, Pravadelli G. Automatic extraction of assertions from execution traces of behavioural models. In Proc. the 18th Int. Conf. Design, Automation & Test in Europe, March 2015, pp.67–72.

  8. Danese A, Filini F, Pravadelli G. A time-window based approach for dynamic assertions mining on control signals. In Proc. the 23rd Int. Conf. Very Large Scale Integration, October 2015, pp. 246-251.

  9. Danese A, Pravadelli G, Zandonà I. Automatic generation of power state machines through dynamic mining of temporal assertions. In Proc. the 19th Int. Conf. Design, Automation & Test in Europe, March 2016, pp.606–611.

  10. Ciesielski M, Yu C, Brown W, Liu D. Verification of gate-level arithmetic circuits by function extraction. In Proc. the 52nd Int. Conf. Design Automation, June 2015.

  11. Hanafy M, Said H, Wahba A M. Complete properties extraction from simulation traces for assertions auto-generation. In Proc. the 24th Int. Conf. North Atlantic Test Workshop, May 2015.

  12. Hanafy M, Said H, Wahba A M. New methodology for digital design properties extraction from simulation traces. In Proc. the 10th Int. Conf. Computer Engineering & Systems, December 2015.

  13. Ghasempouri T, Pravadelli G. On the estimation of assertion interestingness. In Proc. the 23rd Int. Conf. Very Large Scale Integration, October 2015, pp.325-330.

  14. Mitra S, Banerjee A, Dasgupta P, Kumar H. Counterexample ranking using mined invariants. IEEE Trans. Computer Aided Design, 2013, 32(12): 1978–1991.

    Article  Google Scholar 

  15. Chao H, Li H, Song X, Wang T, Li X. On evaluating and constraining assertions using conflicts in absent scenarios. In Proc. the 26th Int. Conf. Asian Test Symposium, November 2017, pp.195-200.

  16. Ernst M, Cockrell J, Griswold W, Notkin D. Dynamically discovering likely program invariants to support program evolution. IEEE Trans. Software Engineering, 2001, 27(2): 99–123.

    Article  Google Scholar 

  17. Hoskote Y, Kam T, Ho P H, Zhao X. Coverage estimation for symbolic model checking. In Proc. the 36th Int. Conf. Design Automation, June 1999, pp.300–305.

  18. Jayakumar N, Purandare M, Somenzi F. Dos and Don’ts of CTL state coverage estimation. In Proc. the 40th Int. Conf. Design Automation, June 2003, pp.292–295.

  19. Chao H, Li H, Wang T, Li X. An accurate algorithm for computing mutation coverage in model checking. In Proc. the 2016 IEEE International Test Conference, November 2016.

  20. Haedicke F, Große D, Drechsler R. A guiding coverage metric for formal verification. In Proc. the 15th Int. Conf. Design, Automation & Test in Europe, March 2012, pp.617- 622.

  21. Fedeli A, Fummi F, Pravadelli G. Properties incompleteness evaluation by functional verification. IEEE Trans. Computers, 2007, 56(4): 528-544.

    Article  MathSciNet  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Hua-Wei Li.

Electronic supplementary material

ESM 1

(PDF 393 kb)

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Chao, HN., Li, HW., Song, X. et al. Evaluating and Constraining Hardware Assertions with Absent Scenarios. J. Comput. Sci. Technol. 35, 1198–1216 (2020). https://doi.org/10.1007/s11390-020-9708-x

Download citation

  • Received:

  • Revised:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11390-020-9708-x

Keywords

Navigation