Skip to main content

previous disabled Page of 2
and
  1. No Access

    Chapter and Conference Paper

    Syntax-Guided Synthesis for Lemma Generation in Hardware Model Checking

    In this work we propose to use Syntax-Guided Synthesis (SyGuS) for lemma generation in a word-level IC3/PDR framework for bit-vector problems. Hardware model checking is moving from bit-level to word-level pro...

    Hongce Zhang, Aarti Gupta, Sharad Malik in Verification, Model Checking, and Abstract… (2021)

  2. No Access

    Chapter and Conference Paper

    Synthesizing Environment Invariants for Modular Hardware Verification

    We automate synthesis of environment invariants for modular hardware verification in processors and application-specific accelerators, where functional equivalence is proved between a high-level specification ...

    Hongce Zhang, Weikun Yang in Verification, Model Checking, and Abstract… (2020)

  3. Chapter and Conference Paper

    ILAng: A Modeling and Verification Platform for SoCs Using Instruction-Level Abstractions

    We present ILAng, a platform for modeling and verification of systems-on-chip (SoCs) using Instruction-Level Abstractions (ILA). The ILA formal model targeting the hardware-software interface enables a clean s...

    Bo-Yuan Huang, Hongce Zhang, Aarti Gupta in Tools and Algorithms for the Construction … (2019)

  4. Chapter and Conference Paper

    Lazy Self-composition for Security Verification

    The secure information flow problem, which checks whether low-security outputs of a program are influenced by high-security inputs, has many applications in verifying security properties in programs. In this p...

    Weikun Yang, Yakir Vizel, Pramod Subramanyan, Aarti Gupta in Computer Aided Verification (2018)

  5. No Access

    Chapter and Conference Paper

    Trace-based Analysis of Memory Corruption Malware Attacks

    Understanding malware behavior is critical for cybersecurity. This is still largely done through expert manual analysis of the malware code/binary. In this work, we introduce a fully automated method for malwa...

    Zhixing Xu, Aarti Gupta, Sharad Malik in Hardware and Software: Verification and Testing (2017)

  6. No Access

    Chapter and Conference Paper

    IC3 - Flip** the E in ICE

    Induction is a key element of state-of-the-art verification techniques. Automatically synthesizing and verifying inductive invariants is at the heart of Model Checking of safety properties. In this paper, we stud...

    Yakir Vizel, Arie Gurfinkel, Sharon Shoham in Verification, Model Checking, and Abstract… (2017)

  7. Chapter and Conference Paper

    Fast Interpolating BMC

    Bounded Model Checking (BMC) is well known for its simplicity and ability to find counterexamples. It is based on the idea of symbolically representing counterexamples in a tr...

    Yakir Vizel, Arie Gurfinkel, Sharad Malik in Computer Aided Verification (2015)

  8. No Access

    Chapter and Conference Paper

    Reduction of Resolution Refutations and Interpolants via Subsumption

    Propositional resolution proofs and interpolants derived from them are widely used in automated verification and circuit synthesis. There is a broad consensus that “small is beautiful”—small proofs and interpo...

    Roderick Bloem, Sharad Malik in Hardware and Software: Verification and Te… (2014)

  9. No Access

    Chapter and Conference Paper

    Using Flow Specifications of Parameterized Cache Coherence Protocols for Verifying Deadlock Freedom

    We consider the problem of verifying deadlock freedom for symmetric cache coherence protocols. While there are multiple definitions of deadlock in the literature, we focus on a specific form of deadlock which ...

    Divjyot Sethi, Muralidhar Talupur in Automated Technology for Verification and … (2014)

  10. No Access

    Chapter and Conference Paper

    SAT Based Verification of Network Data Planes

    Formal verification has seen relatively less application in verifying computer networking infrastructure. This is in part due to the lack of clean layers of abstraction that enable design modeling and specific...

    Shuyuan Zhang, Sharad Malik in Automated Technology for Verification and Analysis (2013)

  11. No Access

    Chapter and Conference Paper

    Coverage-Based Trace Signal Selection for Fault Localisation in Post-silicon Validation

    Post-silicon validation is the time-consuming process of detecting and diagnosing defects in prototype silicon. It targets electrical and functional defects that escaped detection during pre-silicon verificati...

    Charlie Shucheng Zhu, Georg Weissenbacher in Hardware and Software: Verification and Te… (2013)

  12. No Access

    Chapter and Conference Paper

    Model Checking Unbounded Concurrent Lists

    We present a model checking based method for verifying list-based concurrent data structures. Concurrent data structures are notorious for being hard to get right and thus, their verification has received sign...

    Divjyot Sethi, Muralidhar Talupur, Sharad Malik in Model Checking Software (2013)

  13. No Access

    Chapter and Conference Paper

    Modeling Firmware as Service Functions and Its Application to Test Generation

    The term firmware refers to software that is tied to a specific hardware platform, e.g., low-level drivers that physically interface with the peripherals. More recently, this has grown to include software that...

    Sunha Ahn, Sharad Malik in Hardware and Software: Verification and Testing (2013)

  14. Chapter and Conference Paper

    passert: A Tool for Debugging Parallel Programs

    passert is a new debugging tool for parallel programs which allows programmers to express correctness criteria using a simple, expressive assertion language. We demonstrate how these parallel assertions allow the...

    Daniel Schwartz-Narbonne, Feng Liu, David August in Computer Aided Verification (2012)

  15. Chapter and Conference Paper

    Wolverine: Battling Bugs with Interpolants

    Wolverine is a software verifier that checks safety properties of sequential ANSI-C and C++ programs, deploying Craig interpolation to derive program invariants. We describe the underlying approa...

    Georg Weissenbacher, Daniel Kroening in Tools and Algorithms for the Construction … (2012)

  16. No Access

    Chapter and Conference Paper

    Verification of Computer Switching Networks: An Overview

    Formal verification has seen much success in several domains of hardware and software design. For example, in hardware verification there has been much work in the verification of microprocessors (e.g. [1]) an...

    Shuyuan Zhang, Sharad Malik, Rick McGeer in Automated Technology for Verification and … (2012)

  17. No Access

    Chapter and Conference Paper

    Runtime Verification: A Computer Architecture Perspective

    A major challenge in hardware verification is managing the state explosion problem in pre-silicon verification. This is seen in the high cost and low coverage of simulation, and capacity limitations of formal ...

    Sharad Malik in Runtime Verification (2012)

  18. No Access

    Chapter and Conference Paper

    Parallel Assertions for Architectures with Weak Memory Models

    Assertions are a powerful and widely used debugging tool in sequential programs, but are ineffective at detecting concurrency bugs. We recently introduced parallel assertions which solve this problem by provid...

    Daniel Schwartz-Narbonne in Automated Technology for Verification and … (2012)

  19. No Access

    Chapter and Conference Paper

    Predicting Serializability Violations: SMT-Based Search vs. DPOR-Based Search

    In our recent work, we addressed the problem of detecting serializability violations in a concurrent program using predictive analysis, where we used a graph-based method to derive a predictive model from a gi...

    Arnab Sinha, Sharad Malik, Chao Wang in Hardware and Software: Verification and Te… (2012)

  20. No Access

    Chapter and Conference Paper

    Parameterized Model Checking of Fine Grained Concurrency

    Concurrent data structures are provided in libraries such as Intel Thread Building Blocks and Java.util.concurrent to enable efficient implementation of multi-threaded programs. Their efficiency is achieved by...

    Divjyot Sethi, Muralidhar Talupur, Daniel Schwartz-Narbonne in Model Checking Software (2012)

previous disabled Page of 2