What Does Shift Left With Calibre Mean For IC Designers


Driven by the world’s seemingly insatiable demand for electronics that constantly do more faster, integrated circuit (IC) design companies are continuously seeking ways to profitably deliver products with more functionality, reliability, and performance while reducing time-to-market. To accomplish this, a well-planned shift left strategy can free up critical time and resources in delivery sch... » read more

Formally Verifying Data-Oblivious Behavior In HW Using Standard Property Checking Techniques


A technical paper titled “A Scalable Formal Verification Methodology for Data-Oblivious Hardware” was published by researchers at RPTU Kaiserslautern-Landau and Stanford University. Abstract: "The importance of preventing microarchitectural timing side channels in security-critical applications has surged in recent years. Constant-time programming has emerged as a best-practice technique... » read more

High-Quality Silicon With Cloud-Based Verification


New materials, vertically stacked architectures, and angstrom-level process technologies—the complexity of today’s SoCs continues to grow to meet the needs of demanding applications such as AI, autonomous vehicles, and high-performance computing. This trend only places greater pressure on verification, already notorious for being a significant bottleneck in chip development. Design teams... » read more

Patterns And Issues In AI Chip Design


AI is becoming more than a talking point for chip and system design, taking on increasingly complex tasks that are now competitive requirements in many markets. But the inclusion of AI, along with its machine learning and deep learning subcategories, also has injected widespread confusion and uncertainty into every aspect of electronics. This is partly due to the fact that it touches so many... » read more

Understanding UVM Coverage For RISC-V Processor Designs


Attempting to achieve complete RISC-V verification requires multiple methodologies employing a wide range of relevant tools, including: • Coverage driven simulation based on UVM constrained random methods and compliant with the Universal Verification Methodology (UVM) standard • Static and formal property verification • Equivalence checking • Emulation and FPGA based verific... » read more

Synopsys Timing Constraints Manager: Constraint Verification


Constraint verification refers to the verification of the contents of an SDC file to flag situations where the specified constraints are either incorrect, or incomplete, both of which, if not addressed, could result in silicon failure. The key to constraint verification is the ability to flag real issues without swamping an engineer with noise: issues that upon designer review result in no chan... » read more

Integration Of S-Parameters For Power Module Verification Into The Engineers’ Design Environment


By Wilfried Wessel (Siemens EDA), Simon Liebetegger (University of Applied Sciences Darmstadt), and Florian Bauer (Siemens EDA) Developing a power module requires enhanced design and verification methods. Currently, multiple iterations are needed to get the design done. Today, design and manufacturing processes are heavily dependent on physical prototypes. The reason for this is the unique s... » read more

An Open-Source Solution To Accelerate Autonomous Vehicle Validation And Verification Research


A technical paper titled “PolyVerif: An Open-Source Environment for Autonomous Vehicle Validation and Verification Research Acceleration” was published by researchers at Florida Polytechnic University, Embry-Riddle Aeronautical University, Tallinn University of Technology, and Acclivis Technologies. Abstract: "Validation and Verification (V&V) of Artificial Intelligence (AI) based cyb... » read more

An Open-Source Hardware Design And Specification Language To Improve Productivity And Verification 


A technical paper titled “PEak: A Single Source of Truth for Hardware Design and Verification” was published by researchers at Stanford University. Abstract: "Domain-specific languages for hardware can significantly enhance designer productivity, but sometimes at the cost of ease of verification. On the other hand, ISA specification languages are too static to be used during early stage d... » read more

Formally Modeling A Security Monitor For Virtual Machine-Based Confidential Computing Systems (IBM)


A technical paper titled “Towards a Formally Verified Security Monitor for VM-based Confidential Computing” was published by researchers at IBM Research and IBM T.J. Watson Research Center. Abstract: "Confidential computing is a key technology for isolating high-assurance applications from the large amounts of untrusted code typical in modern systems. Existing confidential computing syste... » read more

← Older posts Newer posts →