Methods, systems, and computer program product for verifying electronic designs with clock domain crossing paths

    公开(公告)号:US09633151B1

    公开(公告)日:2017-04-25

    申请号:US14675699

    申请日:2015-03-31

    CPC classification number: G06F17/504 G06F17/5031 G06F2217/62

    Abstract: Various mechanisms and approaches identify a first electronic design component at least by traversing at least a portion of the electronic design and generate a representation of the electronic design by interconnecting one or more duplicated electronic design components within the representation. The first electronic design component may include a destination electronic design component with a backward traversal of the electronic design. One or more fan-in electronic design components may be duplicated into the one or more duplicated electronic design components. One or more CDC effect models are automatically injected into the representation by adding the one or more CDC effect models along one or more paths in the representation. Proof results are generated at least via proving or disproving one or more checkers for the electronic design by verifying or simulating the representation with the one or more CDC effect models that are automatically injected into the representation.

    Security data path verification
    3.
    发明授权

    公开(公告)号:US09922209B1

    公开(公告)日:2018-03-20

    申请号:US15269919

    申请日:2016-09-19

    CPC classification number: G06F21/71 G06F17/5022 G06F17/5045 G06F21/76

    Abstract: A formal verification approach verifies data access and data propagation paths in a circuit design by proving the unreachability of path cover properties of the circuit design. A security path verification system receives an original circuit model of a circuit design, along with parameters identifying a first location within the circuit design that is a source of tainted data and a second location within the circuit design that is coupled to the first location. The security path verification system also receives a selection of portions of the circuit design to be excluded from the verification analysis. Using an abstracted version of the exclude portions, the security verification system generates a second circuit model of the circuit design for use in determining whether the tainted data can reach the second location from the first location within the circuit design.

    Security data path verification
    4.
    发明授权

    公开(公告)号:US09934410B1

    公开(公告)日:2018-04-03

    申请号:US15269931

    申请日:2016-09-19

    CPC classification number: G06F21/71 G06F17/5022 G06F17/5045 G06F21/76

    Abstract: A formal verification approach verifies data access and data propagation paths in a circuit design by proving the unreachability of path cover properties of the circuit design. A security path verification system receives an original circuit model of a circuit design, along with parameters identifying a first location within the circuit design that is a source of tainted data and a second location within the circuit design that is coupled to the first location. The security path verification system also receives a selection of portions of the circuit design to be excluded from the verification analysis. Using an abstracted version of the exclude portions, the security verification system generates a second circuit model of the circuit design for use in determining whether the tainted data can reach the second location from the first location within the circuit design.

Patent Agency Ranking