An Automated Formal Verification Flow for Safety Registers
نویسنده
چکیده
Automotive microcontrollers support an increasing number of safety applications and include various safety mechanisms in order to meet the ISO 26262 standard. Derivatives of product families address different market segments and customers with individual safety requirements. Thus flexibility is needed to adjust the overhead introduced by extra safety circuitry to the actual configurations and safety requirements of the individual product. This paper presents a comprehensive formal verification methodology for safety-critical registers. Distinct sets of a relatively small number of black-box and white-box register properties, which call macros generated from XML register specifications with safety tags, allow the depth of automatic register verification to be progressively increased by inserting more and more design-specific data. This systematic and highly automated formal verification approach, which includes formal fault injection, not only saves functional and safety verification efforts, but also yields evidence for ISO 26262 compliance. Keywords—formal verification; special function register; safety register; safety verification; ISO26262
منابع مشابه
Retrieval–travel-time model for free-fall-flow-rack automated storage and retrieval system
Automated storage and retrieval systems (AS/RSs) are material handling systems that are frequently used in manufacturing and distribution centers. The modelling of the retrieval–travel time of an AS/RS (expected product delivery time) is practically important, because it allows us to evaluate and improve the system throughput. The free-fall-flow-rack AS/RS has emerged as a new technology for dr...
متن کاملWeb Service Choreography Verification Using Z Formal Specification
Web Service Choreography Description Language (WS-CDL) describes and orchestrates the services interactions among multiple participants. WS-CDL verification is essential since the interactions would lead to mismatches. Existing works verify the messages ordering, the flow of messages, and the expected results from collaborations. In this paper, we present a Z specification of WS-CDL. Besides ve...
متن کاملDesign and formal verification of DZMBE+
In this paper, a new broadcast encryption scheme is presented based on threshold secret sharing and secure multiparty computation. This scheme is maintained to be dynamic in that a broadcaster can broadcast a message to any of the dynamic groups of users in the system and it is also fair in the sense that no cheater is able to gain an unfair advantage over other users. Another important feature...
متن کاملScalably-Verifiable Sequential Synthesis
This report is a case-study of the synergy between sequential synthesis and verification. Described is an efficient implementation of a sequential synthesis that uses simple induction to detect and merge sequentially-equivalent registers and nodes in a sequential circuit with a given initial state. Since retiming is not performed, state-encoding, scan chains, and test vectors are essentially pr...
متن کاملReachability checking in complex and concurrent software systems using intelligent search methods
Software system verification is an efficient technique for ensuring the correctness of a software product, especially in safety-critical systems in which a small bug may have disastrous consequences. The goal of software verification is to ensure that the product fulfills the requirements. Studies show that the cost of finding and fixing errors in design time is less than finding and fixing the...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2015