Skip to main content

Advertisement

Log in

Scalable reachability analysis via automated dynamic netlist-based hint generation

  • Published:
Formal Methods in System Design Aims and scope Submit manuscript

Abstract

While SAT-based algorithms have largely displaced BDD-based verification techniques due to their typically higher scalability, there are classes of problems for which BDD-based reachability analysis is the only existing method for an automated solution. Nonetheless, reachability engines require a high degree of tuning to perform well on challenging benchmarks. In addition to clever partitioning and scheduling techniques, the use of hints has been proposed to decompose an otherwise breadth-first fixedpoint computation into a series of underapproximate computations, requiring a larger number of (pre-)image iterations though often significantly reducing peak BDD size and thus resource requirements. In this paper, we introduce a novel approach to boost the scalability of reachability computation: automated netlist-based hint generation. Experiments confirm that this approach can yield significant resource reductions; often over an order of magnitude on complex problems compared to reachability analysis without hints, and even compared to SAT-based proof techniques.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4

Similar content being viewed by others

Explore related subjects

Discover the latest articles and news from researchers in related subjects, suggested using machine learning.

References

  1. Burch JR, Clarke EM, Long DE (August 1991) Symbolic model checking with partitioned transition relations. In: International conference on very large scale integration, pp 49–58

  2. Moon I-H, Hachtel GD, Somenzi F (November 2000) ‘Border-block triangular form and conjunction schedule in image computation. In: International conference on formal methods in computer-aided design, pp 73–90

  3. McMillan K (July 2003) Interpolation and SAT-based model checking. In: International conference on computer-aided verification, pp 1–13

  4. Bradley A (2011) SAT-based model checking without unrolling. In: International conference on verification, model checking, and abstract interpretation, pp 70–87

  5. Biere A, Cimatti A, Clarke EM, Zhu Y (1999) Symbolic model checking without BDDs. In: Tools and algorithms for the construction and analysis of systems, pp 193–207

  6. Ho P-H, Shiple T, Harer K, Kukula J, Damiano R, Bertacco V, Taylor J, Long J (2000) Smart simulation using collaborative formal and simulation engines. In: International conference on computer-aided design, pp 120–126

  7. Moon I-H, Kukula JH, Ravi K, Somenzi F (2000) To split or to conjoin: the question in image computation. In: Proceedings of the 37th Annual Design Automation Conference, ACM, pp 23–28

  8. Clarke E M, Grumberg O, Jha S, Lu Y, Veith H (2000) Counterexample-guided abstraction refinement. In: International conference on computer-aided verification, pp 154–169

  9. Mony H, Baumgartner J, Mishchenko A, Brayton R (2009) Speculative reduction-based scalable redundancy identification. In: Design, automation and test in Europe, pp 1674–1679

  10. Bjesse P, Kukula J (2005) Automatic generalized phase abstraction for formal verification. In: International conference on computer-aided design, pp 1076–1082

  11. Kuehlmann A, Baumgartner J (2001) Transformation-based verification using generalized retiming. In: International conference on computer-aided verification, pp 104–117

  12. Mony H, Baumgartner J, Paruthi V, Kanzelman R, Kuehlmann A (2004) Scalable automated verification via expert-system guided transformations. In: International conference on formal methods in computer-aided design, pp 159–173

  13. Berkeley Logic and Synthesis Group, ABC: A System for Sequential Synthesis and Verification. http://www.eecs.berkeley.edu/alanmi/abc

  14. Cabodi G, Nocco S, Quer S (2011) Benchmarking a model checker for algorithmic improvements and tuning for performance. Form Methods Syst Des 39(2):205–227

    Article  MATH  Google Scholar 

  15. Beerel PA, Burch JR, McMillan KL (2000) Sibling-substitution-based BDD minimization using don’t cares. IEEE Trans Comput Aided Des 19:44–55

    Article  Google Scholar 

  16. Ravi K, Somenzi F (1999) Hints to accelerate symbolic traversal. In: Correct hardware design and verification methods, pp 250–266

  17. Ward D, Somenzi F (2005) Automatic generation of hints for symbolic traversal. In: Correct hardware design and verification methods, pp 207–221

  18. Ward D, Somenzi F (2006) Decomposing image computation for symbolic reachability analysis using control flow information. In: International conference on computer-aided design, pp 779–785

  19. Ravi K, Somenzi F (1995) High-density reachability analysis. In: International conference on computer-aided design, pp 154–158

  20. Hardware Model Checking Competition 2011. http://fmv.jku.at/hwmcc11. Accessed Nov 2011

  21. Janssen G (2001) Design of a pointerless BDD package. In: International workshop on logic synthesis

  22. Fujii H, Ootomo G, Hori C (1993) Interleaving based variable ordering methods for ordered binary decision diagrams. In: International conference on computer-aided design, pp 38–41

  23. Jin H, Kuehlmann A, Somenzi F (2002) Fine-grain conjunction scheduling for symbolic reachability analysis. In: Tools and algorithms for the construction and analysis of systems, pp 312–326

  24. Eén N, Sörennson N (2003) Temporal induction by incremental SAT solving. In: Workshop on bounded model checking

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Jiazhao Xu.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Xu, J., Williams, M., Mony, H. et al. Scalable reachability analysis via automated dynamic netlist-based hint generation. Form Methods Syst Des 45, 144–164 (2014). https://doi.org/10.1007/s10703-014-0213-0

Download citation

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s10703-014-0213-0

Keywords