Continue to Site

Welcome to EDAboard.com

Welcome to our site! EDAboard.com is an international Electronics Discussion Forum focused on EDA software, circuits, schematics, books, theory, papers, asic, pld, 8051, DSP, Network, RF, Analog Design, PCB, Service Manuals... and a whole lot more! To participate you need to register. Registration is free. Click here to register now.

Understanding and Managing Complexity in Formal Verification

1721366939763.png
Ensuring that integrated circuit (IC) designs are error-free is crucial, and that's where formal verification comes in. By using mathematical methods, formal verification offers strong assurances that a design meets its specifications. However, the process is full of challenges, especially related to complexity. In this blog, we'll explore why formal verification gets so complicated and share some smart strategies to tackle these challenges effectively.

The Challenges of Formal Verification

Formal verification is different from traditional simulation-based methods because it checks all possible states and transitions within a design to ensure correctness. This thorough approach is both its strength and its source of complexity. The challenges arise from the vast number of states and the computational resources required to handle them.

Causes of Complexity in Formal Verification

1. State Space Explosion

One major cause of complexity is state space explosion. As the number of state variables in a design increases, the number of possible states grows exponentially. For example, a simple arbiter design might have a reachable state space of 10^10, while more complex designs can reach up to 10^100 states. Managing this vast number of states is a significant computational challenge.

1721366939763.png
Figure 1. state space explosion in formal​

2. Design Size and Cone of Influence
The complexity of a formal verification task depends on the size of the design and the cone of influence (COI) of each assertion. The COI is the subset of the design that affects the outcome of a particular assertion. While the entire design's size might be huge, the COI for a specific assertion is typically much smaller. However, large COIs still pose significant challenges for formal verification tools.

1721366953566.png
Figure 2. design size and cone of influence​

3. Computational Limits
Formal verification algorithms often encounter computational limits due to the extensive resources required. The depth of analysis and the number of states to be explored can quickly exceed the capabilities of even the most advanced computational systems. This limitation necessitates the use of various optimization techniques to manage complexity.

Strategies for Managing Complexity

Given the inherent complexity in formal verification, several strategies have been developed to manage and mitigate these challenges.

1. Abstractions
Abstractions are a powerful tool in reducing complexity. By abstracting parts of the design, verification focuses on the most critical components, ignoring less relevant details. This can significantly decrease the state space. For example, abstracting a complex arithmetic unit into a simpler model that maintains key properties can simplify verification without losing essential information.

2. Symmetry Reduction
Symmetry reduction leverages the repetitive structures within a design. By identifying symmetrical components, verification tools can reduce the number of unique states that need to be explored. For instance, in a network of identical processors, verifying one processor and then generalizing the result can save considerable computational effort.

3. Assume/Guarantee Reasoning
This technique involves breaking down the verification process into smaller, more manageable parts. By making assumptions about certain parts of the design, you can simplify the verification of other parts. If the assumptions hold, the guarantees provided by the verified parts are valid. This modular approach can significantly reduce the verification effort.

4. Local Assertions
Local assertions limit the scope of verification to a smaller portion of the design, reducing the COI. For example, protocol properties are often local, meaning the relevant logic is much smaller than the entire design. Focusing on local assertions makes the verification process more efficient.

1721366969327.png
Figure 3. local assertions​

Advanced Techniques for Complexity Management

Beyond basic strategies, more advanced techniques are employed to handle the complexities of formal verification.

1. Interactive State-Space Tunneling
This method involves guiding the formal analysis through the state space by interactively managing helper assertions. By strategically focusing on specific parts of the state space, this technique helps to avoid the exponential explosion of states, making the verification process more manageable.

1721366983157.png
Figure 4. interactive state-space tunneling​

2. Automatic Abstraction Techniques
Automatic abstraction techniques dynamically simplify the design during the verification process. These methods automatically identify and abstract non-critical parts of the design, focusing computational resources on the most relevant components. This approach can significantly enhance verification efficiency without compromising accuracy.

3. Formal-Optimized Models
Formal-optimized models for common design constructs such as counters, FIFOs, and memories improve verification performance. These models are designed to integrate seamlessly with existing designs, providing optimized verification without the need for extensive manual adjustments.

Proof Strategies and Ensuring Convergence

Ensuring convergence in formal verification—where the tool can definitively prove or disprove a property—is crucial. Various proof strategies are employed to achieve this.

1. Base Case and Induction
The base case and induction method involves verifying a property for a base state and then proving that if the property holds for one state, it holds for the next state. This method systematically ensures that the property holds across all states. The base case validates the property for all reachable states up to a certain number of steps from the initial state, while induction extends this validation to future states.

2. Bounded Model Checking (BMC)
Bounded Model Checking is an approach that checks the correctness of a design within a specified number of steps. By limiting the depth of the search, BMC can quickly identify counterexamples if they exist within the bound. Although it doesn't guarantee the absence of bugs beyond the bound, BMC is effective in finding shallow bugs efficiently.

3. Inductive Invariants
Inductive invariants are properties that, if true in the initial state, remain true throughout the execution of the design. Identifying strong inductive invariants can simplify the verification process by reducing the state space that needs to be explored. These invariants serve as checkpoints that guide the verification tool towards proving the overall property.

4. Compositional Reasoning
Compositional reasoning is a technique used to address the state explosion problem by breaking down a large, complex component into smaller, independently verifiable parts. For example, a large super-block can be divided into smaller blocks and sub-blocks. When verifying one of these smaller components, constraints must be specified to model the behavior of the other components, effectively creating an environment for the component to be verified.

1721366999168.png
Figure 5. compositional reasoning​

Best Practices for Effective Formal Verification

To maximize the effectiveness of formal verification, certain best practices should be followed.

1. Creating Formal-Friendly Models
Designs should be created with formal verification in mind. This includes writing clear, concise, and formal-friendly models that facilitate easier verification. Simplifying the design without compromising its functionality can significantly enhance verification efficiency.

2. High-Level Property Verification
Verifying high-level properties and mapping them to micro-architectural specifications provides clear value for projects. This approach ensures that the design meets its intended requirements and simplifies the verification process.

3. Incremental Verification
Incremental verification involves verifying parts of the design incrementally rather than attempting to verify the entire design in one go. This method allows for early detection of errors and simplifies the debugging process.

4. Use of Assertions
Assertions play a critical role in formal verification. Writing effective assertions that capture key properties and constraints of the design can significantly enhance the verification process. Assertions help in pinpointing specific areas of the design that need attention and provide a clear framework for verification.

Conclusion

Formal verification is an indispensable tool for ensuring the correctness of IC designs. However, its inherent complexity requires careful management. By employing strategies such as abstractions, symmetry reduction, and assume/guarantee reasoning, and leveraging advanced techniques like interactive state-space tunneling and automatic abstraction, the challenges of formal verification can be effectively addressed. Following best practices, including creating formal-friendly models, verifying high-level properties, and using assertions, can further enhance the verification process. Through these approaches, formal verification can provide robust guarantees of design correctness, paving the way for reliable and efficient IC designs.
About author
Peng Yu
With a wealth of experience in formal verification projects, I specialize in two critical solutions: formal signoff with full proof and formal signoff with coverage. Throughout my career, I have successfully tackled a diverse range of designs, including Instruction units, Standard interfaces, User-defined interfaces, Bus matrices, Caches, MMUs, Schedulers, DMA controllers, Memory controllers, Interrupt controllers, Power management units, and various specific functional modules.

Drawing on this extensive project experience and a deep understanding of various design types, I have developed a unique formal verification methodology. This methodology has been honed through practical application and has proven highly effective in ensuring design correctness and efficiency.

One of my key achievements has been the independent creation of a comprehensive formal verification IP library. This library comprises nearly 200 units, encompassing basic, common, VIP, and flow libraries. These resources, combined with my methodology, have been successfully deployed in the product development workflows of numerous leading chip companies. The results speak for themselves, with significant improvements in verification effectiveness and performance observed across the board.

My goal is to share this expertise with students at EDA Academy, providing them with practical insights and industry best practices that they can apply directly to their own projects. By imparting this knowledge, I aim to empower learners to achieve their verification goals with confidence and efficiency.

EDA Academy:https://www.eda-academy.com
Explore our current Formal Verification courses:
  1. Introduction to Formal Verification
  2. Formal Verification: SVA Coding
  3. Formal Verification: PSL Coding

Comments

There are no comments to display.

Part and Inventory Search

Blog entry information

Author
Peng Yu
Read time
5 min read
Views
332
Last update

More entries in Uncategorized

More entries from Peng Yu

Share this entry

Back
Top