Dispelling verification myths critical for 45-nm designs
Rajeev Ranjan, Jasper Design Automation
EE Times (07/13/2009 12:00 AM EDT)
As designers approach 45 nm, the difference between ASICs and SoCs really blurs and, essentially, all chips become SoCs. At the same time, platform-based design, with the use and reuse of internal and external IP blocks, is playing a bigger and bigger role, because nobody is going to build a 50-M gate chip from scratch. In this changing environment, formal verification should be integral to these flows, but several common misconceptions may slow adoption of this critical technology.
What is indisputable though is that all today's conventional verification tools are proving insufficient as we head toward 45-nm designs; and building faster and larger compute farms and utilizing specialized hardware is not the answer. New methodologies and technology are needed, and quickly, to address the challenge.
An important weapon in the verification arsenal is formal verification. Once the province of experts with very specialized knowledge, over time the difficult parts have been pushed under the hood and formal verification has attracted a broader audience. Over the past five years, formal verification was deployed first by experts on the verification team, then by the entire verification team and lately it has been spreading to the designers themselves.
To read the full article, click here
Related Semiconductor IP
- Flexible Pixel Processor Video IP
- Bluetooth Low Energy 6.0 Digital IP
- MIPI SWI3S Manager Core IP
- Ultra-low power high dynamic range image sensor
- Neural Video Processor IP
Related White Papers
- Survey of Chip Designers on the Value of Formal Verification Across the Spectrum of Applications
- Maximizing the value of your IP
- Protect your goal with post-silicon formal verification
- Cache-Coherence Verification
Latest White Papers
- Enabling Space-Grade AI/ML with RISC-V: A Fully European Stack for Autonomous Missions
- CANDoSA: A Hardware Performance Counter-Based Intrusion Detection System for DoS Attacks on Automotive CAN bus
- How Next-Gen Chips Are Unlocking RISC-V’s Customization Advantage
- Efficient Hardware-Assisted Heap Memory Safety for Embedded RISC-V Systems
- Automatically Retargeting Hardware and Code Generation for RISC-V Custom Instructions