Everyone is familiar with the old adage about what you get when you assume something—probably not appropriate for print, but there is little doubt of what you are thinking right now. Unfortunately, ...
Verification planning is an important and integral part of verification, irrespective of the size of the system. About 70% of the design cycle time is spent on verification; with proper verification ...
Meeting the quality requirements of a complex SoC requires managing large verification projects. In this article, we recount a recent experience with a verification management solution (Incisive ...
Confidentiality ensures that secrets embedded in the chip, such as the IP design itself, the configuration data, and secret keys, are protected from unauthorized access. Integrity focuses on ensuring ...
This article formalizes the concept of best possible verification quality -- completeness -- and describes a methodology, field-proven on many complex module and intellectual property (IP) designs, ...
With the explosive adoption of RISC-V processors, processor verification has become a hot topic. This is due both to the criticality of the processor IP in the SoC and to the fact that many ...