Publication | Closed Access
Protocol verification as a hardware design aid
398
Citations
9
References
2003
Year
Unknown Venue
EngineeringHardware Verification LanguageVerificationComputer ArchitectureComputer-aided VerificationSystem-level DesignMur PhiEmbedded SystemsHardware SystemsFormal VerificationHardware Verification LanguagesHardware SecurityHardware DesignSystems EngineeringFormal TechniqueSemi-formal VerificationProtocolsSecure ProtocolHardware VerificationFormal SpecificationComputer EngineeringProtocol VerificationComputer ScienceCryptographyFormal MethodsFunctional Verification
The role of automatic formal protocol verification in hardware design is considered. Principles that maximize the benefits of protocol verification while minimizing the labor and computation required are identified. A novel protocol description language and verifier (both called Mur phi ) are described, along with experiences in applying them to two industrial protocols that were developed as part of hardware designs.< <ETX xmlns:mml="http://www.w3.org/1998/Math/MathML" xmlns:xlink="http://www.w3.org/1999/xlink">></ETX>
| Year | Citations | |
|---|---|---|
Page 1
Page 1