Design and Verification of Microprocessor Systems for High-Assurance Applications
โ Scribed by Matt Kaufmann, J Strother Moore (auth.), David S. Hardin (eds.)
- Publisher
- Springer US
- Year
- 2010
- Tongue
- English
- Leaves
- 439
- Edition
- 1
- Category
- Library
No coin nor oath required. For personal study only.
โฆ Synopsis
Design and Verification of Microprocessor Systems for High-Assurance Applications
Edited by:
David S. Hardin
This book examines several leading-edge design and verification technologies that have been successfully applied to microprocessor systems for high-assurance applications at various levels โ from arithmetic circuits to microcode to instruction sets to operating systems to applications. We focus on recent hardware, software, and system designs that have actually been built and deployed, and feature systems that have been certified at high Evaluation Assurance Levels, namely the Rockwell Collins AAMP7G microprocessor (EAL7) and the Green Hills INTEGRITY-178B separation kernel (EAL6+). The contributing authors to this book have endeavored to bring forth truly new material on significant, modern design and verification efforts; many of the results described herein were obtained only within the past year.
- Offers practical case studies of the successful application of formal methods at several different levels of real-world microprocessor system design;
- Discusses high-robustness design techniques that support formal verification;
- Shows how "Design for Verification" can become "Design with Verification", using modern verification tool suites that can readily import engineering designs;
- Features chapters written by practitioners who have achieved the highest assurance Evaluation Assurance Level (EAL) certifications defined by the Common Criteria;
- Formally develops the "GWV" family of information flow theorems used in recent EAL6+ and EAL7 certifications;
- Explains how designs expressed in new model-based development languages can be analyzed and verified;
- Demonstrates ways in which various kinds of formal verification tools can be utilized in combination to achieve a final verification result.
โฆ Table of Contents
Front Matter....Pages i-xiv
ACL2 and Its Applications to Digital System Verification....Pages 1-21
A Mechanically Verified Commercial SRT Divider....Pages 23-63
Use of Formal Verification at Centaur Technology....Pages 65-88
Designing Tunable, Verifiable Cryptographic Hardware Using Cryptol....Pages 89-143
Verifying Pipelines with BAT....Pages 145-174
Formal Verification of Partition Management for the AAMP7G Microprocessor....Pages 175-191
Compiling Higher Order Logic by Proof....Pages 193-220
Specification and Verification of ARM Hardware and Software....Pages 221-247
Information Security Modeling and Analysis....Pages 249-299
Modeling and Security Analysis of a Commercial Real-Time Operating System Kernel....Pages 301-322
Refinement in the Formal Verification of the seL4 Microkernel....Pages 323-339
Specification and Checking of Software Contracts for Conditional Information Flow....Pages 341-379
Model Checking Information Flow....Pages 381-428
Back Matter....Pages 429-436
โฆ Subjects
Circuits and Systems; Computer-Aided Engineering (CAD, CAE) and Design; Quality Control, Reliability, Safety and Risk
๐ SIMILAR VOLUMES
Given the growing size and heterogeneity of Systems on Chip (SOC), the design process from initial specification to chip fabrication has become increasingly complex. This growing complexity provides incentive for designers to use high-level languages such as C, SystemC, and SystemVerilog for system-
<p><P>"Applications of Neural Networks in High Assurance Systems" is the first book directly addressing a key part of neural network technology: methods used to pass the tough verification and validation (V&V) standards required in many safety-critical applications. The book presents what kinds of e
Many enterprises unfortunately depend on software that is insecure, unreliable, and fragile. They compensate by investing heavily in workarounds and maintenance, and by employing hordes of "gurus" to manage their systems' flaws. This must change. And it can. In this book, respected software architec
How to Design for Software Reliability, Security, and Maintainability Many enterprises unfortunately depend on software that is insecure, unreliable, and fragile. They compensate by investing heavily in workarounds and maintenance, and by employing hordes of ยซgurusยป to manage their systems flaws. Th
"This book covers the design of next generation microprocessors in deep submicron CMOS technologies. The chapters in Design of High Performance Microprocessor Circuits were written by some of the worlds leading technologists, designers, and researchers. All levels of system abstraction are covered,