U2U 2020 - Raytheon - CoverCheck

3 Notable Formal Verification Conference Papers of 2020

On the short list of positive things to come out of the past year are…

Part 9: The 2020 Wilson Research Group Functional Verification Study

IC/ASIC Verification Technology Adoption Trends This blog is a continuation of a series of blogs…

Part 5: The 2020 Wilson Research Group Functional Verification Study

This blog is a continuation of a series of blogs related to the 2020 Wilson…

AMC 20-152A: A practitioners perspective

A previous post discussed the high level impact of the new AMC 20-152A guidance on…

The Many Flavors of Equivalence Checking: Part 5, Summary of the Most Popular LEC and SLEC Use Cases

As I noted at the beginning of this series, the term “logic equivalence checking” (LEC)…

How to Become a Formal Expert and Impress your Friends and Boss!

No one ever said that functional verification was easy. In fact, from a computer science…

How Formal Techniques Can Keep Hackers from Leaving You in the Cold

While internet connected vehicles remain a popular target for hackers, the new breed of “smart”…

How Formal Techniques Can Keep Hackers from Driving You into a Ditch, Part 2 of 2

In Part 1 of this series, inspired by security researchers that were able take over…

How Formal Techniques Can Keep Hackers from Driving You into a Ditch, Part 1 of 2

[Preface: everywhere it refers to automobiles in this post, you can also swap in “X-Ray…