No one ever said that functional verification was easy. In fact, from a computer science theoretical perspective verification is considered…
While internet connected vehicles remain a popular target for hackers, the new breed of “smart” devices have the potential to…
In Part 1 of this series, inspired by security researchers that were able take over a new Jeep and drive…
[Preface: everywhere it refers to automobiles in this post, you can also swap in “X-Ray machine”, “pacemaker”, and “aircraft”] The…
Do you have a really tough verification problem – one that takes seemingly forever for a testbench simulation to solve…