{"id":17888,"date":"2022-11-28T11:24:38","date_gmt":"2022-11-28T16:24:38","guid":{"rendered":"https:\/\/blogs.sw.siemens.com\/verificationhorizons\/?p=17888"},"modified":"2026-03-27T08:51:55","modified_gmt":"2026-03-27T12:51:55","slug":"part-7-the-2022-wilson-research-group-functional-verification-study","status":"publish","type":"post","link":"https:\/\/blogs.sw.siemens.com\/verificationhorizons\/2022\/11\/28\/part-7-the-2022-wilson-research-group-functional-verification-study\/","title":{"rendered":"Part 7: The 2022 Wilson Research Group Functional Verification Study"},"content":{"rendered":"\n<h2 class=\"wp-block-heading\">IC\/ASIC Design Trends<\/h2>\n\n\n\n<p>This blog is a continuation of a series of blogs related to the <a href=\"https:\/\/blogs.sw.siemens.com\/verificationhorizons\/2022\/10\/10\/prologue-the-2022-wilson-research-group-functional-verification-study\/\">2022 Wilson Research Group Functional Verification Study<\/a>. In my <a href=\"https:\/\/blogs.sw.siemens.com\/verificationhorizons\/2022\/11\/21\/part-6-the-2022-wilson-research-group-functional-verification-study\/\">previous blog<\/a>, I focused on FPGA design and verification trends. Now my plan is to shift the focus in this series of blogs from FPGA trends to IC\/ASIC trends. And specifically in this blog, I present trends related to various aspects of design to illustrate growing design complexity.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"icasic-design-size-by-gate-count\">IC\/ASIC Design Size by Gate Count<\/h3>\n\n\n\n<p>Fig. 7-1 shows the trends from the 2012 through the 2022 studies in terms of active IC\/ASIC design project by design sizes (gates of logic and datapath, excluding memories). Keep in mind that Fig. 7-1 does not represent silicon volume (i.e., it represents study project participants).<\/p>\n\n\n\n<p>One interesting observation from the past few &nbsp;study is the continue increase in design projects working on designs less than 1M gates. This is due to a number of projects working on smaller sensor chips for IoT and automotive devices. This can potentially yield some interesting results in the study.<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"576\" src=\"https:\/\/blogs.sw.siemens.com\/wp-content\/uploads\/sites\/54\/2022\/11\/2022-07-01-1024x576.png\" alt=\"\" class=\"wp-image-17890\" srcset=\"https:\/\/blogs.sw.siemens.com\/wp-content\/uploads\/sites\/54\/2022\/11\/2022-07-01-1024x576.png 1024w, https:\/\/blogs.sw.siemens.com\/wp-content\/uploads\/sites\/54\/2022\/11\/2022-07-01-600x338.png 600w, https:\/\/blogs.sw.siemens.com\/wp-content\/uploads\/sites\/54\/2022\/11\/2022-07-01-768x432.png 768w, https:\/\/blogs.sw.siemens.com\/wp-content\/uploads\/sites\/54\/2022\/11\/2022-07-01-395x222.png 395w, https:\/\/blogs.sw.siemens.com\/wp-content\/uploads\/sites\/54\/2022\/11\/2022-07-01-900x506.png 900w, https:\/\/blogs.sw.siemens.com\/wp-content\/uploads\/sites\/54\/2022\/11\/2022-07-01.png 1280w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><figcaption class=\"wp-element-caption\"><strong>Fig. 1. IC\/ASIC Design Sizes<\/strong><\/figcaption><\/figure>\n\n\n\n<p>A key takeaway from Fig. 7-1 is that the electronic industry continues to move to larger designs. In fact, about 36 percent of today\u2019s design projects are working on designs over 10M gates, while 30 percent of today\u2019s design projects are working on designs between 1M gates and 80M gates.<\/p>\n\n\n\n<p>But increased design size is only one dimension of the growing complexity challenge. One industry driver that has had a substantial impact on IC\/ASIC design and verification complexity is the emergence of new layers of design requirements (beyond basic functionality), which did not exist years ago, for example, security requirements, safety requirements, and requirements associated with hardware-software interactions in embedded processor designs.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"icasic-embedded-processors\">IC\/ASIC Embedded Processors<\/h3>\n\n\n\n<p>What has changed significantly in design since the original Collett studies is the dramatic movement to SoC class of designs. In 2004, Collett found that 52 percent of design projects were working on designs that contain one or more embedded processors. Our 2022 study found that 74 percent of design projects were working on designs with embedded processors, as shown in Fig. 7-2.<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"576\" src=\"https:\/\/blogs.sw.siemens.com\/wp-content\/uploads\/sites\/54\/2022\/11\/2022-07-02-1024x576.png\" alt=\"\" class=\"wp-image-17891\" srcset=\"https:\/\/blogs.sw.siemens.com\/wp-content\/uploads\/sites\/54\/2022\/11\/2022-07-02-1024x576.png 1024w, https:\/\/blogs.sw.siemens.com\/wp-content\/uploads\/sites\/54\/2022\/11\/2022-07-02-600x338.png 600w, https:\/\/blogs.sw.siemens.com\/wp-content\/uploads\/sites\/54\/2022\/11\/2022-07-02-768x432.png 768w, https:\/\/blogs.sw.siemens.com\/wp-content\/uploads\/sites\/54\/2022\/11\/2022-07-02-395x222.png 395w, https:\/\/blogs.sw.siemens.com\/wp-content\/uploads\/sites\/54\/2022\/11\/2022-07-02-900x506.png 900w, https:\/\/blogs.sw.siemens.com\/wp-content\/uploads\/sites\/54\/2022\/11\/2022-07-02.png 1280w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><figcaption class=\"wp-element-caption\"><strong>Fig. 7-2. Number of Embedded Processors in an IC\/ASIC Design<\/strong><\/figcaption><\/figure>\n\n\n\n<p>Another interesting trend is the increase in the number of multiple embedded processes in a single SoC. For example, 52 percent of design projects today are working on designs that contain two or more embedded processors, while 15 percent of today\u2019s designs include eight or more embedded processors. SoC class designs add a new layer of verification complexity to the verification process that did not exist with traditional non-SoC class designs due to hardware and software interactions, new coherency architectures, and the emergence of complex network on-a-chip interconnect.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"icasic-designs-incorporation-ai-and-riscv-processors\">IC\/ASIC Designs Incorporation AI and RISC-V Processors<\/h3>\n\n\n\n<p>Our 2022 study continued to track the number of IC\/ASIC projects that have incorporated a RISC-V processor in their design, which was 30 percent, as shown in Fig. 7-3. In addition, we tracked the number of ASIC projects that have incorporated some type of AI accelerator processor (e.g., TPU, etc.), which was 32 percent. Both RISC-V and AI core increased from our 2020 study.<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"576\" src=\"https:\/\/blogs.sw.siemens.com\/wp-content\/uploads\/sites\/54\/2022\/11\/2022-07-03-1024x576.png\" alt=\"\" class=\"wp-image-17893\" srcset=\"https:\/\/blogs.sw.siemens.com\/wp-content\/uploads\/sites\/54\/2022\/11\/2022-07-03-1024x576.png 1024w, https:\/\/blogs.sw.siemens.com\/wp-content\/uploads\/sites\/54\/2022\/11\/2022-07-03-600x338.png 600w, https:\/\/blogs.sw.siemens.com\/wp-content\/uploads\/sites\/54\/2022\/11\/2022-07-03-768x432.png 768w, https:\/\/blogs.sw.siemens.com\/wp-content\/uploads\/sites\/54\/2022\/11\/2022-07-03-395x222.png 395w, https:\/\/blogs.sw.siemens.com\/wp-content\/uploads\/sites\/54\/2022\/11\/2022-07-03-900x506.png 900w, https:\/\/blogs.sw.siemens.com\/wp-content\/uploads\/sites\/54\/2022\/11\/2022-07-03.png 1280w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><figcaption class=\"wp-element-caption\"><strong>Fig. 7-3. Percentage of new IC\/ASIC designs incorporating AI and RISC-V Processors<\/strong><\/figcaption><\/figure>\n\n\n\n<h3 class=\"wp-block-heading\">IC\/ASIC Security Features<\/h3>\n\n\n\n<p>Many projects are implementing security features in their designs, as shown in Fig. 7-4. Examples of security features include security assurance hardware modules (e.g., a security controller) that are designed to safely hold sensitive data, such as encryption keys, digital right management (DRM) keys, passwords, and biometrics reference data. These security features add requirements and complexity to the verification process.<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"576\" src=\"https:\/\/blogs.sw.siemens.com\/wp-content\/uploads\/sites\/54\/2022\/11\/2022-07-04-1024x576.png\" alt=\"\" class=\"wp-image-17894\" srcset=\"https:\/\/blogs.sw.siemens.com\/wp-content\/uploads\/sites\/54\/2022\/11\/2022-07-04-1024x576.png 1024w, https:\/\/blogs.sw.siemens.com\/wp-content\/uploads\/sites\/54\/2022\/11\/2022-07-04-600x338.png 600w, https:\/\/blogs.sw.siemens.com\/wp-content\/uploads\/sites\/54\/2022\/11\/2022-07-04-768x432.png 768w, https:\/\/blogs.sw.siemens.com\/wp-content\/uploads\/sites\/54\/2022\/11\/2022-07-04-395x222.png 395w, https:\/\/blogs.sw.siemens.com\/wp-content\/uploads\/sites\/54\/2022\/11\/2022-07-04-900x506.png 900w, https:\/\/blogs.sw.siemens.com\/wp-content\/uploads\/sites\/54\/2022\/11\/2022-07-04.png 1280w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><figcaption class=\"wp-element-caption\"><strong>Fig. 7-4. IC\/ASIC design projects implementing security features<\/strong><\/figcaption><\/figure>\n\n\n\n<h3 class=\"wp-block-heading\">IC\/ASIC Safety-Critical Design<\/h3>\n\n\n\n<p>Another example of increasing requirements contributing to complexity relates to safety-critical designs. In Fig. 7-5, we see an increase in the number of IC\/ASIC projects working under one of multiple safety-critical development process standards or guidelines.<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"576\" src=\"https:\/\/blogs.sw.siemens.com\/wp-content\/uploads\/sites\/54\/2022\/11\/2022-07-05-1024x576.png\" alt=\"\" class=\"wp-image-17895\" srcset=\"https:\/\/blogs.sw.siemens.com\/wp-content\/uploads\/sites\/54\/2022\/11\/2022-07-05-1024x576.png 1024w, https:\/\/blogs.sw.siemens.com\/wp-content\/uploads\/sites\/54\/2022\/11\/2022-07-05-600x338.png 600w, https:\/\/blogs.sw.siemens.com\/wp-content\/uploads\/sites\/54\/2022\/11\/2022-07-05-768x432.png 768w, https:\/\/blogs.sw.siemens.com\/wp-content\/uploads\/sites\/54\/2022\/11\/2022-07-05-395x222.png 395w, https:\/\/blogs.sw.siemens.com\/wp-content\/uploads\/sites\/54\/2022\/11\/2022-07-05-900x506.png 900w, https:\/\/blogs.sw.siemens.com\/wp-content\/uploads\/sites\/54\/2022\/11\/2022-07-05.png 1280w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><figcaption class=\"wp-element-caption\"><strong>Fig. 7-4. IC\/ASIC design projects implementing security features<\/strong><\/figcaption><\/figure>\n\n\n\n<p>For those projects working under a safety-critical development process standard or guideline, in Fig. 7-6 we show the specific breakdown for the various standards within this group. Note that some projects are required to work under multiple safety standards or guidelines. For example, IEC61508 and IEC61511.<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"576\" src=\"https:\/\/blogs.sw.siemens.com\/wp-content\/uploads\/sites\/54\/2022\/11\/2022-07-06-1-1024x576.png\" alt=\"\" class=\"wp-image-17897\" srcset=\"https:\/\/blogs.sw.siemens.com\/wp-content\/uploads\/sites\/54\/2022\/11\/2022-07-06-1-1024x576.png 1024w, https:\/\/blogs.sw.siemens.com\/wp-content\/uploads\/sites\/54\/2022\/11\/2022-07-06-1-600x338.png 600w, https:\/\/blogs.sw.siemens.com\/wp-content\/uploads\/sites\/54\/2022\/11\/2022-07-06-1-768x432.png 768w, https:\/\/blogs.sw.siemens.com\/wp-content\/uploads\/sites\/54\/2022\/11\/2022-07-06-1-395x222.png 395w, https:\/\/blogs.sw.siemens.com\/wp-content\/uploads\/sites\/54\/2022\/11\/2022-07-06-1-900x506.png 900w, https:\/\/blogs.sw.siemens.com\/wp-content\/uploads\/sites\/54\/2022\/11\/2022-07-06-1.png 1280w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><figcaption class=\"wp-element-caption\"><strong>Fig. 7-6. Safety-critical development standard used on IC\/ASIC projec<\/strong>t<\/figcaption><\/figure>\n\n\n\n<p>The key takeaway from this blog is that IC\/ASIC designs are growing in complexity, which impacts verification effort and effectiveness.<\/p>\n\n\n\n<p>In my next blog, I plan to discuss the growing IC\/ASIC design project resource trends due to rising design complexity.<\/p>\n\n\n\n<p><strong>Quick links to the 2022 Wilson Research Group Study results<\/strong><\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><a href=\"https:\/\/blogs.sw.siemens.com\/verificationhorizons\/2022\/10\/10\/prologue-the-2022-wilson-research-group-functional-verification-study\/\" target=\"_blank\" rel=\"noreferrer noopener\">Prologue: The 2022 Wilson Research Group Functional Verification Study<\/a><\/li>\n\n\n\n<li><a href=\"https:\/\/blogs.sw.siemens.com\/verificationhorizons\/2022\/10\/16\/part-1-the-2020-wilson-research-group-functional-verification-study-2\/\">Part 1 \u2013 FPGA Design Trends<\/a><\/li>\n\n\n\n<li><a href=\"https:\/\/blogs.sw.siemens.com\/verificationhorizons\/2022\/10\/24\/part-2-the-2022-wilson-research-group-functional-verification-study\/\">Part 2 \u2013 FPGA Verification Effectiveness Trends<\/a><\/li>\n\n\n\n<li><a href=\"https:\/\/blogs.sw.siemens.com\/verificationhorizons\/2022\/10\/30\/part-3-the-2022-wilson-research-group-functional-verification-study\/\">Part 3 \u2013 FPGA Verification Effort Trends<\/a><\/li>\n\n\n\n<li><a href=\"https:\/\/blogs.sw.siemens.com\/verificationhorizons\/2022\/11\/06\/part-4-the-2022-wilson-research-group-functional-verification-study\/\">Part 4 \u2013 FPGA Verification Effort Trends (Continued)<\/a><\/li>\n\n\n\n<li><a href=\"https:\/\/blogs.sw.siemens.com\/verificationhorizons\/2022\/11\/13\/part-5-the-2022-wilson-research-group-functional-verification-study\/\">Part 5 \u2013 FPGA Verification Technology Adoption Trends<\/a><\/li>\n\n\n\n<li><a href=\"https:\/\/blogs.sw.siemens.com\/verificationhorizons\/2022\/11\/21\/part-6-the-2022-wilson-research-group-functional-verification-study\/\">Part 6 \u2013 FPGA Verification Language and Library Adoption Trends<\/a><\/li>\n\n\n\n<li><a href=\"https:\/\/blogs.sw.siemens.com\/verificationhorizons\/2022\/11\/28\/part-7-the-2022-wilson-research-group-functional-verification-study\/\" data-type=\"URL\" data-id=\"https:\/\/blogs.sw.siemens.com\/verificationhorizons\/2022\/11\/28\/part-7-the-2022-wilson-research-group-functional-verification-study\/\">Part 7 \u2013 IC\/ASIC Design Trends<\/a><\/li>\n\n\n\n<li><a href=\"https:\/\/blogs.sw.siemens.com\/verificationhorizons\/2022\/12\/12\/part-8-the-2022-wilson-research-group-functional-verification-study\/\" data-type=\"URL\" data-id=\"https:\/\/blogs.sw.siemens.com\/verificationhorizons\/2022\/12\/12\/part-8-the-2022-wilson-research-group-functional-verification-study\/\">Part 8 \u2013 IC\/ASIC Resource Trends<\/a><\/li>\n\n\n\n<li><a href=\"https:\/\/blogs.sw.siemens.com\/verificationhorizons\/2022\/12\/18\/part-9-the-2020-wilson-research-group-functional-verification-study-2\/\" data-type=\"URL\" data-id=\"https:\/\/blogs.sw.siemens.com\/verificationhorizons\/2022\/12\/18\/part-9-the-2020-wilson-research-group-functional-verification-study-2\/\">Part 9 \u2013 IC\/ASIC Verification Technology Adoption Trend<\/a>s<\/li>\n\n\n\n<li><a href=\"https:\/\/blogs.sw.siemens.com\/verificationhorizons\/2022\/12\/26\/strongpart-10-the-2022-wilson-research-group-functional-verification-study-strong\/\" data-type=\"post\" data-id=\"17976\">Part 10 \u2013 IC\/ASIC Language and Library Adoption Trends<\/a><\/li>\n\n\n\n<li><a href=\"https:\/\/blogs.sw.siemens.com\/verificationhorizons\/2023\/01\/02\/part-11-the-2022-wilson-research-group-functional-verification-study\/\" data-type=\"URL\" data-id=\"https:\/\/blogs.sw.siemens.com\/verificationhorizons\/2023\/01\/02\/part-11-the-2022-wilson-research-group-functional-verification-study\/\">Part 11 \u2013 IC\/ASIC Power Management Trends<\/a><\/li>\n\n\n\n<li><a href=\"https:\/\/blogs.sw.siemens.com\/verificationhorizons\/2023\/01\/09\/part-12-the-2020-wilson-research-group-functional-verification-study-2\/\" data-type=\"URL\" data-id=\"https:\/\/blogs.sw.siemens.com\/verificationhorizons\/2023\/01\/09\/part-12-the-2020-wilson-research-group-functional-verification-study-2\/\">Part 12 \u2013 IC\/ASIC Verification Results Trends<\/a><\/li>\n\n\n\n<li><a href=\"https:\/\/blogs.sw.siemens.com\/verificationhorizons\/2023\/01\/15\/conclusion-the-2022-wilson-research-group-functional-verification-study\/\" data-type=\"URL\" data-id=\"https:\/\/blogs.sw.siemens.com\/verificationhorizons\/2023\/01\/15\/conclusion-the-2022-wilson-research-group-functional-verification-study\/\">Conclusion: The 2022 Wilson Research Group Functional<\/a><\/li>\n\n\n\n<li><a href=\"https:\/\/blogs.sw.siemens.com\/verificationhorizons\/2023\/01\/23\/epilogue-the-2022-wilson-research-group-functional-verification-study\/\" data-type=\"URL\" data-id=\"https:\/\/blogs.sw.siemens.com\/verificationhorizons\/2023\/01\/23\/epilogue-the-2022-wilson-research-group-functional-verification-study\/\">Epilogue: The 2022 Wilson Research Group Functional<\/a><\/li>\n<\/ul>\n","protected":false},"excerpt":{"rendered":"<p>IC\/ASIC Design Trends This blog is a continuation of a series of blogs related to the 2022 Wilson Research Group&#8230;<\/p>\n","protected":false},"author":71592,"featured_media":17898,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"spanish_translation":"","french_translation":"","german_translation":"","italian_translation":"","polish_translation":"","japanese_translation":"","chinese_translation":"","footnotes":""},"categories":[1],"tags":[347,506,851],"industry":[],"product":[205],"coauthors":[967],"class_list":["post-17888","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-news","tag-asic","tag-functional-verification","tag-wilson-research-group-functional-verification-study","product-questa"],"featured_image_url":"https:\/\/blogs.sw.siemens.com\/wp-content\/uploads\/sites\/54\/2022\/11\/2022-07-00.png","_links":{"self":[{"href":"https:\/\/blogs.sw.siemens.com\/verificationhorizons\/wp-json\/wp\/v2\/posts\/17888","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/blogs.sw.siemens.com\/verificationhorizons\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/blogs.sw.siemens.com\/verificationhorizons\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/blogs.sw.siemens.com\/verificationhorizons\/wp-json\/wp\/v2\/users\/71592"}],"replies":[{"embeddable":true,"href":"https:\/\/blogs.sw.siemens.com\/verificationhorizons\/wp-json\/wp\/v2\/comments?post=17888"}],"version-history":[{"count":5,"href":"https:\/\/blogs.sw.siemens.com\/verificationhorizons\/wp-json\/wp\/v2\/posts\/17888\/revisions"}],"predecessor-version":[{"id":19905,"href":"https:\/\/blogs.sw.siemens.com\/verificationhorizons\/wp-json\/wp\/v2\/posts\/17888\/revisions\/19905"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/blogs.sw.siemens.com\/verificationhorizons\/wp-json\/wp\/v2\/media\/17898"}],"wp:attachment":[{"href":"https:\/\/blogs.sw.siemens.com\/verificationhorizons\/wp-json\/wp\/v2\/media?parent=17888"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/blogs.sw.siemens.com\/verificationhorizons\/wp-json\/wp\/v2\/categories?post=17888"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/blogs.sw.siemens.com\/verificationhorizons\/wp-json\/wp\/v2\/tags?post=17888"},{"taxonomy":"industry","embeddable":true,"href":"https:\/\/blogs.sw.siemens.com\/verificationhorizons\/wp-json\/wp\/v2\/industry?post=17888"},{"taxonomy":"product","embeddable":true,"href":"https:\/\/blogs.sw.siemens.com\/verificationhorizons\/wp-json\/wp\/v2\/product?post=17888"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/blogs.sw.siemens.com\/verificationhorizons\/wp-json\/wp\/v2\/coauthors?post=17888"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}