Skip to content

VCS

Avoiding SoC Security Threats – What Verification Engineers Should Know

Thursday, September 30, 2021 | 11:00 -11:30 a.m. PDT The development of secure systems is of paramount importance in this age of software intensive electronic systems. Security weaknesses in the SoC hardware can lead to vulnerabilities that may be exploited later on by malicious software. These challenging problems must be addressed pre-silicon and require rigorous… Read More »Avoiding SoC Security Threats – What Verification Engineers Should Know

Everything You Need to Know about SystemVerilog Arrays

This webinar gives a comprehensive guide to all aspects of SystemVerilog arrays: ordinary static arrays, dynamic arrays, queues and associative arrays. It also includes array methods and practical examples. Topics: Review of Verilog array types SystemVerilog packed and unpacked arrays SystemVerilog dynamic arrays SystemVerilog queues SystemVerilog associate arrays Array manipulation methods. Coding examples are shown… Read More »Everything You Need to Know about SystemVerilog Arrays

Verify Your SoC Design Efficiently from Planning to Coverage Closure using Synopsys Verification Family

Verifying an SoC is an extremely complex process that requires agile turnaround, constant control feedback, and flexibility to adapt to evolving project needs. Coverage is an efficient metric for the number of potential bugs found and needs to be tracked at each stage of the project. The verification process starts from defining the verification goals,… Read More »Verify Your SoC Design Efficiently from Planning to Coverage Closure using Synopsys Verification Family

Efficient Bluespec RISC-V Processor Verification for Highest Coverage Closure: A Comprehensive Case Study

The ability to mix and match multiple ISA extensions and add user-defined ISA extensions makes RISC-V verification more challenging than conventional processor verification. This Synopsys webinar demonstrates the verification of standard RISC-V ISA extensions. A subsequent webcast will demonstrate custom ISA verification. The multiple ISA verification problem is solved by RISCV-DV with configurability for ISA… Read More »Efficient Bluespec RISC-V Processor Verification for Highest Coverage Closure: A Comprehensive Case Study