Using Hardware Secure modules to protect SoCs

Building secure SoCs takes a methodical approach, careful study of possible attacks, and embedded hardware that can provide a Root of Trust. Protecting security in an SoC means protecting the device in all states. This article from Tech Design Forum focuses on how to protect SoCs using hardware security modules. Read More Find out how [...]

2018-02-09T05:45:39+00:009th February, 2018|Blog, Thought Leadership|

Understanding the inner workings of UVM – Part 2

This article highlights the UVM communication protocols set between Sequence, Sequencer and Driver, and describes how the class sequencer interacts with class uvm_sequence to generate stimulus out of sequence_item. Read More Join T&VS UVM training and learn how to improve the verification accuracy and quality for today’s SoC.

2018-02-08T06:39:30+00:008th February, 2018|Blog, Thought Leadership|

Verification of Functional Safety: Part II

Functional safety is becoming a key part of chip design, and an increasingly problematic one for many engineering teams. Functional safety for electrical and electronic systems is nothing new. It has been an essential element in every industry for many years. But the growing importance of functional safety within the automobile industry presents a number [...]

2018-02-07T05:55:09+00:007th February, 2018|Blog, Thought Leadership|

Doc Formal: When ‘silicon proven’ is not enough

Formal verification is emerging as a viable method for increasing design assurance for VLSI circuits. This article explores how to deploy formal for security in your design verification and summarizes the recommendation for a greater use of formal verification. Read More Find out how T&VS Formal Verification techniques helps to improve the quality of Verification.

2018-02-06T09:55:28+00:006th February, 2018|Blog, Thought Leadership|

Moving from FPGA’s to Embedded FPGA Fabric – How it’s Done

The recent explosion of FPGA-based compute acceleration has created an enormous new market opportunity for programmable logic. At the same time, however, eFPGAs represent a serious challenge to FPGAs in capturing the long, big-money tail of the compute acceleration wave. eFPGAs are IP blocks that can be used by custom chip designers to add FPGA [...]

2018-02-02T05:36:00+00:002nd February, 2018|Blog, Thought Leadership|

Verification of Functional Safety

Functional safety is becoming a key part of chip design, and an increasingly problematic one for many engineering teams. Verification flow of Functional safety for automotive SoCs must ensure zero design bugs, using coverage-driven functional verification, and zero safety risks, using a functional safety verification strategy that complies with the ISO 26262 automotive safety standard. [...]

2018-02-01T06:51:03+00:001st February, 2018|Blog, Thought Leadership|

Guide to Understanding FPGA Development

An FPGA is an integrated circuit or device that is programmed to perform specific functions after it has been built. The FPGA configuration is generally specified using a hardware description language (HDL), similar to that used for an ASIC. This article provides you the knowledge needed to build a good FPGA foundation. Read More Check out T&VS services [...]

2018-01-31T06:14:08+00:0031st January, 2018|Blog, Thought Leadership|

Simulation and Formal – Finding the Right Balance

Simulation dominates hardware functional verification today and likely will continue to dominate for the foreseeable future. Meanwhile formal verification, once thought to be a possible challenger for the title, has instead converged on a more effective role as a complement to simulation. Formal excels at finding problems in shallow but very broad state graphs and [...]

2018-01-30T07:32:14+00:0030th January, 2018|Blog, Thought Leadership|

Tutorial for Connecting Questa® VIP into the Processor Verification Flow

VIPs play a very important role in the verification flow of modern SoCs. They can check the correctness of communication over system buses and provide master, slave, decoder, or arbiter components if these are missing in the verification set-up. This article describes verification of RISC-V processors, focusing on the combination of automatically generated UVM verification [...]

2018-01-29T05:56:44+00:0029th January, 2018|Blog, Thought Leadership|