2021
DOI: 10.3390/computers10100125
|View full text |Cite
|
Sign up to set email alerts
|

Invariant-Based Safety Assessment of FPGA Projects: Conception and Technique

Abstract: This paper describes a proposed method and technology of safety assessment of projects based on field programmable gate arrays (FPGA). Safety assessment is based on special invariants, e.g., properties which remain unchanged when a specified transformation is applied. A classification and examples of FPGA project invariants are provided. In the paper, two types of invariants are described. The first type of invariants used for such assessment are those which are versatile since they reflect the unchanged prope… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1

Citation Types

0
3
0

Year Published

2021
2021
2022
2022

Publication Types

Select...
2

Relationship

2
0

Authors

Journals

citations
Cited by 2 publications
(3 citation statements)
references
References 34 publications
0
3
0
Order By: Relevance
“…Here, we consider the most appropriate one. An approach to verification is based on specifying algorithm invariants similar to [19,20].…”
Section: Verification Of the Algorithmmentioning
confidence: 99%
See 1 more Smart Citation
“…Here, we consider the most appropriate one. An approach to verification is based on specifying algorithm invariants similar to [19,20].…”
Section: Verification Of the Algorithmmentioning
confidence: 99%
“…This paper is devoted to atomic functions computation issue. We consider the functions  V. Makarichev, V. Kharchenko, 2021 For the case s1  , s up (x) is well-known upfunction of V. O. Rvachev [4]. For the case s2  , these functions were presented by V. O. Rvachev and G. O. Starets [11].…”
Section: Introductionmentioning
confidence: 99%
“…The range of possible failure causes is extended due to the extensive utilization of complex electronic components, such as microprocessors and FPGA: such components are subject to hardware and software failures that should be considered during the assessment process [3]. Besides, an additional challenge is caused by the vulnerability of software and hardware components and threats of intrusions and cyber-attacks, which can be reasons for failures and blocking of performance as well [4].…”
Section: Introduction 1motivationmentioning
confidence: 99%