Skip to main content

Verification of Memory Management Units

  • Conference paper
Dependable Computing for Critical Applications 2

Part of the book series: Dependable Computing and Fault-Tolerant Systems ((DEPENDABLECOMP,volume 6))

Abstract

This paper describes the formal verification of two memory management units using the HOL theorem prover. The verification effort demonstrates the use of hierarchical decomposition and abstract theories. Both devices authorize memory requests and translate virtual addresses to real addresses. The first unit was designed and verified to the gate level. The second memory management unit is implemented with an abstract representation and provides some operating system support. Memory requests are validated based on a memory resident segment table. These units are being used as a basis for the verification of a composed chip set to form a trusted computing base.

This work was sponsored under Boeing Contract NAS1-18586, Task Assignment No. 3, with NASA-Langley Research Center

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. V. P. Nelson, “Fault-Tolerant Computing: Fundamental Concepts,” Computer, July 1990.

    Google Scholar 

  2. H. G. Barrow, “VERIFY: A Program for Proving Correctness of Digital Hardware Designs,” Artificial Intelligence, vol. 24, 1984.

    Google Scholar 

  3. J. J. Joyce, “Formal Specification and Verification of Microprocessor Systems,” Microprocessing and Microprogramming, North-Holland, vol. 24, 1988.

    Google Scholar 

  4. G. Milne and P. Subrahmanyam, Formal Aspect of VLSI Design. Publishers B.V., 1986.

    Google Scholar 

  5. D. Weise, “Functional Verification of MOS Circuits,” 24th ACM/IEEE Design Automation Conference, 1987.

    Google Scholar 

  6. W. A. Hunt, “Microprocessor Design Verification,” Journal of Automated Reasoning, vol. 5, 1989.

    Google Scholar 

  7. W. R. Bevier, W. A. Hunt, and W. D. Young, “Toward Verified Execution Environments,” IEEE Symposium on Security and Privacy, 1987.

    Google Scholar 

  8. W. R. Bevier, “Kit and the Short Stack,” Journal of Automated Reasoning, vol. 5, 1989.

    Google Scholar 

  9. P. J. Windley, “A Hierarchical Methodology for Verifying Microprogrammed Microprocessors,” IEEE Symposium on Research in Security and Privacy, 1990.

    Google Scholar 

  10. J. Pan and K. N. Levitt, “A Formal Specification of the IEEE Floating-Point Standard with Application to the Verification of Floating-Point Coprocessors and Numerical Arithmetic,” Proceedings of 24th Asilomar Conference on Signals, Systems and Computers, 1990.

    Google Scholar 

  11. P. J. Windley, The Formal Verification of Generic Interpreters. PhD thesis, University of California, Davis, 1990.

    Google Scholar 

  12. E. T. Schubert, “Verification of Memory Management Units using HOL,” technical report CSE-90-27, University of California, Davis, August 1990.

    Google Scholar 

  13. P. G. Neumann, “On Hierarchical Design of Computer Systems for Critical Applications,” IEEE Transaction on Software Engineering, vol. SE-12, No. 9, September 1986.

    Google Scholar 

  14. J. D. Guttman and H. Ko, “Verifying A Hardware Security Architecture,” IEEE Symposium on Research in Security and Privacy, 1990.

    Google Scholar 

  15. A. Cohn, “A Proof of Correctness of the VIPER Microprocessor: the Second Level,” in VLSI Specification, Verification, and Synthesis, (G. Birtwhistle and P. Subrahmanyam, eds.), Springer-Verlag, 1989.

    Google Scholar 

  16. W. A. Hunt, “A Verified Microprocessor,” technical report 47, The University of Texas at Austin, Dec. 1985.

    Google Scholar 

  17. J. J. Joyce, Multi-Level Verification of Microprocessor-Based Systems. PhD thesis, Cambridge University, December 1989.

    Google Scholar 

  18. W. J. Cullyer, “Implementing Safety Critical Systems: The VIPER Microprocessor,” in VLSI Specification, Verification, and Synthesis, (G. Birtwhistle and P. Subrahmanyam, eds.), Kluwer Academic Press, 1988.

    Google Scholar 

  19. J. J. Joyce, “Totally Verified Systems: Linking Verified Software to Verified Hardware,” Hardware Specification, Verification and Synthesis: Mathematical Aspects, July 1989.

    Google Scholar 

  20. W. R. Bevier, “A Verified Operating System Kernel,” technical report 11, Computational Logic, Inc., October 1989.

    Google Scholar 

  21. M. Gordon, “HOL: A Proof Generating System for Higher-Order Logic,” in VLSI Specification, Verification, and Synthesis, (G. Birtwhistle and P. Subrahmanyam, eds.), Kluwer Academic Press, 1988.

    Google Scholar 

  22. W. Boebert, “The LOCK Demonstration,” 11 th National Computer Security Conference, 1988.

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 1992 Springer-Verlag/Wien

About this paper

Cite this paper

Schubert, E.T., Levitt, K.N. (1992). Verification of Memory Management Units. In: Meyer, J.F., Schlichting, R.D. (eds) Dependable Computing for Critical Applications 2. Dependable Computing and Fault-Tolerant Systems, vol 6. Springer, Vienna. https://doi.org/10.1007/978-3-7091-9198-9_13

Download citation

  • DOI: https://doi.org/10.1007/978-3-7091-9198-9_13

  • Publisher Name: Springer, Vienna

  • Print ISBN: 978-3-7091-9200-9

  • Online ISBN: 978-3-7091-9198-9

  • eBook Packages: Springer Book Archive

Publish with us

Policies and ethics