Furthermore , three expanded gny logic rules are given during above analysis based on gny , and at the end of this paper , security protocol formal verification based on attack logics is discussed and presented , a development framework of integrating such verification model into automated analysis tools such as spearii is shown finally 另外,本文在使用gny逻辑的分析过程中,提出三条实用的gny扩展规则,而在文章最后,对基于攻击逻辑的安全协议验证方法作了初步研究,提出了将该协议攻击验证技术融入协议自动分析工具的设计框架。
The correctness of each chip should be taken into the first consideration . appling modern verification technologies and reformatting verification flow will capture more bugs , which will raise quality of chip designs . this dissertation focuses on the verification technology and quality management in chip designs especially in asic designs 本文对芯片设计特别是asic领域的验证技术和质量管理进行了探讨,从验证理论,验证实践,验证自动化,验证重用和验证管理等处着眼,研究如何通过验证技术的应用和验证流程的合理化实现高效率验证,提高芯片设计的质量。