editor's blog
Subscribe Now

Software Validation News

LDRA and PRQA both had news at ESC last week. As a reminder, LDRA focuses on the traceability and certification of software, especially software targeted for safety-critical and secure applications. PRQA, on the other hand, prides itself in its deep, detailed code analysis, looking for potential bugs or other problems.

LDRA announced the ability to provide traceability from requirements all the way to object code. It’s that last mile to object code that’s new. The idea is to be able to document that all of the executable code can be traced to a requirement; that is, there’s no bonus flight simulator buried in your medical app for the nurses to play with. It’s also nice to go the other direction: show that every requirement has been met.

They also announced implementation of the Homeland Security secure programming guidelines.

Meanwhile, PRQA announced data flow analysis using a satisfiability modulo theorem solver (“sat solver”) from SRI that apparently won an annual sat solver competition two years ago (apparently, in declaring victory, they sat out last year’s bout). While the use of sat solvers in software analysis is by no means new, PRQA claims that it’s never been used for the kind of deep analysis they do. Others tend to try to abstract elements of the program so the entire program can be analyzed as a whole; such analysis would miss much of the detail PRQA finds. Conversely, PRQA, in rooting out the low-level details, might miss some higher-level issues; that’s not their focus.

More details in their object code traceability, HLS certification, and dataflow analysis releases…

Leave a Reply

featured blogs
Apr 25, 2024
Structures in Allegro X layout editors let you create reusable building blocks for your PCBs, saving you time and ensuring consistency. What are Structures? Structures are pre-defined groups of design objects, such as vias, connecting lines (clines), and shapes. You can combi...
Apr 25, 2024
See how the UCIe protocol creates multi-die chips by connecting chiplets from different vendors and nodes, and learn about the role of IP and specifications.The post Want to Mix and Match Dies in a Single Package? UCIe Can Get You There appeared first on Chip Design....
Apr 18, 2024
Are you ready for a revolution in robotic technology (as opposed to a robotic revolution, of course)?...

featured video

How MediaTek Optimizes SI Design with Cadence Optimality Explorer and Clarity 3D Solver

Sponsored by Cadence Design Systems

In the era of 5G/6G communication, signal integrity (SI) design considerations are important in high-speed interface design. MediaTek’s design process usually relies on human intuition, but with Cadence’s Optimality Intelligent System Explorer and Clarity 3D Solver, they’ve increased design productivity by 75X. The Optimality Explorer’s AI technology not only improves productivity, but also provides helpful insights and answers.

Learn how MediaTek uses Cadence tools in SI design

featured paper

Designing Robust 5G Power Amplifiers for the Real World

Sponsored by Keysight

Simulating 5G power amplifier (PA) designs at the component and system levels with authentic modulation and high-fidelity behavioral models increases predictability, lowers risk, and shrinks schedules. Simulation software enables multi-technology layout and multi-domain analysis, evaluating the impacts of 5G PA design choices while delivering accurate results in a single virtual workspace. This application note delves into how authentic modulation enhances predictability and performance in 5G millimeter-wave systems.

Download now to revolutionize your design process.

featured chalk talk

Secure Authentication ICs for Disposable and Accessory Ecosystems
Sponsored by Mouser Electronics and Microchip
Secure authentication for disposable and accessory ecosystems is a critical element for many embedded systems today. In this episode of Chalk Talk, Amelia Dalton and Xavier Bignalet from Microchip discuss the benefits of Microchip’s Trust Platform design suite and how it can provide the security you need for your next embedded design. They investigate the value of symmetric authentication and asymmetric authentication and the roles that parasitic power and package size play in these kinds of designs.
Jul 21, 2023
32,011 views