Microprocessor Software-Based Self-Testing
Citations
122 citations
Additional excerpts
...Dimitris Gizopoulos, Mihalis Psarakis, Xavier Vera...
[...]
67 citations
Cites background from "Microprocessor Software-Based Self-..."
...Built-In Self-Test (BIST), it presents many advantages, such as: the possibility of autonomously testing [5] and diagnosing [6] both the microprocessor and the controllable peripherals; working in normal mode of operation; not requiring any hardware modifications; allowing at-speed test application (i....
[...]
64 citations
Cites background from "Microprocessor Software-Based Self-..."
...g, Software-based Self-test [8]), or a combination of both....
[...]
45 citations
Cites methods from "Microprocessor Software-Based Self-..."
...When processors are considered, functional test typically takes the form of software-based self-test (SBST) [1]: the processor is forced to execute a given test program, and faults are detected by looking at the results produced by the program (e....
[...]
34 citations
Cites methods from "Microprocessor Software-Based Self-..."
...The regions of the reconfigurable fabric that are not intended for runtime reconfiguration can be tested for permanent faults with established approaches such as software-based testing of processors and caches [16], or periodic FPGA test methods that require the interruption of operation [17]....
[...]
References
380 citations
231 citations
"Microprocessor Software-Based Self-..." refers background or methods in this paper
...SBST has become more accepted for microprocessor testing, and it already forms an integral part of the manufacturing test flow for major processor vendors.(2,3) This article is the first attempt at classifying SBST approaches according to the way they generate self-test programs....
[...]
...The approaches of Parvathala, Maneparambil, and Lindsay (Intel) and Bayraktaroglu, Hunt, and Watkins (Sun) provide strong evidence of the usefulness of SBST in the manufacturing flow of industrial processor designs.(2,3) Unlike the previously described functional methods, the method proposed by Corno et al....
[...]
...Parvathala, Maneparambil, and Lindsay have presented an automated functional self-test method called Frits (Functional Random Instruction Testing at Speed), which generates random instruction sequences with pseudorandom data.(2) In this paper, the basic requirements for the application of a cache-resident approach have been determined....
[...]
...The first corresponds to methods that rely mainly on code randomizers (possibly oriented with suitable constraints) to obtain test programs.(2,3,6) The second consists of methods that adopt a feedbackbased strategy,(7) meaning they evaluate generated test programs according to suitable metrics (often computed through simulation) and try to progressively improve them....
[...]
...Some of the approaches have already been applied in industrial test flows for example, in the manufacturingtest process of Intel’s Pentium 4 and Itanium processors and Sun’s UltraSparc T1 processor.(2,3) For others, the real applicability must still be evaluated in morecomplex processors in terms of development cost (human effort and computational resources) and test efficiency (coverage for different fault models)....
[...]
188 citations
"Microprocessor Software-Based Self-..." refers background or methods in this paper
...N. Kranitis et al., ‘‘Software-Based Self-Testing of Embedded Processors,’’ IEEE Trans....
[...]
...The methods proposed by Rizk, Papachristou, and Wolff and Krstic et al. fall into this category.14,16 Kranitis et al. have proposed a component-based divide-and-conquer approach.12 Program generation is based only on the processor ISA and its RTL description....
[...]
...fall into this category.(12,13) ATPG algorithms generate test stimuli starting from a gate-level description of the module....
[...]
...have proposed a component-based divide-and-conquer approach.(12) Program generation is based only on the processor ISA and its RTL description....
[...]
...They first identify the testability hotspots of the pipelining logic, applying existing SBST programs (generated according to the methodology by Kranitis et al.(12) and targeting the processor’s functional components) to two fully pipelined RISC processor models: miniMIPS and OpenRISC 1200....
[...]
163 citations
"Microprocessor Software-Based Self-..." refers background or methods in this paper
...Shen and Abraham have used a tool named Vertis, which can generate both test and verification programs on the basis of only the processor’s ISA.6 Vertis generates many different instruction sequences for every instruction tested....
[...]
...Shen and Abraham have used a tool named Vertis, which can generate both test and verification programs on the basis of only the processor’s ISA.(6) Vertis generates many different instruction sequences for every instruction tested....
[...]
...Functional approaches can be easily integrated in any processor design flow because they are based only on the ISA and don’t require sophisticated test development or experienced test engineers.(2,3,6,7) Their basic limitation is that they cannot achieve high structural-fault coverage because they don’t consider the processor structure....
[...]
...The first corresponds to methods that rely mainly on code randomizers (possibly oriented with suitable constraints) to obtain test programs.(2,3,6) The second consists of methods that adopt a feedbackbased strategy,(7) meaning they evaluate generated test programs according to suitable metrics (often computed through simulation) and try to progressively improve them....
[...]
130 citations
"Microprocessor Software-Based Self-..." refers background in this paper
...and Wen, Wang, and Cheng extract information about the circuit surrounding the module under consideration.(10,11) In the approach proposed by Chen et al....
[...]
...For example, using different techniques, the methods presented by Chen et al. and Wen, Wang, and Cheng extract information about the circuit surrounding the module under consideration.10,11 In the approach proposed by Chen et al.,10 the processor is first partitioned into a set of modules....
[...]
...The methods proposed by Chen et al. and Krstic et al. belong to this category.15,16 Pseudorandom methods randomly generate sequences of instructions and/or data to be internally elaborated by the processor....
[...]
...Chen et al. have described a two-step test-program generation methodology that uses multiple-level abstractions of the processor under consideration, including the ISA description, RTL model, architectural model, and synthesized gate-level netlist.15 In the first phase, processor classification identifies ISA registers, logic and control blocks, pipelined registers, and pipeline-related control logic....
[...]
...Hierarchical structural approaches based on constrained test generation avoid the exponential growth of test generation complexity by using simulationbased learning to describe the circuit at higher abstraction levels.(10,11) However, their test efficiency depends on the quality of the instruction templates and learned models, which cannot be guaranteed....
[...]