Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Sofiène Tahar is active.

Publication


Featured researches published by Sofiène Tahar.


Microelectronics Journal | 2008

Review: Formal verification of analog and mixed signal designs: A survey

Mohamed H. Zaki; Sofiène Tahar; Guy Bois

Analog and mixed signal (AMS) designs are an important part of embedded systems that link digital designs to the analog world. Due to challenges associated with its verification process, AMS designs require a considerable portion of the total design cycle time. In contrast to digital designs, the verification of AMS systems is a challenging task that requires lots of expertise and deep understanding of their behavior. Researchers started lately studying the applicability of formal methods for the verification of AMS systems as a way to tackle the limitations of conventional verification methods like simulation. This paper surveys research activities in the formal verification of AMS designs as well as compares the different proposed approaches.


IEEE Transactions on Very Large Scale Integration Systems | 2006

Design and verification of SystemC transaction-level models

Ali Habibi; Sofiène Tahar

Transaction-level modeling allows exploring several SoC design architectures, leading to better performance and easier verification of the final product. In this paper, we present an approach to design and verify SystemC models at the transaction level. We integrate the verification as part of the design flow where we first model both the design and the properties (written in Property Specification language) in Unifed Modeling Language (UML); then, we translate them into an intermediate format modeled with AsmL [language based on Abstract State Machines (ASM)]. The AsmL model is used to generate a finite state machine of the design, including the properties. Checking the correctness of the properties is performed on the fly while generating the state machine. Finally, we translate the verified design to SystemC and map the properties to a set of assertions (as monitors in C#) that can be reused to validate the design at lower levels by simulation. For existing SystemC designs, we propose to translate the code back to AsmL in order to apply the same verification approach. At the SystemC level, we also present a genetic algorithm to enhance the assertions coverage. We will ensure the soundness of our approach by proving the correctness of the SystemC-to-AsmL and AsmL-to-SystemC transformations. We illustrate our approach on two case studies including the PCI bus standard and a master/slave generic architecture from the SystemC library.


design, automation, and test in europe | 2005

Design for Verification of SystemC Transaction Level Models

Ali Habibi; Sofiène Tahar

Transaction level modeling allows several SoC design architectures to be explored, leading to better performance and easier verification of the final product. We present an approach to design and verify SystemC models at the transaction level. We integrate the verification as part of the design-flow. In this approach, we first model both the design and the properties (written in PSL - Property Specification Language) in UML. Then, we translate them into an intermediate format modeled by abstract state machines (ASM). The ASM model is used to generate an FSM of the design including the properties. Checking the correctness of the properties is performed on-the-fly while generating the state machine. Finally, we translate the verified design to SystemC and map the properties to a set of assertions (as monitors in C#) that can be re-used to validate the design at lower levels through simulation. We illustrate our approach on two case studies, the PCI bus standard and a generic master/slave architecture from the SystemC library.


Design Automation for Embedded Systems | 2004

A Survey on IP Watermarking Techniques

Amr T. Abdel-Hamid; Sofiène Tahar; El Mostapha Aboulhamid

Intellectual property (IP) block reuse is essential for facilitating the design process of system-on-a-chip. Sharing IP designs poses significant high security risks. Recently, digital watermarking emerged as a candidate solution for copyright protection of IP blocks. In this paper, we survey and classify different techniques used for watermarking IP designs. To this end, we defined several evaluation criteria, which can also be used as a benchmark for new IP watermarking developments. Furthermore, we established a comprehensive set of requirements for future IP watermarking techniques.


interactive theorem proving | 2010

On the formalization of the lebesgue integration theory in HOL

Tarek Mhamdi; Osman Hasan; Sofiène Tahar

Lebesgue integration is a fundamental concept in many mathematical theories, such as real analysis, probability and information theory. Reported higher-order-logic formalizations of the Lebesgue integral either do not include, or have a limited support for the Borel algebra, which is the canonical sigma algebra used on any metric space over which the Lebesgue integral is defined. In this paper, we overcome this limitation by presenting a formalization of the Borel sigma algebra that can be used on any metric space, such as the complex numbers or the n-dimensional Euclidean space. Building on top of this framework, we have been able to prove some key Lebesgue integral properties, like its linearity and monotone convergence. Furthermore, we present the formalization of the “almost everywhere” relation and prove that the Lebesgue integral does not distinguish between functions which differ on a null set as well as other important results based on this concept. As applications, we present the verification of Markov and Chebyshev inequalities and the Weak Law of Large Numbers theorem.


IEEE Transactions on Industrial Electronics | 2015

Lyapunov-Based Adaptive State of Charge and State of Health Estimation for Lithium-Ion Batteries

Hicham Chaoui; Navid Golbon; Imad Hmouz; Ridha Souissi; Sofiène Tahar

This paper presents an adaptive state of charge (SOC) and state of health (SOH) estimation technique for lithium-ion batteries. The adaptive strategy estimates online parameters of the battery model using a Lyapunov-based adaptation law. Therefore, the adaptive observer stability is guaranteed by Lyapunovs direct method. Since no a priori knowledge of battery parameters is required, accurate estimation is still achieved, although parameters change due to aging or other factors. Unlike other estimation strategies, only battery terminal voltage and current measurements are required. Simulation and experimental results highlight the high SOC and SOH accuracy estimation of the proposed technique.


ieee international workshop on system on chip for real time applications | 2003

IP watermarking techniques: survey and comparison

Amr T. Abdel-Hamid; Sofiène Tahar; El Mostapha Aboulhamid

Intellectual property (IP) block reuse is essential for facilitating the design process of System-on-a-Chip. Sharing IP blocks in such a competitive market poses significant high security risks. IPs can be read, copied or even partitioned to cover the authorship proof. Creators and owners of IP designs want assurance that their content will not be illegally redistributed by consumers. Consumers, on the other hand, want assurance that the content they buy is legitimate. Digital watermarking, used with most of the shared digital media, has emerged as a candidate solution for helping copyright protection of IP blocks. In this paper, we outline IP watermarking and survey the current state-of- the-art of different schemes and algorithms. We also highlight the main technical problems that should be solved in order to let IP watermarking be used widely in industry.


design, automation, and test in europe | 2005

A Public-Key Watermarking Technique for IP Designs

Amr T. Abdel-Hamid; Sofiène Tahar; El Mostapha Aboulhamid

Sharing IP blocks in todays competitive market poses significant high security risks. Creators and owners of IP designs want assurances that their content will not be illegally redistributed by consumers, and consumers want assurances that the content they buy is legitimate. Recently, digital watermarking emerged as a candidate solution for copyright protection of IP blocks. In this paper, we propose a new approach for watermarking IP designs based on the embedding of the ownership proof as part of the IP designs finite state machine (FSM). The approach utilizes coinciding as well as unused transitions in the state transition graph of the design. Our approach increases the robustness of the watermark and allows a secure implementation, hence enabling the development of the first public-key IP watermarking scheme at the FSM level. We also define for our approach, and use experimental measures to prove its robustness.


IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems | 2008

IP Watermarking Using Incremental Technology Mapping at Logic Synthesis Level

Aijiao Cui; Chip-Hong Chang; Sofiène Tahar

This paper proposes an adaptive watermarking technique by modulating some closed cones in an originally optimized logic network (master design) for technology mapping. The headroom of each disjoint closed cone is evaluated based on its slack and slack sustainability. The notion of slack sustainability in conjunction with an embedding threshold enables closed cones in the critical path to be qualified as watermark hosts if their slacks can be better preserved upon remapping. The watermark is embedded by remapping only qualified disjoint closed cones randomly selected and templates constrained by the signature. This parametric formulation provides a means to capitalize on the headroom of a design to increase the signature length or strengthen the watermark resilience. With the master design, the watermarked design can be authenticated as in nonoblivious media watermarking. Experimental results show that the design can be efficiently marked by our method with low overhead.


design, automation, and test in europe | 2007

A symbolic methodology for the verification of analog and mixed signal designs

Ghiath Al-Sammane; Mohamed H. Zaki; Sofiène Tahar

The paper proposed a new symbolic verification methodology for proving the properties of analog and mixed signal (AMS) designs. Starting with an AMS description and a set of properties and using symbolic computation, a normal mathematical representation was extracted for the system in terms of recurrence equations. These normalized equations are used along with an induction verification strategy defined inside the computer algebra system Mathematica to prove the correctness of the properties. The methodology was applied on a third order DeltaSigma modulator

Collaboration


Dive into the Sofiène Tahar's collaboration.

Top Co-Authors

Avatar

Osman Hasan

National University of Sciences and Technology

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Paul Curzon

Queen Mary University of London

View shared research outputs
Top Co-Authors

Avatar

Xiaoyu Song

Portland State University

View shared research outputs
Top Co-Authors

Avatar
Researchain Logo
Decentralizing Knowledge