In modern ASIC and FPGA verification, the hardest bugs to find are those triggered by rare data combinations or unusual event sequences—patterns that appear only once in millions of transactions. Traditional debug approaches require manual log inspection, making root cause analysis time-consuming and error-prone. Cogita-PRO addresses this challenge with a comprehensive suite of AI-powered anomaly detection algorithms specifically tailored for verification data.
Verification failures typically fall into two categories:
1. Data Anomalies: A unique combination of transaction field values that has never occurred before. The key question: What makes this transaction different from all others in the test?
2. Sequence Pattern Anomalies: Errors caused not by unusual data, but by a unique ordering of events that deviates from expected protocol flows. The key question: What sequence of interactions led to the failure?
Cogita-PRO provides specialized detection methods for both anomaly types, enabling automatic identification of root causes without manual scripting or exhaustive log analysis.
Cogita-PRO employs four complementary methods for detecting unusual data patterns:
Machine Learning Approaches (Large-Scale Data)
Neural Networks train on passing tests to learn complex, non-linear feature interactions, then identify anomalous transactions in failing tests. Ensemble Methods combine multiple algorithms to detect rare multi-dimensional field combinations through consensus voting, reducing false positives while highlighting specific problematic field combinations.
Key Benefits:
Use Cases: SoC-level integration, interconnect fabrics, protocols where bugs manifest as specific combinations of addresses, transaction types, and state values.
Statistical and Explainability Methods
Statistical Outlier Detection provides fast, training-free analysis to identify extreme values, timing violations, and frequency anomalies—ideal for interactive debug sessions and timing-related bugs.
Describe Analysis serves as the critical explainability layer, translating anomaly scores into actionable insights by identifying which specific fields deviate from baseline and quantifying how suspect transactions differ from normal behavior.
Key Benefits:
Cogita-PRO provides three methods for detecting temporal and ordering violations:
Transaction Path Analysis
Automatically extracts all routing paths from logs, clusters them into unique types, and compares against golden reference models from passing tests. Ideal for NoC fabrics and multi-path subsystems with high routing diversity.
Workflow Example:
Discrete State Machine Analysis
Two complementary methods validate protocol behavior:
Transition Extraction builds complete state graphs from logs, detecting illegal transitions and tracking multi-FSM correlations—perfect for cache coherency (MESI/MOESI) and flow control validation.
Sequence Extraction analyzes temporal event ordering across multiple fields, detecting illegal sequences and revealing unexpected cross-FSM dependencies—essential for deadlock debugging and causality violations.
Combined Benefits:
Concrete Results:
Verification anomalies represent the hardest class of bugs because they occur exactly once—unique combinations that standard checkers and assertions cannot anticipate. Cogita-PRO's integrated approach combines:
By automating both the detection and explanation of data and sequence anomalies, Cogita-PRO enables verification teams to focus on fixing bugs rather than hunting for them in massive log files—accelerating time-to-tapeout while improving coverage confidence.
Ready to transform your debug workflow? Contact us to see how Cogita-PRO integrates into your verification environment and reduces debug time by orders of magnitude.