One of the most useful features of Cogita-PRO is anomaly detection. By definition, an anomaly is something that happens unexpectedly and rarely, deviating from the norm — an outlier. These can be some of the most interesting situations to arise in chip verification … if we can find them.
Since DV is primarily spec-driven, traditional methods include directed and constrained-random tests with coverage models to flag bugs. We code what we can anticipate. But what about unexpected and, therefore, unmodeled bugs? Behaviors that our coverage models miss entirely?
And, of course, these anomalies can hide among millions of signals, thousands of modes and gigabytes of simulation logs. Humans simply can’t inspect this manually.
The challenge: catch unknown unknowns at scale.
In most cases, RTL and testbench bugs arise from a specific combination of data or an unusual sequence of events.
Cogita-PRO has a set of multiple anomaly-detection algorithms tailored for verification datasets.
Moreover, Cogita-PRO will use layers of anomaly detection algorithms to eliminate false-positives and ensure the user sees only the most relevant results. This pipelining of algorithms can be configured by the user or Cogita-PRO can gather results and provide a unified presentation of overall conclusions.
Data Scale Type: Large-scale high-dimensional (Big data set – lot of occurrences and lot of data fields columns)
Usecase/application: Model build on passing tests are used on failing test, subsystem or SoC level
Key benefits:
.png)
Data Scale Type: Large-scale high-dimensional (Big data set – lot of occurrences and lot of data fields columns)
Usecase/application: Detects anomalies in multi-field value combinations within single test execution
Key benefits:
.png)
Data Scale Type: Large-scale high-dimensional (Big data set – lot of occurrences and lot of data fields columns)
Application: Post-detection explainability layer that analyzes flagged anomalies to identify distinguishing characteristics compared to normal transactions within the test
Key benefits:
Data Scale Type: Small-scale and large-scale
Usecase/application: Identifies extreme value outliers, extreme successful occurrence values and timing distribution outliers
Key benefits:
.png)
Data Scale Type: Small-scale and large-scale
Usecase/application: This method is ideal for NoC fabrics and multi-path subsystems, where transaction routing exhibits high combinatorial diversity.
Key benefits:
This automatic classification reveals:
.png)
Data Scale Type: Small-scale and large-scale
Usecase/application: Protocol FSM verification, transaction type state tracking, multi-FSM concurrent analysis
Key benefits:
.png)
Data Scale Type: Small-scale and large-scale
Usecase/application: Temporal ordering violations, multi-FSM interaction patterns, causality chain analysis
Key benefits:
.png)
All anomaly detection algorithms can be deployed with Cogita-PRO in regression mode to perform real-time anomaly detection without user interaction. Then, in the event of an anomaly, an immediate alert is issued and the user can view the results, correlate the anomaly to any UVM errors or use it for regression triage. Cogita-PRO can then be launched in interactive mode and the regression results are immediately viewable.
Verification anomalies—whether data-driven or sequence-driven—are the hardest bugs to find because they represent rare combinations that appear only rarely. Cogita-PRO's suite of tailored algorithms automates their detection across all scales of verification data, from block-level to full SoC regression, enabling verification teams to focus on fixing bugs rather than hunting for them in massive log files.
%20(1).png)
One of the most useful features of Cogita-PRO is anomaly detection. By definition, an anomaly is something that happens unexpectedly and rarely, deviating from the norm — an outlier. These can be some of the most interesting situations to arise in chip verification … if we can find them.
Since DV is primarily spec-driven, traditional methods include directed and constrained-random tests with coverage models to flag bugs. We code what we can anticipate. But what about unexpected and, therefore, unmodeled bugs? Behaviors that our coverage models miss entirely?
And, of course, these anomalies can hide among millions of signals, thousands of modes and gigabytes of simulation logs. Humans simply can’t inspect this manually.
The challenge: catch unknown unknowns at scale.
In most cases, RTL and testbench bugs arise from a specific combination of data or an unusual sequence of events.
Cogita-PRO has a set of multiple anomaly-detection algorithms tailored for verification datasets.
Moreover, Cogita-PRO will use layers of anomaly detection algorithms to eliminate false-positives and ensure the user sees only the most relevant results. This pipelining of algorithms can be configured by the user or Cogita-PRO can gather results and provide a unified presentation of overall conclusions.
Data Scale Type: Large-scale high-dimensional (Big data set – lot of occurrences and lot of data fields columns)
Usecase/application: Model build on passing tests are used on failing test, subsystem or SoC level
Key benefits:
.png)
Data Scale Type: Large-scale high-dimensional (Big data set – lot of occurrences and lot of data fields columns)
Usecase/application: Detects anomalies in multi-field value combinations within single test execution
Key benefits:
.png)
Data Scale Type: Large-scale high-dimensional (Big data set – lot of occurrences and lot of data fields columns)
Application: Post-detection explainability layer that analyzes flagged anomalies to identify distinguishing characteristics compared to normal transactions within the test
Key benefits:
Data Scale Type: Small-scale and large-scale
Usecase/application: Identifies extreme value outliers, extreme successful occurrence values and timing distribution outliers
Key benefits:
.png)
Data Scale Type: Small-scale and large-scale
Usecase/application: This method is ideal for NoC fabrics and multi-path subsystems, where transaction routing exhibits high combinatorial diversity.
Key benefits:
This automatic classification reveals:
.png)
Data Scale Type: Small-scale and large-scale
Usecase/application: Protocol FSM verification, transaction type state tracking, multi-FSM concurrent analysis
Key benefits:
.png)
Data Scale Type: Small-scale and large-scale
Usecase/application: Temporal ordering violations, multi-FSM interaction patterns, causality chain analysis
Key benefits:
.png)
All anomaly detection algorithms can be deployed with Cogita-PRO in regression mode to perform real-time anomaly detection without user interaction. Then, in the event of an anomaly, an immediate alert is issued and the user can view the results, correlate the anomaly to any UVM errors or use it for regression triage. Cogita-PRO can then be launched in interactive mode and the regression results are immediately viewable.
Verification anomalies—whether data-driven or sequence-driven—are the hardest bugs to find because they represent rare combinations that appear only rarely. Cogita-PRO's suite of tailored algorithms automates their detection across all scales of verification data, from block-level to full SoC regression, enabling verification teams to focus on fixing bugs rather than hunting for them in massive log files.
Under specific traffic interleavings, one CPU experiences sporadic 10–50× memory access latency spikes, even though:
This only happens:
A rare interaction between:
The result:
Instead of checking:
“Did latency exceed X?”
Cogita-PRO detects: