AutoFlows++: Hierarchical Message Flow Mining for System on Chip Designs
Pith reviewed 2026-05-10 15:31 UTC · model grok-4.3
The pith
AutoFlows++ mines message flows hierarchically from SoC communication traces by first extracting local patterns then composing global flows.
A machine-rendered reading of the paper's core claim, the machinery that carries it, and where it could break.
Core claim
AutoFlows++ is a design-architecture-guided hierarchical framework that performs local mining of simple communication patterns from individual interfaces followed by global mining to compose higher-level flows across multiple components, achieving significantly improved flow extraction accuracy compared to prior approaches on synthetic and GEM5-generated traces.
What carries the argument
The two-stage hierarchical mining process guided by design architecture, with local pattern extraction followed by global composition of flows.
If this is right
- Provides concise communication specifications useful for functional verification of SoC designs.
- Supports performance analysis by revealing actual communication behaviors across components.
- Facilitates post-silicon debugging with more accurate extraction from real traces.
- Avoids the explosion of candidate flows that occurs in prior methods on interleaved data.
Where Pith is reading between the lines
- The method could apply to traces from physical hardware if architecture details remain accessible.
- Similar local-to-global composition might help in mining patterns from other interleaved event logs such as network traffic or software execution.
- Without the architecture guidance, accuracy may drop in fully black-box systems lacking component interface definitions.
Load-bearing premise
That local patterns extracted from individual interfaces can be reliably composed into accurate global flows without missing causal relationships or generating an unmanageable number of candidates.
What would settle it
A comparison on a new complex SoC trace with known ground-truth flows where AutoFlows++ produces incorrect or incomplete global flows compared to the ground truth.
Figures
read the original abstract
Understanding communication behavior in modern system-on-chip (SoC) designs is critical for functional verification, performance analysis, and post-silicon debugging. Communication traces capture message exchanges among system components and provide valuable insights into system behavior. However, deriving concise communication specifications from such traces remains challenging due to interleaved instances of communication flows, and ambiguous causal relationships among messages. Existing mining approaches often struggle with scalability and ambiguity when traces contain complex interleaving of message patterns across multiple components. These conditions often lead to an explosion in the number of candidate flows and inaccurate extraction of communication behaviors. This paper presents AutoFlows++, a design-architecture-guided hierarchical framework for mining message flows from communication traces of complex SoC designs. AutoFlows++ operates in two stages: local mining followed by global mining. In the local mining stage, simple communication patterns are extracted from traces observed at individual communication interfaces between components. In the global mining stage, these local patterns are composed to identify higher-level message flows that characterize communication behavior across multiple components. Experimental results on both synthetic traces and traces generated from SoC models in GEM5 demonstrate that AutoFlows++ significantly improves flow extraction accuracy compared with prior approaches, highlighting its effectiveness for practical SoC validation tasks.
Editorial analysis
A structured set of objections, weighed in public.
Referee Report
Summary. The paper introduces AutoFlows++, a design-architecture-guided hierarchical framework for mining message flows from SoC communication traces. It operates in two stages: local mining extracts simple patterns from individual component interfaces, while global mining composes these into higher-level flows across multiple components. The central claim is that this approach significantly improves flow extraction accuracy over prior methods, as demonstrated on synthetic traces and GEM5-generated SoC traces.
Significance. If the empirical claims hold with proper validation, the work could meaningfully advance automated analysis tools for SoC functional verification, performance evaluation, and post-silicon debugging by addressing interleaving and causality challenges in communication traces. The hierarchical local-to-global structure offers a plausible path to scalability, and the use of architecture guidance is a reasonable design choice. However, the current lack of detailed quantitative evidence and unresolved questions around global composition limit its assessed impact.
major comments (2)
- [Experimental evaluation] Experimental evaluation section: The abstract asserts significant accuracy improvements on synthetic and GEM5 traces, yet no quantitative metrics (e.g., precision/recall/F1), baseline algorithm descriptions, trace counts, statistical tests, or analysis of post-hoc parameter choices are supplied. This absence directly undermines evaluation of the central empirical claim.
- [Global mining stage (Section 4)] Global mining stage (Section 4): The composition of local interface patterns into global flows is described at a high level using architecture guidance, but provides no explicit mechanisms (e.g., timing windows, message IDs, or causality rules) for resolving ambiguous ordering and interleaving across components. This is load-bearing for the reported gains, as the skeptic concern about missed cross-component links or candidate explosion remains unaddressed.
minor comments (2)
- [Abstract] The abstract would be strengthened by including at least one concrete accuracy metric or baseline name to ground the superiority claim.
- [Method description] Notation for local vs. global patterns could be clarified with a small example diagram or pseudocode snippet early in the method description.
Simulated Author's Rebuttal
We thank the referee for the constructive and detailed feedback on our manuscript. We appreciate the identification of areas where additional clarity and evidence are needed to strengthen the presentation of AutoFlows++. We address each major comment below and commit to revisions that directly respond to the concerns.
read point-by-point responses
-
Referee: [Experimental evaluation] Experimental evaluation section: The abstract asserts significant accuracy improvements on synthetic and GEM5 traces, yet no quantitative metrics (e.g., precision/recall/F1), baseline algorithm descriptions, trace counts, statistical tests, or analysis of post-hoc parameter choices are supplied. This absence directly undermines evaluation of the central empirical claim.
Authors: We agree that the experimental evaluation section requires substantial expansion to properly support the accuracy claims. In the revised manuscript, we will add quantitative results including precision, recall, and F1 scores for flow extraction on the synthetic traces and GEM5-generated SoC traces. We will describe the baseline algorithms in detail, specify the number and characteristics of traces evaluated, report statistical tests (such as paired t-tests with p-values) to confirm significance of improvements, and include sensitivity analysis for key parameters. These changes will enable a rigorous assessment of the empirical contributions. revision: yes
-
Referee: [Global mining stage (Section 4)] Global mining stage (Section 4): The composition of local interface patterns into global flows is described at a high level using architecture guidance, but provides no explicit mechanisms (e.g., timing windows, message IDs, or causality rules) for resolving ambiguous ordering and interleaving across components. This is load-bearing for the reported gains, as the skeptic concern about missed cross-component links or candidate explosion remains unaddressed.
Authors: We acknowledge that the current description of the global mining stage is high-level and does not fully specify the resolution mechanisms. In the revision, we will expand Section 4 with explicit details on how architecture guidance is operationalized: timing windows derived from component latency specifications in the design, message ID matching to link local patterns across interfaces, and causality rules extracted from the SoC architecture to enforce valid ordering and prune invalid compositions. This will directly address potential issues of missed cross-component links and candidate explosion, clarifying the load-bearing aspects of the hierarchical approach. revision: yes
Circularity Check
No circularity in algorithmic framework or empirical claims
full rationale
The paper presents a two-stage algorithmic framework (local pattern mining at interfaces followed by global composition of flows) without any equations, derivations, fitted parameters, or 'predictions' that reduce to inputs by construction. Claims of improved accuracy rest on experimental results using synthetic traces and GEM5-generated SoC traces, which constitute independent validation rather than self-referential fitting. No self-citations are invoked as load-bearing uniqueness theorems or ansatzes. The contribution is a new hierarchical mining procedure whose correctness is assessed externally via trace experiments, making the derivation self-contained.
Axiom & Free-Parameter Ledger
Reference graph
Works this paper leans on
-
[1]
Detecting api documentation errors
Hao Zhong and Zhendong Su. Detecting api documentation errors. OOPSLA’13, pages 803–816, New York, NY , USA, 2013. Association for Computing Machinery
work page 2013
-
[2]
Harris, Goerschwin Fey, and Mathias Soeken
Sandip Ray, Ian G. Harris, Goerschwin Fey, and Mathias Soeken. Mul- tilevel design understanding: From specification to logic invited paper. InProceedings of the 35th International Conference on Computer-Aided Design, ICCAD ’16, pages 133:1–133:6, 2016
work page 2016
-
[3]
Ray, J Bhadra, M Abadir, and Li-C Wang
W Chen, S. Ray, J Bhadra, M Abadir, and Li-C Wang. Challenges and trends in modern soc design verification.IEEE Design Test, 34(5):7–22, Oct 2017
work page 2017
-
[4]
Perracotta: Mining temporal api rules from imperfect traces
Jinlin Yang, David Evans, Deepali Bhardwaj, Thirumalesh Bhat, and Manuvir Das. Perracotta: Mining temporal api rules from imperfect traces. InProceedings of the 28th International Conference on Software Engineering, ICSE ’06, pages 282–291, 2006
work page 2006
- [5]
-
[6]
Learning temporal specifications from imperfect traces using bayesian inference
Artur Mrowca, Martin Nocker, Sebastian Steinhorst, and Stephan G¨unnemann. Learning temporal specifications from imperfect traces using bayesian inference. InProceedings of the 56th Annual Design Automation Conference 2019, DAC ’19, pages 96:1–96:6, 2019
work page 2019
-
[7]
Learning concise models from long execution traces
Natasha Jeppu, Tom Melham, Daniel Kroening, and John O’Leary. Learning concise models from long execution traces. InDAC ’20, June 2020
work page 2020
-
[8]
N. Binkert et al. The gem5 simulator.SIGARCH Comput. Archit. News, 39(2):1–7, aug 2011
work page 2011
-
[9]
Ivan Beschastnikh, Yuriy Brun, Sigurd Schneider, Michael Sloan, and Michael D. Ernst. Leveraging existing instrumentation to automatically infer invariant-constrained models. InProceedings of the 19th ACM SIG- SOFT Symposium and the 13th European Conference on Foundations of Software Engineering, ESEC/FSE ’11, pages 267–277, 2011
work page 2011
-
[10]
J. Yang, D. Evans, D. Bhardwaj, T. Bhat, and M. Das. Perracotta: Mining temporal api rules from imperfect traces. In28th International Conference on Software Engineering, pages 282–291, 2006
work page 2006
- [11]
-
[12]
Wil M. P. van der Aalst.Process Mining: Data Science in Action. Springer, 2nd edition, 2016
work page 2016
-
[13]
Christian W. G ¨unther and Wil M. P. van der Aalst. Fuzzy mining – adaptive process simplification based on multi-perspective metrics. In Gustavo Alonso, Peter Dadam, and Michael Rosemann, editors, Business Process Management, pages 328–343, Berlin, Heidelberg,
-
[14]
Springer Berlin Heidelberg
-
[15]
Specification mining for smart contracts with trace slicing and predicate abstraction
Ye Liu, Yixuan Liu, Yi Li, and Cyrille Artho. Specification mining for smart contracts with trace slicing and predicate abstraction. In 2025 IEEE International Conference on Software Analysis, Evolution and Reengineering (SANER), pages 147–158, 2025
work page 2025
-
[16]
Graph-based trace analysis for microservice architecture understanding and problem diagnosis
Xiaofeng Guo, Xin Peng, Hanzhang Wang, Wanxue Li, Huai Jiang, Dan Ding, Tao Xie, and Liangfei Su. Graph-based trace analysis for microservice architecture understanding and problem diagnosis. In Proceedings of the 28th ACM Joint Meeting on European Software Engineering Conference and Symposium on the Foundations of Software Engineering, ESEC/FSE 2020, pag...
work page 2020
-
[17]
Association for Computing Machinery
-
[18]
Wenchao Li, Alessandro Forin, and Sanjit A. Seshia. Scalable specifi- cation mining for verification and diagnosis. InProceedings of the 47th Design Automation Conference, DAC ’10, pages 755–760, New York, NY , USA, 2010
work page 2010
- [19]
- [20]
- [21]
- [22]
-
[23]
P. Chang and L. Wang. Automatic assertion extraction via sequential data mining of simulation traces. InASPDAC, 2010
work page 2010
-
[24]
Artmine: Automatic association rule mining with temporal behavior for hardware verification
Mohammad Reza Heidari Iman, Gert Jervan, and Tara Ghasempouri. Artmine: Automatic association rule mining with temporal behavior for hardware verification. In2024 Design, Automation & Test in Europe Conference & Exhibition (DATE), pages 1–6, 2024
work page 2024
-
[25]
M. J. Heule and S. Verwer. Software model synthesis using satisfiability solvers.Empirical Software Engineering, 18(4), 2013
work page 2013
-
[26]
K. J. Lang, B. A. Pearlmutter, and R. A. Price. Results of the abbadingo one dfa learning competition and a new evidence-driven state merging algorithm. InICGI, 1998
work page 1998
-
[27]
V . Ulyantsev and F. Tsarev. Extended finite-state machine induction using sat-solver. InICMLAW, volume 2, 2011
work page 2011
-
[28]
Inferring extended finite state machine models from software executions
Neil Walkinshaw, Ramsay Taylor, and John Derrick. Inferring extended finite state machine models from software executions. In2013 20th Working Conference on Reverse Engineering (WCRE), pages 301–310, 2013
work page 2013
- [29]
-
[30]
Automodel: Auto- matic synthesis of models from communication traces of soc designs
Md Rubel Ahmed, Bardia Nadimi, and Hao Zheng. Automodel: Auto- matic synthesis of models from communication traces of soc designs. IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems, pages 1–1, 2024
work page 2024
-
[31]
Autoflows: Inferring message flows from system communication traces
Bardia Nadimi and Hao Zheng. Autoflows: Inferring message flows from system communication traces. In2025 26th International Symposium on Quality Electronic Design (ISQED), pages 1–8, 2025
work page 2025
-
[32]
M. R. Ahmed, H. Zheng, P. Mukherjee, M. C. Ketkar, and J. Yang. Mining message flows from system-on-chip execution traces. In22nd ISQED. IEEE, 2021
work page 2021
-
[33]
X. Meng, K. Raj, S. Ray, and K. Basu. Sevnoc: Security validation of system-on-chip designs with noc fabrics.IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems, 2022
work page 2022
-
[34]
Time, clocks, and the ordering of events in a distributed system.Commun
Leslie Lamport. Time, clocks, and the ordering of events in a distributed system.Commun. ACM, 21(7):558–565, July 1978
work page 1978
-
[35]
Virtual time and global states of distributed systems
Friedemann Mattern. Virtual time and global states of distributed systems. 2002
work page 2002
-
[36]
Trace-based multi-dimensional root cause localization of performance issues in microservice systems
Chenxi Zhang, Zhen Dong, Xin Peng, Bicheng Zhang, and Miao Chen. Trace-based multi-dimensional root cause localization of performance issues in microservice systems. In2024 IEEE/ACM 46th International Conference on Software Engineering (ICSE), pages 1347–1358, 2024
work page 2024
-
[37]
Benjamin H. Sigelman, Luiz Andr ´e Barroso, Mike Burrows, Pat Stephenson, Manoj Plakal, Donald Beaver, Saul Jaspan, and Chandan Shanbhag. Dapper, a large-scale distributed systems tracing infrastruc- ture. InGoogle Technical Report, 2010
work page 2010
-
[38]
A multi-expert large language model architecture for verilog code generation
Bardia Nadimi and Hao Zheng. A multi-expert large language model architecture for verilog code generation. In2024 IEEE LLM Aided Design Workshop (LAD), pages 1–5, 2024
work page 2024
-
[39]
Pyranet: A multi- layered hierarchical dataset for verilog
Bardia Nadimi, Ghali Omar Boutaib, and Hao Zheng. Pyranet: A multi- layered hierarchical dataset for verilog. In2025 62nd ACM/IEEE Design Automation Conference (DAC), pages 1–7, 2025
work page 2025
-
[40]
Yang Zhao, Di Huang, Chongxiao Li, Pengwei Jin, Muxin Song, Yinan Xu, Ziyuan Nan, Mingju Gao, Tianyun Ma, Lei Qi, Yansong Pan, Zhenxing Zhang, Rui Zhang, Xishan Zhang, Zidong Du, Qi Guo, and Xing Hu. Codev: Empowering llms with hdl generation through multi- level summarization.IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems, ...
work page 1906
-
[41]
Verimind: Agentic llm for automated verilog generation with a novel evaluation metric, 2025
Bardia Nadimi, Ghali Omar Boutaib, and Hao Zheng. Verimind: Agentic llm for automated verilog generation with a novel evaluation metric, 2025
work page 2025
-
[42]
Specgen: Au- tomated generation of formal program specifications via large language models
Lezhi Ma, Shangqing Liu, Yi Li, Xiaofei Xie, and Lei Bu. Specgen: Au- tomated generation of formal program specifications via large language models. InProceedings of the IEEE/ACM 47th International Conference on Software Engineering, ICSE ’25, page 16–28. IEEE Press, 2025
work page 2025
-
[43]
Nl2ctl: Automatic generation of formal requirements specifications via large language models
Mengyan Zhao, Ran Tao, Yanhong Huang, Jianqi Shi, Shengchao Qin, and Yang Yang. Nl2ctl: Automatic generation of formal requirements specifications via large language models. In Kazuhiro Ogata, Dominique Mery, Meng Sun, and Shaoying Liu, editors,Formal Methods and Software Engineering, pages 1–17, Singapore, 2024. Springer Nature Singapore
work page 2024
-
[44]
System-on-chip message flow mining with masked-language models
Md Rubel Ahmed, Bardia Nadimi, and Hao Zheng. System-on-chip message flow mining with masked-language models. In2023 IEEE 66th International Midwest Symposium on Circuits and Systems (MWSCAS), pages 496–500, 2023
work page 2023
-
[45]
Tb or not tb: Coverage-driven direct preference optimization for verilog stimulus generation, 2025
Bardia Nadimi, Khashayar Filom, Deming Chen, and Hao Zheng. Tb or not tb: Coverage-driven direct preference optimization for verilog stimulus generation, 2025
work page 2025
-
[46]
Llms for hardware verification: Frameworks, techniques, and future directions
Khushboo Qayyum, Sallar Ahmadi-Pour, Chandan Kumar Jha, Muham- mad Hassan, and Rolf Drechsler. Llms for hardware verification: Frameworks, techniques, and future directions. In2024 IEEE 33rd Asian Test Symposium (ATS), pages 1–6, 2024
work page 2024
-
[47]
A. Blumer, A. Ehrenfeucht, D. Haussler, and M. K. Warmuth. Occam’s razor.Information Processing Letters, 24(6), 1987. Bardia Nadimireceived the B.S. degree in computer-hardware engineering and the M.S. degree in computer system architecture both from Shahid Beheshti University, Tehran, Iran, in 2017, and 2020 respectively. He is currently a Ph.D. candidat...
work page 1987
discussion (0)
Sign in with ORCID, Apple, or X to comment. Anyone can read and Pith papers without signing in.