A Hierarchical and Configurable Strategy to Verify RISC-V based SOCs