Chip-chat: Challenges and opportunities in conversational hardware design
Modern hardware design starts with specifications provided in natural language. These are
then translated by hardware engineers into appropriate Hardware Description Languages …
then translated by hardware engineers into appropriate Hardware Description Languages …
An overview of hardware security and trust: Threats, countermeasures, and design tools
Hardware security and trust have become a pressing issue during the last two decades due
to the globalization of the semiconductor supply chain and ubiquitous network connection of …
to the globalization of the semiconductor supply chain and ubiquitous network connection of …
Asleep at the keyboard? assessing the security of github copilot's code contributions
There is burgeoning interest in designing AI-based systems to assist humans in designing
computing systems, including tools that automatically generate computer code. The most …
computing systems, including tools that automatically generate computer code. The most …
Verigen: A large language model for verilog code generation
In this study, we explore the capability of Large Language Models (LLMs) to automate
hardware design by automatically completing partial Verilog code, a common language for …
hardware design by automatically completing partial Verilog code, a common language for …
{ÆPIC} leak: Architecturally leaking uninitialized data from the microarchitecture
CPU vulnerabilities undermine the security guarantees provided by software-and hardware-
security improvements. While the discovery of transient-execution attacks increased the …
security improvements. While the discovery of transient-execution attacks increased the …
Benchmarking large language models for automated verilog rtl code generation
Automating hardware design could obviate a signif-icant amount of human error from the
engineering process and lead to fewer errors. Verilog is a popular hardware description …
engineering process and lead to fewer errors. Verilog is a popular hardware description …
Fuzzing hardware like software
Hardware flaws are permanent and potent: hardware cannot be patched once fabricated,
and any flaws may undermine even formally verified software executing on top …
and any flaws may undermine even formally verified software executing on top …
Fixing hardware security bugs with large language models
Novel AI-based code-writing Large Language Models (LLMs) such as OpenAI's Codex have
demonstrated capabilities in many coding-adjacent domains. In this work we consider how …
demonstrated capabilities in many coding-adjacent domains. In this work we consider how …
Llm-assisted generation of hardware assertions
The security of computer systems typically relies on a hardware root of trust. As
vulnerabilities in hardware can have severe implications on a system, there is a need for …
vulnerabilities in hardware can have severe implications on a system, there is a need for …
Hardware information flow tracking
Information flow tracking (IFT) is a fundamental computer security technique used to
understand how information moves through a computing system. Hardware IFT techniques …
understand how information moves through a computing system. Hardware IFT techniques …