Chip-chat: Challenges and opportunities in conversational hardware design

J Blocklove, S Garg, R Karri… - 2023 ACM/IEEE 5th …, 2023 - ieeexplore.ieee.org
Modern hardware design starts with specifications provided in natural language. These are
then translated by hardware engineers into appropriate Hardware Description Languages …

An overview of hardware security and trust: Threats, countermeasures, and design tools

W Hu, CH Chang, A Sengupta, S Bhunia… - … on Computer-Aided …, 2020 - ieeexplore.ieee.org
Hardware security and trust have become a pressing issue during the last two decades due
to the globalization of the semiconductor supply chain and ubiquitous network connection of …

Asleep at the keyboard? assessing the security of github copilot's code contributions

H Pearce, B Ahmad, B Tan… - … IEEE Symposium on …, 2022 - ieeexplore.ieee.org
There is burgeoning interest in designing AI-based systems to assist humans in designing
computing systems, including tools that automatically generate computer code. The most …

Verigen: A large language model for verilog code generation

S Thakur, B Ahmad, H Pearce, B Tan… - ACM Transactions on …, 2024 - dl.acm.org
In this study, we explore the capability of Large Language Models (LLMs) to automate
hardware design by automatically completing partial Verilog code, a common language for …

{ÆPIC} leak: Architecturally leaking uninitialized data from the microarchitecture

P Borrello, A Kogler, M Schwarzl, M Lipp… - 31st USENIX Security …, 2022 - usenix.org
CPU vulnerabilities undermine the security guarantees provided by software-and hardware-
security improvements. While the discovery of transient-execution attacks increased the …

Benchmarking large language models for automated verilog rtl code generation

S Thakur, B Ahmad, Z Fan, H Pearce… - … , Automation & Test …, 2023 - ieeexplore.ieee.org
Automating hardware design could obviate a signif-icant amount of human error from the
engineering process and lead to fewer errors. Verilog is a popular hardware description …

Fuzzing hardware like software

T Trippel, KG Shin, A Chernyakhovsky, G Kelly… - 31st USENIX Security …, 2022 - usenix.org
Hardware flaws are permanent and potent: hardware cannot be patched once fabricated,
and any flaws may undermine even formally verified software executing on top …

Fixing hardware security bugs with large language models

B Ahmad, S Thakur, B Tan, R Karri… - arXiv preprint arXiv …, 2023 - arxiv.org
Novel AI-based code-writing Large Language Models (LLMs) such as OpenAI's Codex have
demonstrated capabilities in many coding-adjacent domains. In this work we consider how …

Llm-assisted generation of hardware assertions

R Kande, H Pearce, B Tan, B Dolan-Gavitt… - arXiv preprint arXiv …, 2023 - arxiv.org
The security of computer systems typically relies on a hardware root of trust. As
vulnerabilities in hardware can have severe implications on a system, there is a need for …

Hardware information flow tracking

W Hu, A Ardeshiricham, R Kastner - ACM Computing Surveys (CSUR), 2021 - dl.acm.org
Information flow tracking (IFT) is a fundamental computer security technique used to
understand how information moves through a computing system. Hardware IFT techniques …