Llm for soc security: A paradigm shift

D Saha, S Tarek, K Yahyaei, SK Saha, J Zhou… - IEEE …, 2024 - ieeexplore.ieee.org
As the ubiquity and complexity of system-on-chip (SoC) designs increase across electronic
devices, incorporating security into an SoC design flow poses significant challenges …

Divas: An llm-based end-to-end framework for soc security analysis and policy-based protection

S Paria, A Dasgupta, S Bhunia - arXiv preprint arXiv:2308.06932, 2023 - arxiv.org
Securing critical assets in a bus-based System-On-Chip (SoC) is imperative to mitigate
potential vulnerabilities and prevent unauthorized access, ensuring the integrity, availability …

Unlocking hardware security assurance: The potential of llms

X Meng, A Srivastava, A Arunachalam, A Ray… - arXiv preprint arXiv …, 2023 - arxiv.org
System-on-Chips (SoCs) form the crux of modern computing systems. SoCs enable high-
level integration through the utilization of multiple Intellectual Property (IP) cores. However …

Llm-assisted generation of hardware assertions

R Kande, H Pearce, B Tan, B Dolan-Gavitt… - arXiv preprint arXiv …, 2023 - arxiv.org
The security of computer systems typically relies on a hardware root of trust. As
vulnerabilities in hardware can have severe implications on a system, there is a need for …

(Security) Assertions by Large Language Models

R Kande, H Pearce, B Tan… - IEEE Transactions …, 2024 - ieeexplore.ieee.org
The security of computer systems typically relies on a hardware root of trust. As
vulnerabilities in hardware can have severe implications on a system, there is a need for …

Qif-verilog: Quantitative information-flow based hardware description languages for pre-silicon security assessment

X Guo, RG Dutta, J He… - … on Hardware Oriented …, 2019 - ieeexplore.ieee.org
Hardware vulnerabilities are often due to design mistakes because the designer does not
sufficiently consider potential security vulnerabilities at the design stage. As a result, various …

Analyzing security vulnerabilities induced by high-level synthesis

N Pundir, S Aftabjahani, R Cammarota… - ACM Journal on …, 2022 - dl.acm.org
High-level synthesis (HLS) is essential to map the high-level language (HLL) description
(eg, in C/C++) of hardware design to the corresponding Register Transfer Level (RTL) to …

Software/hardware co-design for llm and its application for design verification

LJ Wan, Y Huang, Y Li, H Ye, J Wang… - 2024 29th Asia and …, 2024 - ieeexplore.ieee.org
The widespread adoption of Large Language Models (LLMs) is impeded by their
demanding compute and memory resources. The first task of this paper is to explore …

TaintFuzzer: SoC security verification using taint inference-enabled fuzzing

MM Hossain, NF Dipu, KZ Azar… - 2023 IEEE/ACM …, 2023 - ieeexplore.ieee.org
Modern System-on-Chip (SoC) designs containing sensitive information have become
targets of malicious attacks. Unfortunately, current verification practices still undermine the …

Soc security verification using property checking

N Farzana, F Rahman, M Tehranipoor… - 2019 IEEE …, 2019 - ieeexplore.ieee.org
Security of a system-on-chip (SoC) can be weakened by exploiting the inherent and
potential vulnerabilities of the intellectual property (IP) cores used to implement the design …