Papers
Topics
Authors
Recent
Gemini 2.5 Flash
Gemini 2.5 Flash
110 tokens/sec
GPT-4o
56 tokens/sec
Gemini 2.5 Pro Pro
44 tokens/sec
o3 Pro
6 tokens/sec
GPT-4.1 Pro
47 tokens/sec
DeepSeek R1 via Azure Pro
28 tokens/sec
2000 character limit reached

All Artificial, Less Intelligence: GenAI through the Lens of Formal Verification (2403.16750v1)

Published 25 Mar 2024 in cs.AI and cs.AR

Abstract: Modern hardware designs have grown increasingly efficient and complex. However, they are often susceptible to Common Weakness Enumerations (CWEs). This paper is focused on the formal verification of CWEs in a dataset of hardware designs written in SystemVerilog from Regenerative AI powered by LLMs. We applied formal verification to categorize each hardware design as vulnerable or CWE-free. This dataset was generated by 4 different LLMs and features a unique set of designs for each of the 10 CWEs we target in our paper. We have associated the identified vulnerabilities with CWE numbers for a dataset of 60,000 generated SystemVerilog Register Transfer Level (RTL) code. It was also found that most LLMs are not aware of any hardware CWEs; hence they are usually not considered when generating the hardware code. Our study reveals that approximately 60% of the hardware designs generated by LLMs are prone to CWEs, posing potential safety and security risks. The dataset could be ideal for training LLMs and Machine Learning (ML) algorithms to abstain from generating CWE-prone hardware designs.

Definition Search Book Streamline Icon: https://streamlinehq.com
References (23)
  1. “Benchmarking Large Language Models for Automated Verilog RTL Code Generation” In 2023 Design, Automation & Test in Europe Conference & Exhibition (DATE), 2023, pp. 1–6 DOI: 10.23919/DATE56975.2023.10137086
  2. Harry Foster “2022 Wilson Research Group Functional Verification Study”, 2022
  3. “The Hardware Trojan War: Attacks, Myths, and Defenses” Springer International Publishing, 2018
  4. P. Mishra, S. Bhunia and M. Tehranipoor “Hardware IP Security and Trust” Springer International Publishing, 2018
  5. “CWE - CWE-1194: Hardware Design (4.12) — cwe.mitre.org” [Accessed 11-09-2023], https://cwe.mitre.org/data/definitions/1194.html
  6. SecurityScorecard “CVE details: Intel: Vulnerability Statistics” [Accessed 11-09-2023], https://www.cvedetails.com/vendor/238/Intel.html
  7. SecurityScorecard “CVE details: Apple: Vulnerability Statistics” [Accessed 11-09-2023], https://www.cvedetails.com/vendor/49/Apple.html
  8. “PACMAN: Attacking ARM Pointer Authentication with Speculative Execution” In Proceedings of the 49th Annual International Symposium on Computer Architecture, ISCA ’22 New York, New York: Association for Computing Machinery, 2022 DOI: 10.1145/3470496.3527429
  9. Tae Kim “Intel’s alleged security flaw could cost chipmaker a lot of money, Bernstein says — cnbc.com” [Accessed 11-09-2023], https://www.cnbc.com/2018/01/03/intels-alleged-security-flaw-could-cost-chipmaker-a-lot-of-money-bernstein.html
  10. Erik Seligman, Tom Schubert and M V Achutha Kiran Kumar “Formal Verification, An Essential Toolkit for Modern VLSI Design” Morgan Kaufmann Publishers, 2015
  11. “A Semi-Formal Verification Methodology for Efficient Configuration Coverage of Highly Configurable Digital Designs” DVCon US, 2021
  12. “The FormAI Dataset: Generative AI in Software Security Through the Lens of Formal Verification”, 2023 arXiv:2307.02192
  13. “ChipGPT: How far are we from natural language hardware design”, 2023 arXiv:2305.14019
  14. “RTLLM: An Open-Source Benchmark for Design RTL Generation with Large Language Model”, 2023 arXiv:2308.05345
  15. “Chip-Chat: Challenges and Opportunities in Conversational Hardware Design”, 2023 arXiv:2305.13243
  16. “CWE - CWE-1194: Hardware Design (4.12) — cwe.mitre.org” [Accessed 11-09-2023], https://cwe.mitre.org/
  17. Rada Mihalcea, Hugo Liu and Henry Lieberman “NLP (Natural Language Processing) for NLP (Natural Language Programming)” In Computational Linguistics and Intelligent Text Processing Berlin, Heidelberg: Springer Berlin Heidelberg, 2006, pp. 319–330
  18. Daniel Gerl “Development of a Formal Verification Methodology for Safety Critical Designs”, 2023
  19. Aman Kumar “Pragmatic Formal Verification of Sequential Error Detection and Correction Codes (ECCs) used in Safety-Critical Design” DVCon US, 2023
  20. Aman Kumar “Development of a Verification Methodology for Efficient Configuration Coverage”, 2020
  21. HDLBits “Problem Sets” [Accessed 11-09-2023], https://hdlbits.01xz.net/wiki/Problem_sets
  22. “CodeGen: An Open Large Language Model for Code with Multi-Turn Program Synthesis”, 2023 arXiv:2203.13474
  23. Keerthikumara Devarajegowda, Wolfgang Ecker and Wolfgang Kunz “How to Keep 4-Eyes Principle in a Design and Property Generation Flow” In MBMV 2019; 22nd Workshop - Methods and Description Languages for Modelling and Verification of Circuits and Systems, 2019, pp. 1–6
User Edit Pencil Streamline Icon: https://streamlinehq.com
Authors (5)
  1. Deepak Narayan Gadde (10 papers)
  2. Aman Kumar (32 papers)
  3. Thomas Nalapat (2 papers)
  4. Evgenii Rezunov (2 papers)
  5. Fabio Cappellini (1 paper)
Citations (4)

Summary

We haven't generated a summary for this paper yet.