All Artificial, Less Intelligence: GenAI through the Lens of Formal Verification (2403.16750v1)
Abstract: Modern hardware designs have grown increasingly efficient and complex. However, they are often susceptible to Common Weakness Enumerations (CWEs). This paper is focused on the formal verification of CWEs in a dataset of hardware designs written in SystemVerilog from Regenerative AI powered by LLMs. We applied formal verification to categorize each hardware design as vulnerable or CWE-free. This dataset was generated by 4 different LLMs and features a unique set of designs for each of the 10 CWEs we target in our paper. We have associated the identified vulnerabilities with CWE numbers for a dataset of 60,000 generated SystemVerilog Register Transfer Level (RTL) code. It was also found that most LLMs are not aware of any hardware CWEs; hence they are usually not considered when generating the hardware code. Our study reveals that approximately 60% of the hardware designs generated by LLMs are prone to CWEs, posing potential safety and security risks. The dataset could be ideal for training LLMs and Machine Learning (ML) algorithms to abstain from generating CWE-prone hardware designs.
- “Benchmarking Large Language Models for Automated Verilog RTL Code Generation” In 2023 Design, Automation & Test in Europe Conference & Exhibition (DATE), 2023, pp. 1–6 DOI: 10.23919/DATE56975.2023.10137086
- Harry Foster “2022 Wilson Research Group Functional Verification Study”, 2022
- “The Hardware Trojan War: Attacks, Myths, and Defenses” Springer International Publishing, 2018
- P. Mishra, S. Bhunia and M. Tehranipoor “Hardware IP Security and Trust” Springer International Publishing, 2018
- “CWE - CWE-1194: Hardware Design (4.12) — cwe.mitre.org” [Accessed 11-09-2023], https://cwe.mitre.org/data/definitions/1194.html
- SecurityScorecard “CVE details: Intel: Vulnerability Statistics” [Accessed 11-09-2023], https://www.cvedetails.com/vendor/238/Intel.html
- SecurityScorecard “CVE details: Apple: Vulnerability Statistics” [Accessed 11-09-2023], https://www.cvedetails.com/vendor/49/Apple.html
- “PACMAN: Attacking ARM Pointer Authentication with Speculative Execution” In Proceedings of the 49th Annual International Symposium on Computer Architecture, ISCA ’22 New York, New York: Association for Computing Machinery, 2022 DOI: 10.1145/3470496.3527429
- Tae Kim “Intel’s alleged security flaw could cost chipmaker a lot of money, Bernstein says — cnbc.com” [Accessed 11-09-2023], https://www.cnbc.com/2018/01/03/intels-alleged-security-flaw-could-cost-chipmaker-a-lot-of-money-bernstein.html
- Erik Seligman, Tom Schubert and M V Achutha Kiran Kumar “Formal Verification, An Essential Toolkit for Modern VLSI Design” Morgan Kaufmann Publishers, 2015
- “A Semi-Formal Verification Methodology for Efficient Configuration Coverage of Highly Configurable Digital Designs” DVCon US, 2021
- “The FormAI Dataset: Generative AI in Software Security Through the Lens of Formal Verification”, 2023 arXiv:2307.02192
- “ChipGPT: How far are we from natural language hardware design”, 2023 arXiv:2305.14019
- “RTLLM: An Open-Source Benchmark for Design RTL Generation with Large Language Model”, 2023 arXiv:2308.05345
- “Chip-Chat: Challenges and Opportunities in Conversational Hardware Design”, 2023 arXiv:2305.13243
- “CWE - CWE-1194: Hardware Design (4.12) — cwe.mitre.org” [Accessed 11-09-2023], https://cwe.mitre.org/
- Rada Mihalcea, Hugo Liu and Henry Lieberman “NLP (Natural Language Processing) for NLP (Natural Language Programming)” In Computational Linguistics and Intelligent Text Processing Berlin, Heidelberg: Springer Berlin Heidelberg, 2006, pp. 319–330
- Daniel Gerl “Development of a Formal Verification Methodology for Safety Critical Designs”, 2023
- Aman Kumar “Pragmatic Formal Verification of Sequential Error Detection and Correction Codes (ECCs) used in Safety-Critical Design” DVCon US, 2023
- Aman Kumar “Development of a Verification Methodology for Efficient Configuration Coverage”, 2020
- HDLBits “Problem Sets” [Accessed 11-09-2023], https://hdlbits.01xz.net/wiki/Problem_sets
- “CodeGen: An Open Large Language Model for Code with Multi-Turn Program Synthesis”, 2023 arXiv:2203.13474
- Keerthikumara Devarajegowda, Wolfgang Ecker and Wolfgang Kunz “How to Keep 4-Eyes Principle in a Design and Property Generation Flow” In MBMV 2019; 22nd Workshop - Methods and Description Languages for Modelling and Verification of Circuits and Systems, 2019, pp. 1–6
- Deepak Narayan Gadde (10 papers)
- Aman Kumar (32 papers)
- Thomas Nalapat (2 papers)
- Evgenii Rezunov (2 papers)
- Fabio Cappellini (1 paper)