Hardware Design and Security Needs Attention: From Survey to Path Forward

📅 2025-04-11
📈 Citations: 0
Influential: 0
📄 PDF
🤖 AI Summary
This work addresses the limited adaptability of AI models to hardware design automation and security verification. We systematically survey attention-based mechanisms—including large language models (LLMs) and graph attention networks (GATs)—applied to RTL generation, vulnerability detection, and chip floorplanning. For the first time, we comprehensively analyze 30 representative methods and propose the LLM-HDL co-design paradigm: a cross-disciplinary framework integrating IP reuse and formal security verification. Leveraging HDL-specific datasets and RTL-level automated code generation, we realize an end-to-end closed-loop design flow. Our study identifies critical bottlenecks—including model interpretability, hardware-semantic alignment, and industrial deployment feasibility—and establishes a scalable, LLM-driven hardware design framework with a concrete roadmap for security enhancement. The framework bridges academic research and industrial practice, enabling rigorous, automated, and trustworthy hardware development.

Technology Category

Application Category

📝 Abstract
Recent advances in attention-based artificial intelligence (AI) models have unlocked vast potential to automate digital hardware design while enhancing and strengthening security measures against various threats. This rapidly emerging field leverages Large Language Models (LLMs) to generate HDL code, identify vulnerabilities, and sometimes mitigate them. The state of the art in this design automation space utilizes optimized LLMs with HDL datasets, creating automated systems for register-transfer level (RTL) generation, verification, and debugging, and establishing LLM-driven design environments for streamlined logic designs. Additionally, attention-based models like graph attention have shown promise in chip design applications, including floorplanning. This survey investigates the integration of these models into hardware-related domains, emphasizing logic design and hardware security, with or without the use of IP libraries. This study explores the commercial and academic landscape, highlighting technical hurdles and future prospects for automating hardware design and security. Moreover, it provides new insights into the study of LLM-driven design systems, advances in hardware security mechanisms, and the impact of influential works on industry practices. Through the examination of 30 representative approaches and illustrative case studies, this paper underscores the transformative potential of attention-based models in revolutionizing hardware design while addressing the challenges that lie ahead in this interdisciplinary domain.
Problem

Research questions and friction points this paper is trying to address.

Automate hardware design using attention-based AI models
Enhance hardware security against various threats
Integrate LLMs for RTL generation and verification
Innovation

Methods, ideas, or system contributions that make the work stand out.

LLMs generate HDL code for automation
Attention-based models enhance hardware security
Optimized LLMs streamline RTL design processes
🔎 Similar Papers
No similar papers found.
S
Sujan Ghimire
Systems and Industrial Engineering Department, University of Arizona, Tucson, AZ, USA
M
Muhtasim Alam Chowdhury
Electrical and Computer Engineering Department, University of Arizona, Tucson, AZ, USA
B
B. S. Latibari
Electrical and Computer Engineering Department, University of Arizona, Tucson, AZ, USA
Muntasir Mamun
Muntasir Mamun
Graduate Research Assistant, PhD in Software Engineering, University of Arizona
Artificial intelligenceMachine learningCyber SecurityHealth CareVLSI Design
J
J. Carpenter
Electrical and Computer Engineering Department, University of Arizona, Tucson, AZ, USA
Benjamin Tan
Benjamin Tan
Assistant Professor, University of Calgary
Embedded SystemsEDAAI/MLCyber Security
H
H. Pearce
School of Computer Science and Engineering, University of New South Wales, Sydney, AU
Pratik Satam
Pratik Satam
Assistant Professor, University of Arizona
Smart ManufacturingCyber SecurityMachine Learning
Soheil Salehi
Soheil Salehi
Assistant Professor, ECE, University of Arizona
IoT Hardware SecurityAI-enabled SecurityReconfigurable ComputingSpintronicsNeuromorphic Hardware