These labels were automatically added by AI and may be inaccurate. For details, see About Literature Database.
Abstract
As modern hardware designs grow in complexity and size, ensuring security
across the confidentiality, integrity, and availability (CIA) triad becomes
increasingly challenging. Information flow tracking (IFT) is a widely-used
approach to tracing data propagation, identifying unauthorized activities that
may compromise confidentiality or/and integrity in hardware. However,
traditional IFT methods struggle with scalability and adaptability,
particularly in high-density and interconnected architectures, leading to
tracing bottlenecks that limit applicability in large-scale hardware. To
address these limitations and show the potential of transformer-based models in
integrated circuit (IC) design, this paper introduces LLM-IFT that integrates
large language models (LLM) for the realization of the IFT process in hardware.
LLM-IFT exploits LLM-driven structured reasoning to perform hierarchical
dependency analysis, systematically breaking down even the most complex
designs. Through a multi-step LLM invocation, the framework analyzes both
intra-module and inter-module dependencies, enabling comprehensive IFT
assessment. By focusing on a set of Trust-Hub vulnerability test cases at both
the IP level and the SoC level, our experiments demonstrate a 100\% success
rate in accurate IFT analysis for confidentiality and integrity checks in
hardware.