Cyber Security News

How LLM-like Models like ChatGPT patch the Security Gaps in SoC Functions

The emergence of Large Language Models (LLMs) is transforming NLP, enhancing performance across NLG, NLU, and information retrieval tasks.

They are primarily excellent in text-related tasks like generation, summarization, translation, and reasoning, demonstrating remarkable mastership.

A group of cybersecurity analysts (Dipayan Saha, Shams Tarek, Katayoon Yahyaei, Sujan Kumar Saha, Jingbo Zhou, Mark Tehranipoor, and Farimah Farahmandi) from the Department of Electrical and Computer Engineering, University of Florida, Gainesville, FL, USA recently affirmed that LLM models like ChatGPT can patch the security gaps in SoC functions.

Document
FREE Demo

Deploy Advanced AI-Powered Email Security Solution

Implementing AI-Powered Email security solutions “Trustifi” can secure your business from today’s most dangerous email threats, such as Email Tracking, Blocking, Modifying, Phishing, Account Take Over, Business Email Compromise, Malware & Ransomware

LLM-like Models

The growing prevalence of system-on-chip (SoC) technology in various devices raises security concerns due to complex interactions among integrated IP cores, making SoCs vulnerable to threats like information leakage and access control violations.

The presence of third-party IPs, time-to-market pressures, and scalability issues challenge security verification for complex SoC designs. Current solutions struggle to keep up with evolving hardware threats and diverse designs.

Exploring LLMs in SoC security represents a promising opportunity to tackle complexity, diversity, and innovation.

LLMs have the potential to redefine security across domains through tailored learning, prompt engineering, and fidelity checks, with experts focusing on four key security tasks:-

  • Vulnerability Insertion
  • Security Assessment
  • Security Verification
  • Countermeasure Development
Potential applications of LLM in SoC security (Source – Arxiv)

Complex modern SoCs are prone to hidden vulnerabilities, and addressing bugs in the RTL design stage is crucial for cost-effective security verification, reads the paper published.

The Transformer model, introducing attention mechanisms and eliminating the need for recurrent or convolutional layers, paved the way for the evolution of language models. 

GPT-1, GPT-2, and GPT-3 pushed the boundaries of language modeling, while GPT-3.5 and GPT-4 further refined these capabilities, offering a range of models with varying token limits and optimizations.

From OpenAI’s ChatGPT to Google’s Bard and Baize to Anthropic’s Claude 2, Vicuna, and MosaicML’s MPT-Chat, recent advancements in LLMs highlight the pursuit of improved human-like text generation and extended capabilities.

Research questions

Here below, we have mentioned all the research questions:-

  • Can GPT insert vulnerability into a hardware design based on natural language instructions?
  • How can we ensure the soundness of the GPT-generated HDL designs?
  • Can GPT perform security verification?
  • Is GPT capable of identifying security threats?
  • Can GPT identify coding weaknesses in HDL?
  • Can GPT fix the security threats and generate a mitigated design?
  • How should the prompt be to perform hardware security tasks?
  • Can GPT handle large open-source designs?

GPT-3.5’s potential in embedding hardware vulnerabilities and CWEs is investigated due to the scarcity of databases in the hardware security domain.

In a study, security researchers assessed GPT-3.5 and GPT-4’s abilities to detect hardware Trojans in AES designs using different tests. GPT-3.5 showed limited knowledge and performance, while GPT-4 outperformed it with impressive accuracy. 

GPT-4’s ability highlights its potential as a valuable tool for hardware security assessments, offering advantages over traditional machine learning approaches. 

It addresses design dependencies and offers a more holistic analysis of hardware designs, improving Trojan detection.

Protect yourself from vulnerabilities using Patch Manager Plus to patch over 850 third-party applications quickly. Take advantage of the free trial to ensure 100% security.

Tushar Subhra Dutta

Tushar is a Cyber security content editor with a passion for creating captivating and informative content. With years of experience under his belt in Cyber Security, he is covering Cyber Security News, technology and other news.

Recent Posts

Cybersecurity in Mergers and Acquisitions – CISO Focus

Cybersecurity in mergers and acquisitions is crucial, as M&A activities represent key inflection points for…

1 hour ago

Top Cybersecurity Trends Every CISO Must Watch in 2025

In 2025, cybersecurity trends for CISOs will reflect a landscape that is more dynamic and…

1 hour ago

Zero Trust Architecture – A CISO’s Blueprint for Modern Security

Zero-trust architecture has become essential for securing operations in today’s hyper-connected world, where corporate network…

1 hour ago

Chrome 136 Released With Patch For 20-Year-Old Privacy Vulnerability

The Chrome team has officially promoted Chrome 136 to the stable channel for Windows, Mac,…

2 hours ago

SecAI Debuts at RSA 2025, Redefining Threat Investigation with AI

By fusing agentic AI and contextual threat intelligence, SecAI transforms investigation from a bottleneck into…

12 hours ago

How Healthcare Providers Investigate And Prevent Cyber Attacks: Real-world Examples

According to IBM Security annual research, "Cost of a Data Breach Report 2024", an average…

12 hours ago