LLM-IFT: LLM-Powered Information Flow Tracking for Secure Hardware
By: Nowfel Mashnoor , Mohammad Akyash , Hadi Kamali and more
Potential Business Impact:
Finds hidden security flaws in computer chips.
As modern hardware designs grow in complexity and size, ensuring security across the confidentiality, integrity, and availability (CIA) triad becomes increasingly challenging. Information flow tracking (IFT) is a widely-used approach to tracing data propagation, identifying unauthorized activities that may compromise confidentiality or/and integrity in hardware. However, traditional IFT methods struggle with scalability and adaptability, particularly in high-density and interconnected architectures, leading to tracing bottlenecks that limit applicability in large-scale hardware. To address these limitations and show the potential of transformer-based models in integrated circuit (IC) design, this paper introduces LLM-IFT that integrates large language models (LLM) for the realization of the IFT process in hardware. LLM-IFT exploits LLM-driven structured reasoning to perform hierarchical dependency analysis, systematically breaking down even the most complex designs. Through a multi-step LLM invocation, the framework analyzes both intra-module and inter-module dependencies, enabling comprehensive IFT assessment. By focusing on a set of Trust-Hub vulnerability test cases at both the IP level and the SoC level, our experiments demonstrate a 100\% success rate in accurate IFT analysis for confidentiality and integrity checks in hardware.
Similar Papers
The Universal Landscape of Human Reasoning
Computation and Language
Tracks how your brain solves problems step-by-step.
LibIHT: A Hardware-Based Approach to Efficient and Evasion-Resistant Dynamic Binary Analysis
Cryptography and Security
Finds hidden computer viruses without slowing them down.
Hardware Design and Security Needs Attention: From Survey to Path Forward
Cryptography and Security
AI designs computer chips and finds security flaws.