{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,11]],"date-time":"2026-03-11T16:35:20Z","timestamp":1773246920136,"version":"3.50.1"},"reference-count":36,"publisher":"IEEE","license":[{"start":{"date-parts":[[2025,9,8]],"date-time":"2025-09-08T00:00:00Z","timestamp":1757289600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2025,9,8]],"date-time":"2025-09-08T00:00:00Z","timestamp":1757289600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/100000001","name":"National Science Foundation","doi-asserted-by":"publisher","id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2025,9,8]]},"DOI":"10.1109\/mlcad65511.2025.11189143","type":"proceedings-article","created":{"date-parts":[[2025,10,9]],"date-time":"2025-10-09T17:51:22Z","timestamp":1760032282000},"page":"1-7","source":"Crossref","is-referenced-by-count":1,"title":["HADA: Leveraging Multi-Source Data to Train Large Language Models for Hardware Security Assertion Generation"],"prefix":"10.1109","author":[{"given":"Weimin","family":"Fu","sequence":"first","affiliation":[{"name":"Kansas State University,Manhattan,USA"}]},{"given":"Yiting","family":"Wang","sequence":"additional","affiliation":[{"name":"University of Maryland,College Park,USA"}]},{"given":"Zelin","family":"Lu","sequence":"additional","affiliation":[{"name":"University of Maryland,College Park,USA"}]},{"given":"Xiaolong","family":"Guo","sequence":"additional","affiliation":[{"name":"Kansas State University,Manhattan,USA"}]},{"given":"Gang","family":"Qu","sequence":"additional","affiliation":[{"name":"University of Maryland,College Park,USA"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/jproc.2014.2335155"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1145\/2906147"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/tcad.2019.2944586"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1145\/3315574"},{"key":"ref5","first-page":"1803","article-title":"The unpatchable silicon: A full break of the bitstream encryption of xilinx 7-series fpgas","volume-title":"29th USENIX Security Symposium, USENIX Security 2020, August 12-14, 2020","author":"Ender"},{"key":"ref6","first-page":"213","article-title":"Hardfails: Insights into software-exploitable hardware bugs","volume-title":"28th USENIX Security Symposium, USENIX Security 2019, August 14-16, 2019","author":"Dessouky"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1145\/3565801"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/nanoarch53687.2021.9642252"},{"key":"ref9","doi-asserted-by":"crossref","DOI":"10.1109\/ITCIndia62949.2024.10651860","article-title":"LAAG-RV: LLM assisted assertion generation for RTL design verification","volume-title":"CoRR","author":"Maddala","year":"2024"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/tifs.2024.3372809"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/asianhost59942.2023.10409307"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1145\/3510578"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/TCSI.2024.3487486"},{"key":"ref14","article-title":"Using llms to facilitate formal verification of RTL","volume-title":"CoRR","author":"Orenes-Vera","year":"2023"},{"key":"ref15","article-title":"GPT-4 technical report","volume-title":"CoRR","year":"2023"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/asp-dac58780.2024.10473904"},{"key":"ref17","article-title":"The llama 3 herd of models","volume-title":"CoRR","author":"Dubey","year":"2024"},{"key":"ref18","article-title":"Llama 3.1 - 70b instruct model","author":"AI","year":"2024"},{"key":"ref19","article-title":"Llama 3.1 - 70b instruct model, \u201dLlama 3.2 - 3b model","author":"AI","year":"2024"},{"key":"ref20","article-title":"Gpt-4o mini: Advancing cost-efficient intelligence","year":"2024"},{"key":"ref21","doi-asserted-by":"crossref","DOI":"10.1109\/LAD62341.2024.10691792","article-title":"Assertllm: Generating and evaluating hardware verification assertions from design specifications via multi-llms","volume-title":"CoRR","author":"Fang","year":"2024"},{"key":"ref22","article-title":"Lora: Low-rank adaptation of large language models","volume-title":"International Conference on Learning Representations (ICLR)","author":"Hu"},{"key":"ref23","article-title":"PiSSA: Principal singular values and singular vectors adaptation of large language models","volume-title":"The Thirty-eighth Annual Conference on Neural Information Processing Systems","author":"Meng"},{"key":"ref24","article-title":"Unsloth: Efficient data loading and transformation for machine learning","year":"2023"},{"key":"ref25","article-title":"Flashattention-2: Faster attention with better parallelism and work partitioning","volume-title":"The Twelfth International Conference on Learning Representations, ICLR 2024, May 7-11, 2024","author":"Dao"},{"key":"ref26","article-title":"Liger kernel: Efficient triton kernels for LLM training","volume-title":"CoRR","author":"Hsu","year":"2024"},{"key":"ref27","article-title":"Bitsandbytes documentation","author":"Face","year":"2024"},{"key":"ref28","volume-title":"JasperGold Apps User\u2019s Guide","year":"2015"},{"key":"ref29","article-title":"Fveval: Understanding language model capabilities in formal verification of digital hardware","author":"Kang","year":"2024"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1145\/3649329.3657353"},{"key":"ref31","article-title":"DIVAS: an llm-based end-to-end framework for soc security analysis and policy-based protection","volume-title":"CoRR","author":"Paria","year":"2023"},{"key":"ref32","article-title":"Unlocking hardware security assurance: The potential of llms","volume-title":"CoRR","author":"Meng","year":"2023"},{"key":"ref33","article-title":"LLM4DV: using large language models for hardware test stimuli generation","volume-title":"CoRR","author":"Zhang","year":"2023"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1109\/asp-dac58780.2024.10473893"},{"key":"ref35","doi-asserted-by":"crossref","DOI":"10.1145\/3676536.3676801","article-title":"MEIC: re-thinking RTL debug automation using llms","volume-title":"CoRR","author":"Xu","year":"2024"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1109\/LAD62341.2024.10691801"}],"event":{"name":"2025 ACM\/IEEE 7th Symposium on Machine Learning for CAD (MLCAD)","location":"Santa Cruz, CA, USA","start":{"date-parts":[[2025,9,8]]},"end":{"date-parts":[[2025,9,10]]}},"container-title":["2025 ACM\/IEEE 7th Symposium on Machine Learning for CAD (MLCAD)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/11189084\/11189054\/11189143.pdf?arnumber=11189143","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,10,10]],"date-time":"2025-10-10T17:35:06Z","timestamp":1760117706000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/11189143\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,9,8]]},"references-count":36,"URL":"https:\/\/doi.org\/10.1109\/mlcad65511.2025.11189143","relation":{},"subject":[],"published":{"date-parts":[[2025,9,8]]}}}