Detection and Repair of Defects in Register Transfer Level Code Using Static Analysis and Generative AI

Guardat en:
Dades bibliogràfiques
Publicat a:ProQuest Dissertations and Theses (2025)
Autor principal: Ahmad, Baleegh
Publicat:
ProQuest Dissertations & Theses
Matèries:
Accés en línia:Citation/Abstract
Full Text - PDF
Etiquetes: Afegir etiqueta
Sense etiquetes, Sigues el primer a etiquetar aquest registre!

MARC

LEADER 00000nab a2200000uu 4500
001 3208320840
003 UK-CbPIL
020 |a 9798315745419 
035 |a 3208320840 
045 2 |b d20250101  |b d20251231 
084 |a 66569  |2 nlm 
100 1 |a Ahmad, Baleegh 
245 1 |a Detection and Repair of Defects in Register Transfer Level Code Using Static Analysis and Generative AI 
260 |b ProQuest Dissertations & Theses  |c 2025 
513 |a Dissertation/Thesis 
520 3 |a The detection and repair of hardware bugs have become increasingly important over the past decade. In particular, security-related issues arising from these bugs have been the focus of significant academic and industrial efforts. It is crucial to detect defects in hardware as early as possible to reduce costs, efforts, and damage to reputation down the line. Existing solutions rely on design-specific information, expertise, and techniques. These constraints limit the generalizability of solutions across various digital designs, restricting automation and scalability. Additionally, security verification is inherently non-exhaustive, as some vulnerabilities only emerge when exploited by malicious actors. Another limitation of current approaches is their lack of ability to `learn' from previous issues and solutions.This thesis provides some strategies, including Static Analysis and Generative AI, for applying bug detection and repair techniques at an earlier stage of the system-on-chip (SoC) development lifecycle - without needing a full-fledged testing framework. These strategies are employed at the register-transfer level (RTL) code by examining the structure and elements of the code, along with associated information like specifications, comments, and more general guidelines for secure code like the Common Weakness Enumerations (CWEs). The contributions include: i) improving generalizability by moving away from design-specific frameworks and implementing scanners that can identify a broad range of vulnerabilities i.e., CWEs; ii) focusing on security-related bugs to develop security aware linters and fix security bugs by using LLMs; and iii) leveraging LLMs to execute detection and repair of bugs at RTL, demonstrating how generative AI-based tools can succeed by learning from training, fine-tuning, and in-context learning. 
653 |a Electrical engineering 
653 |a Computer engineering 
653 |a Artificial intelligence 
773 0 |t ProQuest Dissertations and Theses  |g (2025) 
786 0 |d ProQuest  |t ProQuest Dissertations & Theses Global 
856 4 1 |3 Citation/Abstract  |u https://www.proquest.com/docview/3208320840/abstract/embedded/6A8EOT78XXH2IG52?source=fedsrch 
856 4 0 |3 Full Text - PDF  |u https://www.proquest.com/docview/3208320840/fulltextPDF/embedded/6A8EOT78XXH2IG52?source=fedsrch