{"id":"https://openalex.org/W4415004231","doi":"https://doi.org/10.1109/mlcad65511.2025.11189143","title":"HADA: Leveraging Multi-Source Data to Train Large Language Models for Hardware Security Assertion Generation","display_name":"HADA: Leveraging Multi-Source Data to Train Large Language Models for Hardware Security Assertion Generation","publication_year":2025,"publication_date":"2025-09-08","ids":{"openalex":"https://openalex.org/W4415004231","doi":"https://doi.org/10.1109/mlcad65511.2025.11189143"},"language":"en","primary_location":{"id":"doi:10.1109/mlcad65511.2025.11189143","is_oa":false,"landing_page_url":"https://doi.org/10.1109/mlcad65511.2025.11189143","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2025 ACM/IEEE 7th Symposium on Machine Learning for CAD (MLCAD)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5062517894","display_name":"Weimin Fu","orcid":"https://orcid.org/0000-0002-9623-6522"},"institutions":[{"id":"https://openalex.org/I189590672","display_name":"Kansas State University","ror":"https://ror.org/05p1j8758","country_code":"US","type":"education","lineage":["https://openalex.org/I189590672"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"Weimin Fu","raw_affiliation_strings":["Kansas State University,Manhattan,USA"],"affiliations":[{"raw_affiliation_string":"Kansas State University,Manhattan,USA","institution_ids":["https://openalex.org/I189590672"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5102810576","display_name":"Yi\u2010Ting Wang","orcid":"https://orcid.org/0000-0003-2008-4435"},"institutions":[{"id":"https://openalex.org/I66946132","display_name":"University of Maryland, College Park","ror":"https://ror.org/047s2c258","country_code":"US","type":"education","lineage":["https://openalex.org/I66946132"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Yiting Wang","raw_affiliation_strings":["University of Maryland,College Park,USA"],"affiliations":[{"raw_affiliation_string":"University of Maryland,College Park,USA","institution_ids":["https://openalex.org/I66946132"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5102635008","display_name":"Zelin Lu","orcid":null},"institutions":[{"id":"https://openalex.org/I66946132","display_name":"University of Maryland, College Park","ror":"https://ror.org/047s2c258","country_code":"US","type":"education","lineage":["https://openalex.org/I66946132"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Zelin Lu","raw_affiliation_strings":["University of Maryland,College Park,USA"],"affiliations":[{"raw_affiliation_string":"University of Maryland,College Park,USA","institution_ids":["https://openalex.org/I66946132"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5076198928","display_name":"Xiaolong Guo","orcid":"https://orcid.org/0009-0007-1192-6203"},"institutions":[{"id":"https://openalex.org/I189590672","display_name":"Kansas State University","ror":"https://ror.org/05p1j8758","country_code":"US","type":"education","lineage":["https://openalex.org/I189590672"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Xiaolong Guo","raw_affiliation_strings":["Kansas State University,Manhattan,USA"],"affiliations":[{"raw_affiliation_string":"Kansas State University,Manhattan,USA","institution_ids":["https://openalex.org/I189590672"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5012474783","display_name":"Gang Qu","orcid":"https://orcid.org/0000-0001-6759-8949"},"institutions":[{"id":"https://openalex.org/I66946132","display_name":"University of Maryland, College Park","ror":"https://ror.org/047s2c258","country_code":"US","type":"education","lineage":["https://openalex.org/I66946132"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Gang Qu","raw_affiliation_strings":["University of Maryland,College Park,USA"],"affiliations":[{"raw_affiliation_string":"University of Maryland,College Park,USA","institution_ids":["https://openalex.org/I66946132"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":5,"corresponding_author_ids":["https://openalex.org/A5062517894"],"corresponding_institution_ids":["https://openalex.org/I189590672"],"apc_list":null,"apc_paid":null,"fwci":2.4738,"has_fulltext":false,"cited_by_count":1,"citation_normalized_percentile":{"value":0.90701536,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":97,"max":99},"biblio":{"volume":null,"issue":null,"first_page":"1","last_page":"7"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10743","display_name":"Software Testing and Debugging Techniques","score":0.9800999760627747,"subfield":{"id":"https://openalex.org/subfields/1712","display_name":"Software"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10743","display_name":"Software Testing and Debugging Techniques","score":0.9800999760627747,"subfield":{"id":"https://openalex.org/subfields/1712","display_name":"Software"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9639000296592712,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12034","display_name":"Digital and Cyber Forensics","score":0.963100016117096,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/assertion","display_name":"Assertion","score":0.8517000079154968},{"id":"https://openalex.org/keywords/correctness","display_name":"Correctness","score":0.7639999985694885},{"id":"https://openalex.org/keywords/benchmark","display_name":"Benchmark (surveying)","score":0.5134999752044678},{"id":"https://openalex.org/keywords/vulnerability","display_name":"Vulnerability (computing)","score":0.4431999921798706},{"id":"https://openalex.org/keywords/automation","display_name":"Automation","score":0.4334999918937683},{"id":"https://openalex.org/keywords/computer-security-model","display_name":"Computer security model","score":0.40070000290870667},{"id":"https://openalex.org/keywords/formal-verification","display_name":"Formal verification","score":0.35260000824928284}],"concepts":[{"id":"https://openalex.org/C40422974","wikidata":"https://www.wikidata.org/wiki/Q741248","display_name":"Assertion","level":2,"score":0.8517000079154968},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.769599974155426},{"id":"https://openalex.org/C55439883","wikidata":"https://www.wikidata.org/wiki/Q360812","display_name":"Correctness","level":2,"score":0.7639999985694885},{"id":"https://openalex.org/C185798385","wikidata":"https://www.wikidata.org/wiki/Q1161707","display_name":"Benchmark (surveying)","level":2,"score":0.5134999752044678},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.45100000500679016},{"id":"https://openalex.org/C95713431","wikidata":"https://www.wikidata.org/wiki/Q631425","display_name":"Vulnerability (computing)","level":2,"score":0.4431999921798706},{"id":"https://openalex.org/C115901376","wikidata":"https://www.wikidata.org/wiki/Q184199","display_name":"Automation","level":2,"score":0.4334999918937683},{"id":"https://openalex.org/C121822524","wikidata":"https://www.wikidata.org/wiki/Q5157582","display_name":"Computer security model","level":2,"score":0.40070000290870667},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.38119998574256897},{"id":"https://openalex.org/C111498074","wikidata":"https://www.wikidata.org/wiki/Q173326","display_name":"Formal verification","level":2,"score":0.35260000824928284},{"id":"https://openalex.org/C149635348","wikidata":"https://www.wikidata.org/wiki/Q193040","display_name":"Embedded system","level":1,"score":0.31529998779296875},{"id":"https://openalex.org/C10511746","wikidata":"https://www.wikidata.org/wiki/Q899388","display_name":"Data security","level":3,"score":0.31060001254081726},{"id":"https://openalex.org/C49895821","wikidata":"https://www.wikidata.org/wiki/Q5227368","display_name":"Data verification","level":2,"score":0.2897999882698059},{"id":"https://openalex.org/C9390403","wikidata":"https://www.wikidata.org/wiki/Q3966","display_name":"Computer hardware","level":1,"score":0.2888999879360199},{"id":"https://openalex.org/C195518309","wikidata":"https://www.wikidata.org/wiki/Q13424265","display_name":"Security testing","level":5,"score":0.2800000011920929},{"id":"https://openalex.org/C115903868","wikidata":"https://www.wikidata.org/wiki/Q80993","display_name":"Software engineering","level":1,"score":0.2736000120639801},{"id":"https://openalex.org/C2775924081","wikidata":"https://www.wikidata.org/wiki/Q55608371","display_name":"Control (management)","level":2,"score":0.26570001244544983},{"id":"https://openalex.org/C62913178","wikidata":"https://www.wikidata.org/wiki/Q7554361","display_name":"Software security assurance","level":4,"score":0.26089999079704285},{"id":"https://openalex.org/C67186912","wikidata":"https://www.wikidata.org/wiki/Q367664","display_name":"Data modeling","level":2,"score":0.25949999690055847},{"id":"https://openalex.org/C132964779","wikidata":"https://www.wikidata.org/wiki/Q2110223","display_name":"Raw data","level":2,"score":0.25600001215934753}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/mlcad65511.2025.11189143","is_oa":false,"landing_page_url":"https://doi.org/10.1109/mlcad65511.2025.11189143","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2025 ACM/IEEE 7th Symposium on Machine Learning for CAD (MLCAD)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":17,"referenced_works":["https://openalex.org/W2095410905","https://openalex.org/W2464661970","https://openalex.org/W2936148765","https://openalex.org/W2977663466","https://openalex.org/W4200152507","https://openalex.org/W4210725750","https://openalex.org/W4309698405","https://openalex.org/W4391182436","https://openalex.org/W4392405447","https://openalex.org/W4393145429","https://openalex.org/W4393145520","https://openalex.org/W4402125165","https://openalex.org/W4403023462","https://openalex.org/W4403024143","https://openalex.org/W4404134046","https://openalex.org/W4404739285","https://openalex.org/W4409282805"],"related_works":[],"abstract_inverted_index":{"Hardware":[0],"security":[1,34,105,141],"verification":[2,61,123],"is":[3,24],"critical":[4],"but":[5],"labor-intensive,":[6],"particularly":[7],"in":[8,138],"crafting":[9],"security-focused":[10],"assertions":[11,85],"for":[12,53,103],"assertion-based":[13],"verification.":[14,142],"While":[15],"large":[16],"language":[17],"models":[18],"offer":[19],"automation":[20],"potential,":[21],"their":[22,87],"performance":[23],"constrained":[25],"by":[26],"limited":[27],"domain-specific":[28],"training":[29],"data":[30,77],"and":[31,67,86,95,116,121,128],"fragmented":[32],"hardware":[33,64,104,140],"knowledge.":[35],"We":[36,90],"present":[37],"HADA":[38,111],"(Hardware":[39],"Assertion":[40],"through":[41],"Data":[42],"Augmentation),":[43],"a":[44,50,100],"novel":[45],"framework":[46],"that":[47,110],"systematically":[48],"constructs":[49],"fine-tuning":[51],"dataset":[52],"LLMs":[54,94],"using":[55],"three":[56],"complementary":[57],"sources:":[58],"(1)":[59],"formal":[60],"outputs,":[62],"(2)":[63],"vulnerability":[65],"databases,":[66],"(3)":[68],"version":[69],"control":[70],"histories":[71],"of":[72,82],"real-world":[73],"designs.":[74],"This":[75],"multi-source":[76],"augmentation":[78],"enables":[79],"the":[80],"generation":[81],"high-quality":[83],"SystemVerilog":[84],"contextual":[88],"explanations.":[89],"fine-tune":[91],"several":[92],"open-source":[93],"evaluate":[96],"them":[97],"on":[98],"HSAEval,":[99],"new":[101],"benchmark":[102],"assertion":[106,114],"tasks.":[107],"Results":[108],"show":[109],"significantly":[112],"improves":[113],"correctness":[115],"coverage,":[117],"outperforming":[118],"prior":[119],"syntactic":[120],"functional":[122],"approaches.":[124],"All":[125],"models,":[126],"datasets,":[127],"raw":[129],"evaluations":[130],"will":[131],"be":[132],"released":[133],"to":[134],"support":[135],"open":[136],"research":[137],"LLM-driven":[139]},"counts_by_year":[{"year":2026,"cited_by_count":1}],"updated_date":"2026-03-13T16:22:10.518609","created_date":"2025-10-10T00:00:00"}
