Hardware Trojan Dataset of RISC-V and Web3 Generated with ChatGPT-4
Victor Takashi Hayashi () and
Wilson Vicente Ruggiero
Additional contact information
Victor Takashi Hayashi: Polytechnic School, University of São Paulo, Sao Paulo 05508-010, Brazil
Wilson Vicente Ruggiero: Polytechnic School, University of São Paulo, Sao Paulo 05508-010, Brazil
Data, 2024, vol. 9, issue 6, 1-15
Abstract:
Although hardware trojans impose a relevant threat to the hardware security of RISC-V and Web3 applications, existing datasets have a limited set of examples, as the most famous hardware trojan dataset TrustHub has 106 different trojans. RISC-V specifically has study cases of three and four different hardware trojans, and no research was found regarding Web3 hardware trojans in modules such as a hardware wallet. This research presents a dataset of 290 Verilog examples generated with ChatGPT-4 Large Language Model (LLM) based on 29 golden models and the TrustHub taxonomy. It is expected that this dataset supports future research endeavors regarding defense mechanisms against hardware trojans in RISC-V, hardware wallet, and hardware Proof of Work (PoW) miner.
Keywords: hardware trojan; RISC-V; Web3; Blockchain; LLM; ChatGPT (search for similar items in EconPapers)
JEL-codes: C8 C80 C81 C82 C83 (search for similar items in EconPapers)
Date: 2024
References: View complete reference list from CitEc
Citations:
Downloads: (external link)
https://www.mdpi.com/2306-5729/9/6/82/pdf (application/pdf)
https://www.mdpi.com/2306-5729/9/6/82/ (text/html)
Related works:
This item may be available elsewhere in EconPapers: Search for items with the same title.
Export reference: BibTeX
RIS (EndNote, ProCite, RefMan)
HTML/Text
Persistent link: https://EconPapers.repec.org/RePEc:gam:jdataj:v:9:y:2024:i:6:p:82-:d:1418306
Access Statistics for this article
Data is currently edited by Ms. Cecilia Yang
More articles in Data from MDPI
Bibliographic data for series maintained by MDPI Indexing Manager ().