--- license: apache-2.0 language: - en --- # HardwarePhi 30k Iteration Result (have a upload issue, we would repair soon) ## Overview This document presents the results of the HardwarePhi model after 30,000 iterations. The model is based on the Phi1.5B architecture (old version) and has been trained using a specific dataset. **Author:** - Weimin Fu from [Kansas State University's Hardware Security Group](https://ece.k-state.edu/research/hardware-security/) **Corresponding Author:** - Xiaolong Guo - E-mail: guoxiaolong@k-state.edu **Acknowledgments:** - Common Crawl, CAD4Assurance, Trust-Hub, and open-source designers on GitHub and OpenCore support the data collection efforts. Their commitment to knowledge sharing is greatly appreciated. - Special thanks to Shijie Li and Yifang Zhao from the University of Science and Technology of China for their assistance in data collection. - Gratitude is extended to Kaichen Yang from the Electrical and Computer Engineering Department at Michigan Technological University for providing the training platform support. ## Dataset The training was performed using the following dataset: - [Hardware Code and Security Median Dataset](https://huggingface.co/datasets/KSU-HW-SEC/hardware_code_and_sec_median) ## Model Architecture The base model architecture used for this iteration is Phi1.5B (old version). This architecture provides the foundational structure and parameters for the HardwarePhi model. ## Iteration Details - **Iteration Count**: 30,000 ## Citation Information Please cite the following paper ``` @article{fuhardware, title={Hardware Phi-1.5 B: A Large Language Model Encodes Hardware Domain Specific Knowledge}, author={Fu, Weimin and Li, Shijie and Zhao, Yifang and Ma, Haocheng and Dutta, Raj and Zhang, Xuan and Yang, Kaichen and Jin, Yier and Guo, Xiaolong}, journal={29th IEEE/ACM Asia and South Pacific Design Automation Conference (ASP-DAC)}, year={2024} } ``` You can view the paper from arxiv: arxiv.org/abs/2402.01728 ### Update from our group for Hardware domain-specific LLM: Blog: [Large Language Model for Hardware Security](https://ece.k-state.edu/research/hardware-security/llm.html) HomePage: [Hardware Security Lab](https://ece.k-state.edu/research/hardware-security/) ## Acknowledgment Portions of this work were supported by the National Science Foundation (CCF-2019310, First Award Program of ARISE in EPSCoR 2148878).