pith. machine review for the scientific record. sign in

arxiv: 2603.08715 · v2 · submitted 2026-02-04 · 💻 cs.AR · cs.CL

Recognition: unknown

VeriInteresting: An Empirical Study of Model Prompt Interactions in Verilog Code Generation

Authors on Pith no claims yet
classification 💻 cs.AR cs.CL
keywords promptmodelcodegenerationreasoningverilogacrossbenchmarks
0
0 comments X
read the original abstract

Rapid advances in language models (LMs) have created new opportunities for automated code generation while complicating trade-offs between model characteristics and prompt design choices. In this work, we provide an empirical map of recent trends in LMs for Verilog code generation, focusing on interactions among model reasoning, specialization, and prompt engineering strategies. We evaluate a diverse set of small and large LMs, including general-purpose, reasoning, and domain-specific variants. Our experiments use a controlled factorial design spanning benchmark prompts, structured outputs, prompt rewriting, chain-of-thought reasoning, in-context learning, and evolutionary prompt optimization via Genetic-Pareto. Across two Verilog benchmarks, we identify patterns in how model classes respond to structured prompts and optimization, and we document which trends generalize across LMs and benchmarks versus those that are specific to particular model-prompt combinations.

This paper has not been read by Pith yet.

discussion (0)

Sign in with ORCID, Apple, or X to comment. Anyone can read and Pith papers without signing in.

Forward citations

Cited by 2 Pith papers

Reviewed papers in the Pith corpus that reference this work. Sorted by Pith novelty score.

  1. LLMs for Secure Hardware Design and Related Problems: Opportunities and Challenges

    cs.CR 2026-05 unverdicted novelty 3.0

    A survey of LLM applications in secure hardware design covering EDA synthesis, vulnerability analysis, countermeasures, and educational uses.

  2. LLMs for Secure Hardware Design and Related Problems: Opportunities and Challenges

    cs.CR 2026-05 accept novelty 2.0

    LLMs enable RTL code generation and vulnerability analysis in hardware design but introduce data contamination and adversarial risks that require red-teaming and dynamic benchmarking.