Select Publications

Journal articles

Udeshi M; Krishnamurthy P; Pearce H; Karri R; Khorrami F, 2024, 'REMaQE: Reverse Engineering Math Equations from Executables', ACM Transactions on Cyber-Physical Systems, http://dx.doi.org/10.1145/3699674

Surabhi VR; Sadhukhan R; Raz M; Pearce H; Krishnamurthy P; Trujillo J; Karri R; Khorrami F, 2024, 'FEINT: Automated Framework for Efficient INsertion of Templates/Trojans into FPGAs', Information (Switzerland), 15, http://dx.doi.org/10.3390/info15070395

Thakur S; Ahmad B; Pearce H; Tan B; Dolan-Gavitt B; Karri R; Garg S, 2024, 'VeriGen: A Large Language Model for Verilog Code Generation', ACM Transactions on Design Automation of Electronic Systems, 29, http://dx.doi.org/10.1145/3643681

Kande R; Pearce H; Tan B; Dolan-Gavitt B; Thakur S; Karri R; Rajendran J, 2024, '(Security) Assertions by Large Language Models', IEEE Transactions on Information Forensics and Security, 19, pp. 4374 - 4389, http://dx.doi.org/10.1109/TIFS.2024.3372809

Ahmad B; Thakur S; Tan B; Karri R; Pearce H, 2024, 'On Hardware Security Bug Code Fixes by Prompting Large Language Models', IEEE Transactions on Information Forensics and Security, 19, pp. 4043 - 4057, http://dx.doi.org/10.1109/TIFS.2024.3374558

Baird A; Panda A; Pearce H; Pinisetty S; Roop P, 2024, 'Scalable Security Enforcement for Cyber Physical Systems', IEEE Access, 12, pp. 14385 - 14410, http://dx.doi.org/10.1109/ACCESS.2024.3357714

Krishnamurthy P; Surabhi VR; Pearce H; Karri R; Khorrami F, 2023, 'Multi-Modal Side Channel Data Driven Golden-Free Detection of Software and Firmware Trojans', IEEE Transactions on Dependable and Secure Computing, 20, pp. 4664 - 4677, http://dx.doi.org/10.1109/TDSC.2022.3231632

Pearce H; Karri R; Tan B, 2023, 'High-Level Approaches to Hardware Security: A Tutorial', ACM Transactions on Embedded Computing Systems, 22, http://dx.doi.org/10.1145/3577200

Pearce H; Roop P, 2023, 'Decoding ChatGPT's 'impact' on the future of healthcare', Cancer Research, Statistics, and Treatment, 6, pp. 91 - 93, http://dx.doi.org/10.4103/crst.crst_84_23

Mac G; Mandal M; Rastogi A; Gailani G; Pearce H; Gupta N, 2022, 'Application of micro-computed tomography for authentication of 3D printed composite parts', Additive Manufacturing Letters, 3, http://dx.doi.org/10.1016/j.addlet.2022.100104

Pearce H; Yanamandra K; Gupta N; Karri R, 2022, 'FLAW3D: A Trojan-Based Cyber Attack on the Physical Outcomes of Additive Manufacturing', IEEE/ASME Transactions on Mechatronics, 27, pp. 5361 - 5370, http://dx.doi.org/10.1109/TMECH.2022.3179713

Srivastava H; Pearce H; Mac G; Gupta N, 2022, 'Determination of Fiber Content in 3-D Printed Composite Parts Using Image Analysis', IEEE Embedded Systems Letters, 14, pp. 115 - 118, http://dx.doi.org/10.1109/LES.2022.3140417

Beckwith C; Naicker HS; Mehta S; Udupa VR; Nim NT; Gadre V; Pearce H; Mac G; Gupta N, 2022, 'Needle in a Haystack: Detecting Subtle Malicious Edits to Additive Manufacturing G-Code Files', IEEE Embedded Systems Letters, 14, pp. 111 - 114, http://dx.doi.org/10.1109/LES.2021.3129108

Pearce H; Surabhi VR; Krishnamurthy P; Trujillo J; Karri R; Khorrami F, 2022, 'Detecting Hardware Trojans in PCBs Using Side Channel Loopbacks', IEEE Transactions on Very Large Scale Integration (VLSI) Systems, 30, pp. 926 - 937, http://dx.doi.org/10.1109/TVLSI.2022.3171174

Mac G; Pearce H; Karri R; Gupta N, 2021, 'Uncertainty quantification in dimensions dataset of additive manufactured NIST standard test artifact', Data in Brief, 38, http://dx.doi.org/10.1016/j.dib.2021.107286

Pearce H; Yang X; Katzef M; Strøm TB; Roop PS, 2021, 'Designing Neural Networks for Real-Time Systems', IEEE Embedded Systems Letters, 13, pp. 94 - 97, http://dx.doi.org/10.1109/LES.2020.3009910

Pearce H; Pinisetty S; Roop PS; Kuo MMY; Ukil A, 2020, 'Smart I/O Modules for Mitigating Cyber-Physical Attacks on Industrial Control Systems', IEEE Transactions on Industrial Informatics, 16, pp. 4659 - 4669, http://dx.doi.org/10.1109/TII.2019.2945520

Conference Papers

Tripuramallu D; Anand A; Pinisetty S; Pearce H; Roop P, 2024, 'Runtime Verified Neural Networks for Cyber-Physical Systems', in VORTEX 2024 - Proceedings of the 7th ACM International Workshop on Verification and Monitoring at Runtime Execution, Co-located with: ISSTA 2024, pp. 44 - 51, http://dx.doi.org/10.1145/3679008.3685547

Karumba S; Chau SC-K; Pearce H; Ahmed M; Janicke H, 2024, 'Systematic Study of Cybersecurity Threats for Smart Inverters', in The 15th ACM International Conference on Future and Sustainable Energy Systems, ACM, pp. 669 - 675, presented at e-Energy '24: The 15th ACM International Conference on Future and Sustainable Energy Systems, http://dx.doi.org/10.1145/3632775.3661994

Taylor A; Vassar A; Renzella J; Pearce H, 2024, 'dcc - Help: Transforming the Role of the Compiler by Generating Context-Aware Error Explanations with Large Language Models', in SIGCSE 2024 - Proceedings of the 55th ACM Technical Symposium on Computer Science Education, pp. 1314 - 1320, http://dx.doi.org/10.1145/3626252.3630822

Blocklove J; Garg S; Karri R; Pearce H, 2024, 'Evaluating LLMs for Hardware Design and Test', in 2024 IEEE LLM Aided Design Workshop, LAD 2024, http://dx.doi.org/10.1109/LAD62341.2024.10691811

Qiu S; Tan B; Pearce H, 2024, 'LLM-aided explanations of EDA synthesis errors', in 2024 IEEE LLM Aided Design Workshop, LAD 2024, http://dx.doi.org/10.1109/LAD62341.2024.10691721

Ullah S; Han M; Pujar S; Pearce H; Coskun A; Stringhini G, 2024, 'LLMs Cannot Reliably Identify and Reason about Security Vulnerabilities (Yet?): A Comprehensive Evaluation, Framework, and Benchmarks', in Proceedings - IEEE Symposium on Security and Privacy, pp. 862 - 880, http://dx.doi.org/10.1109/SP54263.2024.00210

Blocklove J; Raz M; Roy PB; Pearce H; Krishnamurthy P; Khorrami F; Karri R, 2024, 'Offramps: An FPGA-Based Intermediary for Analysis and Modification of Additive Manufacturing Control Systems', in Proceedings - 2024 54th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, DSN 2024, pp. 535 - 543, http://dx.doi.org/10.1109/DSN58291.2024.00057

Afsharmazayejani R; Shahmiri MM; Link P; Pearce H; Tan B, 2024, 'Toward Hardware Security Benchmarking of LLMs', in 2024 IEEE LLM Aided Design Workshop, LAD 2024, http://dx.doi.org/10.1109/LAD62341.2024.10691745

Nair M; Sadhukhan R; Pearce H; Mukhopadhyay D; Karri R, 2023, 'Netlist Whisperer: AI and NLP Fight Circuit Leakage!', in ASHES 2023 - Proceedings of the 2023 Workshop on Attacks and Solutions in Hardware Security, pp. 83 - 92, http://dx.doi.org/10.1145/3605769.3623989

Krishnamurthy P; Pearce H; Surabhi VR; Trujillo J; Karri R; Khorrami F, 2023, 'An Integrated Testbed for Trojans in Printed Circuit Boards with Fuzzing Capabilities', in Proceedings - 2023 IEEE 29th International Symposium on On-Line Testing and Robust System Design, IOLTS 2023, http://dx.doi.org/10.1109/IOLTS59296.2023.10224878

Thakur S; Ahmad B; Fan Z; Pearce H; Tan B; Karri R; Dolan-Gavitt B; Garg S, 2023, 'Benchmarking Large Language Models for Automated Verilog RTL Code Generation', in Proceedings -Design, Automation and Test in Europe, DATE, http://dx.doi.org/10.23919/DATE56975.2023.10137086

Blocklove J; Garg S; Karri R; Pearce H, 2023, 'Chip-Chat: Challenges and Opportunities in Conversational Hardware Design', in 2023 ACM/IEEE 5th Workshop on Machine Learning for CAD, MLCAD 2023, http://dx.doi.org/10.1109/MLCAD58807.2023.10299874

Pearce H; Tan B; Ahmad B; Karri R; Dolan-Gavitt B, 2023, 'Examining Zero-Shot Vulnerability Repair with Large Language Models', in Proceedings - IEEE Symposium on Security and Privacy, pp. 2339 - 2356, http://dx.doi.org/10.1109/SP46215.2023.10179324

Pearce H; Tan B; Ahmad B; Karri R; Dolan-Gavitt B, 2023, 'Examining Zero-Shot Vulnerability Repair with Large Language Models', in Proceedings - IEEE Symposium on Security and Privacy, pp. 2339 - 2356, http://dx.doi.org/10.1109/SP46215.2023.10179420

Chowdhury AB; Thakur S; Pearce H; Karri R; Garg S, 2023, 'Invited Paper: Towards the Imagenets of ML4EDA', in IEEE/ACM International Conference on Computer-Aided Design, Digest of Technical Papers, ICCAD, http://dx.doi.org/10.1109/ICCAD57390.2023.10323663

Sandoval G; Pearce H; Nys T; Karri R; Garg S; Dolan-Gavitt B, 2023, 'Lost at C: A User Study on the Security Implications of Large Language Model Code Assistants', in 32nd USENIX Security Symposium, USENIX Security 2023, pp. 2205 - 2222

Ahmad B; Liu WK; Collini L; Pearce H; Fung JM; Valamehr J; Bidmeshki M; Sapiecha P; Brown S; Chakrabarty K; Karri R; Tan B, 2022, 'Don t CWEAT it: Toward CWE analysis techniques in early stages of hardware design', in IEEE/ACM International Conference on Computer-Aided Design, Digest of Technical Papers, ICCAD, http://dx.doi.org/10.1145/3508352.3549369

Pearce H; Ahmad B; Tan B; Dolan-Gavitt B; Karri R, 2022, 'Asleep at the Keyboard? Assessing the Security of GitHub Copilot's Code Contributions', in Proceedings - IEEE Symposium on Security and Privacy, pp. 754 - 768, http://dx.doi.org/10.1109/SP46214.2022.9833571

Baird A; Pearce H; Pinisetty S; Roop P, 2022, 'Runtime Interchange of Enforcers for Adaptive Attacks: A Security Analysis Framework for Drones', in 2022 20th ACM-IEEE International Conference on Formal Methods and Models for System Design, MEMOCODE 2022, http://dx.doi.org/10.1109/MEMOCODE57689.2022.9954593

Pearce H; Tan B; Karri R, 2020, 'Dave: Deriving automatically verilog from English', in MLCAD 2020 - Proceedings of the 2020 ACM/IEEE Workshop on Machine Learning for CAD, pp. 27 - 32, http://dx.doi.org/10.1145/3380446.3430634

Yang X; Roop P; Pearce H; Ro JW, 2020, 'A compositional approach using Keras for neural networks in real-time systems', in Proceedings of the 2020 Design, Automation and Test in Europe Conference and Exhibition, DATE 2020, pp. 1109 - 1114, http://dx.doi.org/10.23919/DATE48585.2020.9116371

Pearce H; Kuo MMY; Roop PS; Pinisetty S, 2019, 'Securing implantable medical devices with runtime enforcement hardware', in MEMOCODE 2019 - 17th ACM-IEEE International Conference on Formal Methods and Models for System Design, http://dx.doi.org/10.1145/3359986.3361200

Pearce H; Roop P, 2019, 'Synthesizing IEC 61499 function blocks to hardware', in ICEIC 2019 - International Conference on Electronics, Information, and Communication, http://dx.doi.org/10.23919/ELINFOCOM.2019.8706345

Roop PS; Pearce H; Monadjem K, 2018, 'Synchronous neural networks for cyber-physical systems', in 2018 16th ACM/IEEE International Conference on Formal Methods and Models for System Design, MEMOCODE 2018, http://dx.doi.org/10.1109/MEMCOD.2018.8556931

Pearce H; Roop P; Biglari-Abhari M; Schoeberl M, 2018, 'Faster function blocks for precision timed industrial automation', in Proceedings - 2018 IEEE 21st International Symposium on Real-Time Computing, ISORC 2018, pp. 67 - 74, http://dx.doi.org/10.1109/ISORC.2018.00017

Pearce HA; Kuo MMY; Allen N; Roop PS; Malik A, 2017, 'Simulation of cyber-physical systems using IEC61499', in MEMOCODE 2017 - 15th ACM-IEEE International Conference on Formal Methods and Models for System Design, pp. 136 - 145, http://dx.doi.org/10.1145/3127041.3127052

Allen N; Pearce H; Roop P; Von Hanxleden R, 2017, 'A model driven approach for cardiac pacemaker design using a PRET processor', in Proceedings - 2017 IEEE 20th International Symposium on Real-Time Distributed Computing, ISORC 2017, pp. 168 - 175, http://dx.doi.org/10.1109/ISORC.2017.5

Pearce HA; Kuo MMY; Roop PS; Biglari-Abhari M, 2016, 'RunSync: A predictable runtime for precision timed automation systems', in Proceedings - 2016 IEEE 19th International Symposium on Real-Time Distributed Computing, ISORC 2016, pp. 116 - 123, http://dx.doi.org/10.1109/ISORC.2016.25

Preprints

Mei X; Singaria PS; Castillo JD; Xi H; Abdelouahab ; Benchikh ; Bao T; Wang R; Shoshitaishvili Y; Doupé A; Pearce H; Dolan-Gavitt B, 2024, ARVO: Atlas of Reproducible Vulnerabilities for Open Source Software, http://arxiv.org/abs/2408.02153v1

Blocklove J; Garg S; Karri R; Pearce H, 2024, Evaluating LLMs for Hardware Design and Test, http://dx.doi.org/10.48550/arxiv.2405.02326

Blocklove J; Raz M; Roy PB; Pearce H; Krishnamurthy P; Khorrami F; Karri R, 2024, OffRAMPS: An FPGA-based Intermediary for Analysis and Modification of Additive Manufacturing Control Systems, http://dx.doi.org/10.48550/arxiv.2404.15446

Qiu S; Tan B; Pearce H, 2024, LLM-aided explanations of EDA synthesis errors, http://dx.doi.org/10.1109/LAD62341.2024.10691721

Ullah S; Han M; Pujar S; Pearce H; Coskun A; Stringhini G, 2023, LLMs Cannot Reliably Identify and Reason About Security Vulnerabilities (Yet?): A Comprehensive Evaluation, Framework, and Benchmarks, http://arxiv.org/abs/2312.12575v3


Back to profile page