ORCID as entered in ROS

Select Publications
2025, 'On cyber sabotage risks in automated manufacturing of advanced composites', Additive Manufacturing Letters, 13, http://dx.doi.org/10.1016/j.addlet.2025.100280
,2025, 'Asleep at the Keyboard? Assessing the Security of GitHub Copilot’s Code Contributions', Communications of the ACM, 68, pp. 96 - 105, http://dx.doi.org/10.1145/3610721
,2024, 'REMaQE: Reverse Engineering Math Equations from Executables', ACM Transactions on Cyber-Physical Systems, 8, http://dx.doi.org/10.1145/3699674
,2024, 'FEINT: Automated Framework for Efficient INsertion of Templates/Trojans into FPGAs', Information (Switzerland), 15, http://dx.doi.org/10.3390/info15070395
,2024, 'VeriGen: A Large Language Model for Verilog Code Generation', ACM Transactions on Design Automation of Electronic Systems, 29, http://dx.doi.org/10.1145/3643681
,2024, '(Security) Assertions by Large Language Models', IEEE Transactions on Information Forensics and Security, 19, pp. 4374 - 4389, http://dx.doi.org/10.1109/TIFS.2024.3372809
,2024, 'MUDDLE: Multi-Modal Dynamic Detector Loopback Evaluator to Expose Trojans in Zero-Trust PCB Systems', IEEE Micro, http://dx.doi.org/10.1109/MM.2024.3520996
,2024, 'On Hardware Security Bug Code Fixes by Prompting Large Language Models', IEEE Transactions on Information Forensics and Security, 19, pp. 4043 - 4057, http://dx.doi.org/10.1109/TIFS.2024.3374558
,2024, 'Scalable Security Enforcement for Cyber Physical Systems', IEEE Access, 12, pp. 14385 - 14410, http://dx.doi.org/10.1109/ACCESS.2024.3357714
,2023, 'Multi-Modal Side Channel Data Driven Golden-Free Detection of Software and Firmware Trojans', IEEE Transactions on Dependable and Secure Computing, 20, pp. 4664 - 4677, http://dx.doi.org/10.1109/TDSC.2022.3231632
,2023, 'High-Level Approaches to Hardware Security: A Tutorial', ACM Transactions on Embedded Computing Systems, 22, http://dx.doi.org/10.1145/3577200
,2023, 'Decoding ChatGPT's 'impact' on the future of healthcare', Cancer Research, Statistics, and Treatment, 6, pp. 91 - 93, http://dx.doi.org/10.4103/crst.crst_84_23
,2022, 'Application of micro-computed tomography for authentication of 3D printed composite parts', Additive Manufacturing Letters, 3, http://dx.doi.org/10.1016/j.addlet.2022.100104
,2022, 'FLAW3D: A Trojan-Based Cyber Attack on the Physical Outcomes of Additive Manufacturing', IEEE/ASME Transactions on Mechatronics, 27, pp. 5361 - 5370, http://dx.doi.org/10.1109/TMECH.2022.3179713
,2022, 'Determination of Fiber Content in 3-D Printed Composite Parts Using Image Analysis', IEEE Embedded Systems Letters, 14, pp. 115 - 118, http://dx.doi.org/10.1109/LES.2022.3140417
,2022, 'Needle in a Haystack: Detecting Subtle Malicious Edits to Additive Manufacturing G-Code Files', IEEE Embedded Systems Letters, 14, pp. 111 - 114, http://dx.doi.org/10.1109/LES.2021.3129108
,2022, 'Detecting Hardware Trojans in PCBs Using Side Channel Loopbacks', IEEE Transactions on Very Large Scale Integration (VLSI) Systems, 30, pp. 926 - 937, http://dx.doi.org/10.1109/TVLSI.2022.3171174
,2021, 'Uncertainty quantification in dimensions dataset of additive manufactured NIST standard test artifact', Data in Brief, 38, http://dx.doi.org/10.1016/j.dib.2021.107286
,2021, 'Designing Neural Networks for Real-Time Systems', IEEE Embedded Systems Letters, 13, pp. 94 - 97, http://dx.doi.org/10.1109/LES.2020.3009910
,2020, 'Smart I/O Modules for Mitigating Cyber-Physical Attacks on Industrial Control Systems', IEEE Transactions on Industrial Informatics, 16, pp. 4659 - 4669, http://dx.doi.org/10.1109/TII.2019.2945520
,2024, 'Runtime Verified Neural Networks for Cyber-Physical Systems', in VORTEX 2024 - Proceedings of the 7th ACM International Workshop on Verification and Monitoring at Runtime Execution, Co-located with: ISSTA 2024, pp. 44 - 51, http://dx.doi.org/10.1145/3679008.3685547
,2024, 'Systematic Study of Cybersecurity Threats for Smart Inverters', in The 15th ACM International Conference on Future and Sustainable Energy Systems, ACM, pp. 669 - 675, presented at e-Energy '24: The 15th ACM International Conference on Future and Sustainable Energy Systems, http://dx.doi.org/10.1145/3632775.3661994
,2024, 'dcc - Help: Transforming the Role of the Compiler by Generating Context-Aware Error Explanations with Large Language Models', in SIGCSE 2024 - Proceedings of the 55th ACM Technical Symposium on Computer Science Education, pp. 1314 - 1320, http://dx.doi.org/10.1145/3626252.3630822
,2024, 'Evaluating LLMs for Hardware Design and Test', in 2024 IEEE LLM Aided Design Workshop, LAD 2024, http://dx.doi.org/10.1109/LAD62341.2024.10691811
,2024, 'Large Language Models for Hardware Security (Invited, Short Paper)', in Proceedings - 2024 IEEE 6th International Conference on Trust, Privacy and Security in Intelligent Systems, and Applications, TPS-ISA 2024, pp. 420 - 423, http://dx.doi.org/10.1109/TPS-ISA62245.2024.00055
,2024, 'LLM-aided explanations of EDA synthesis errors', in 2024 IEEE LLM Aided Design Workshop, LAD 2024, http://dx.doi.org/10.1109/LAD62341.2024.10691721
,2024, 'LLMs Cannot Reliably Identify and Reason about Security Vulnerabilities (Yet?): A Comprehensive Evaluation, Framework, and Benchmarks', in Proceedings - IEEE Symposium on Security and Privacy, pp. 862 - 880, http://dx.doi.org/10.1109/SP54263.2024.00210
,2024, 'Offramps: An FPGA-Based Intermediary for Analysis and Modification of Additive Manufacturing Control Systems', in Proceedings - 2024 54th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, DSN 2024, pp. 535 - 543, http://dx.doi.org/10.1109/DSN58291.2024.00057
,2024, 'Toward Hardware Security Benchmarking of LLMs', in 2024 IEEE LLM Aided Design Workshop, LAD 2024, http://dx.doi.org/10.1109/LAD62341.2024.10691745
,2023, 'Netlist Whisperer: AI and NLP Fight Circuit Leakage!', in ASHES 2023 - Proceedings of the 2023 Workshop on Attacks and Solutions in Hardware Security, pp. 83 - 92, http://dx.doi.org/10.1145/3605769.3623989
,2023, 'An Integrated Testbed for Trojans in Printed Circuit Boards with Fuzzing Capabilities', in Proceedings - 2023 IEEE 29th International Symposium on On-Line Testing and Robust System Design, IOLTS 2023, http://dx.doi.org/10.1109/IOLTS59296.2023.10224878
,2023, 'Benchmarking Large Language Models for Automated Verilog RTL Code Generation', in Proceedings -Design, Automation and Test in Europe, DATE, http://dx.doi.org/10.23919/DATE56975.2023.10137086
,2023, 'Chip-Chat: Challenges and Opportunities in Conversational Hardware Design', in 2023 ACM/IEEE 5th Workshop on Machine Learning for CAD, MLCAD 2023, http://dx.doi.org/10.1109/MLCAD58807.2023.10299874
,2023, 'Examining Zero-Shot Vulnerability Repair with Large Language Models', in Proceedings - IEEE Symposium on Security and Privacy, pp. 2339 - 2356, http://dx.doi.org/10.1109/SP46215.2023.10179324
,2023, 'Examining Zero-Shot Vulnerability Repair with Large Language Models', in Proceedings - IEEE Symposium on Security and Privacy, pp. 2339 - 2356, http://dx.doi.org/10.1109/SP46215.2023.10179420
,2023, 'Invited Paper: Towards the Imagenets of ML4EDA', in IEEE/ACM International Conference on Computer-Aided Design, Digest of Technical Papers, ICCAD, http://dx.doi.org/10.1109/ICCAD57390.2023.10323663
,2023, 'Lost at C: A User Study on the Security Implications of Large Language Model Code Assistants', in 32nd USENIX Security Symposium, USENIX Security 2023, pp. 2205 - 2222
,2022, 'Don t CWEAT it: Toward CWE analysis techniques in early stages of hardware design', in IEEE/ACM International Conference on Computer-Aided Design, Digest of Technical Papers, ICCAD, http://dx.doi.org/10.1145/3508352.3549369
,2022, 'Asleep at the Keyboard? Assessing the Security of GitHub Copilot's Code Contributions', in 43RD IEEE SYMPOSIUM ON SECURITY AND PRIVACY (SP 2022), IEEE COMPUTER SOC, CA, San Francisco, pp. 754 - 768, presented at 43rd IEEE Symposium on Security and Privacy (SP), CA, San Francisco, 23 May 2022 - 26 May 2022, http://dx.doi.org/10.1109/SP46214.2022.00057
,2022, 'Asleep at the Keyboard? Assessing the Security of GitHub Copilot's Code Contributions', in Proceedings - IEEE Symposium on Security and Privacy, pp. 754 - 768, http://dx.doi.org/10.1109/SP46214.2022.9833571
,2022, 'Runtime Interchange of Enforcers for Adaptive Attacks: A Security Analysis Framework for Drones', in 2022 20th ACM-IEEE International Conference on Formal Methods and Models for System Design, MEMOCODE 2022, http://dx.doi.org/10.1109/MEMOCODE57689.2022.9954593
,2020, 'Dave: Deriving automatically verilog from English', in MLCAD 2020 - Proceedings of the 2020 ACM/IEEE Workshop on Machine Learning for CAD, pp. 27 - 32, http://dx.doi.org/10.1145/3380446.3430634
,2020, 'A compositional approach using Keras for neural networks in real-time systems', in Proceedings of the 2020 Design, Automation and Test in Europe Conference and Exhibition, DATE 2020, pp. 1109 - 1114, http://dx.doi.org/10.23919/DATE48585.2020.9116371
,2019, 'Securing implantable medical devices with runtime enforcement hardware', in MEMOCODE 2019 - 17th ACM-IEEE International Conference on Formal Methods and Models for System Design, http://dx.doi.org/10.1145/3359986.3361200
,2019, 'Synthesizing IEC 61499 function blocks to hardware', in ICEIC 2019 - International Conference on Electronics, Information, and Communication, http://dx.doi.org/10.23919/ELINFOCOM.2019.8706345
,2018, 'Synchronous neural networks for cyber-physical systems', in 2018 16th ACM/IEEE International Conference on Formal Methods and Models for System Design, MEMOCODE 2018, http://dx.doi.org/10.1109/MEMCOD.2018.8556931
,2018, 'Synchronous neural networks for cyber-physical systems', in PROCEEDINGS OF THE 2018 16TH ACM/IEEE INTERNATIONAL CONFERENCE ON FORMAL METHODS AND MODELS FOR SYSTEM DESIGN (MEMOCODE), IEEE, PEOPLES R CHINA, Beijing, pp. 33 - 42, presented at 16th ACM/IEEE International Conference on Formal Methods and Models for System Design (MEMOCODE), PEOPLES R CHINA, Beijing, 15 October 2018 - 18 October 2018
,2018, 'Faster function blocks for precision timed industrial automation', in Proceedings - 2018 IEEE 21st International Symposium on Real-Time Computing, ISORC 2018, pp. 67 - 74, http://dx.doi.org/10.1109/ISORC.2018.00017
,2017, 'Simulation of cyber-physical systems using IEC61499', in MEMOCODE 2017 - 15th ACM-IEEE International Conference on Formal Methods and Models for System Design, pp. 136 - 145, http://dx.doi.org/10.1145/3127041.3127052
,2017, 'A model driven approach for cardiac pacemaker design using a PRET processor', in Proceedings - 2017 IEEE 20th International Symposium on Real-Time Distributed Computing, ISORC 2017, pp. 168 - 175, http://dx.doi.org/10.1109/ISORC.2017.5
,