Select Publications
Journal articles
2024, 'REMaQE: Reverse Engineering Math Equations from Executables', ACM Transactions on Cyber-Physical Systems, http://dx.doi.org/10.1145/3699674
,2024, 'FEINT: Automated Framework for Efficient INsertion of Templates/Trojans into FPGAs', Information (Switzerland), 15, http://dx.doi.org/10.3390/info15070395
,2024, 'VeriGen: A Large Language Model for Verilog Code Generation', ACM Transactions on Design Automation of Electronic Systems, 29, http://dx.doi.org/10.1145/3643681
,2024, '(Security) Assertions by Large Language Models', IEEE Transactions on Information Forensics and Security, 19, pp. 4374 - 4389, http://dx.doi.org/10.1109/TIFS.2024.3372809
,2024, 'On Hardware Security Bug Code Fixes by Prompting Large Language Models', IEEE Transactions on Information Forensics and Security, 19, pp. 4043 - 4057, http://dx.doi.org/10.1109/TIFS.2024.3374558
,2024, 'Scalable Security Enforcement for Cyber Physical Systems', IEEE Access, 12, pp. 14385 - 14410, http://dx.doi.org/10.1109/ACCESS.2024.3357714
,2023, 'Multi-Modal Side Channel Data Driven Golden-Free Detection of Software and Firmware Trojans', IEEE Transactions on Dependable and Secure Computing, 20, pp. 4664 - 4677, http://dx.doi.org/10.1109/TDSC.2022.3231632
,2023, 'High-Level Approaches to Hardware Security: A Tutorial', ACM Transactions on Embedded Computing Systems, 22, http://dx.doi.org/10.1145/3577200
,2023, 'Decoding ChatGPT's 'impact' on the future of healthcare', Cancer Research, Statistics, and Treatment, 6, pp. 91 - 93, http://dx.doi.org/10.4103/crst.crst_84_23
,2022, 'Application of micro-computed tomography for authentication of 3D printed composite parts', Additive Manufacturing Letters, 3, http://dx.doi.org/10.1016/j.addlet.2022.100104
,2022, 'FLAW3D: A Trojan-Based Cyber Attack on the Physical Outcomes of Additive Manufacturing', IEEE/ASME Transactions on Mechatronics, 27, pp. 5361 - 5370, http://dx.doi.org/10.1109/TMECH.2022.3179713
,2022, 'Determination of Fiber Content in 3-D Printed Composite Parts Using Image Analysis', IEEE Embedded Systems Letters, 14, pp. 115 - 118, http://dx.doi.org/10.1109/LES.2022.3140417
,2022, 'Needle in a Haystack: Detecting Subtle Malicious Edits to Additive Manufacturing G-Code Files', IEEE Embedded Systems Letters, 14, pp. 111 - 114, http://dx.doi.org/10.1109/LES.2021.3129108
,2022, 'Detecting Hardware Trojans in PCBs Using Side Channel Loopbacks', IEEE Transactions on Very Large Scale Integration (VLSI) Systems, 30, pp. 926 - 937, http://dx.doi.org/10.1109/TVLSI.2022.3171174
,2021, 'Uncertainty quantification in dimensions dataset of additive manufactured NIST standard test artifact', Data in Brief, 38, http://dx.doi.org/10.1016/j.dib.2021.107286
,2021, 'Designing Neural Networks for Real-Time Systems', IEEE Embedded Systems Letters, 13, pp. 94 - 97, http://dx.doi.org/10.1109/LES.2020.3009910
,2020, 'Smart I/O Modules for Mitigating Cyber-Physical Attacks on Industrial Control Systems', IEEE Transactions on Industrial Informatics, 16, pp. 4659 - 4669, http://dx.doi.org/10.1109/TII.2019.2945520
,Conference Papers
2024, 'Runtime Verified Neural Networks for Cyber-Physical Systems', in VORTEX 2024 - Proceedings of the 7th ACM International Workshop on Verification and Monitoring at Runtime Execution, Co-located with: ISSTA 2024, pp. 44 - 51, http://dx.doi.org/10.1145/3679008.3685547
,2024, 'Systematic Study of Cybersecurity Threats for Smart Inverters', in The 15th ACM International Conference on Future and Sustainable Energy Systems, ACM, pp. 669 - 675, presented at e-Energy '24: The 15th ACM International Conference on Future and Sustainable Energy Systems, http://dx.doi.org/10.1145/3632775.3661994
,2024, 'dcc - Help: Transforming the Role of the Compiler by Generating Context-Aware Error Explanations with Large Language Models', in SIGCSE 2024 - Proceedings of the 55th ACM Technical Symposium on Computer Science Education, pp. 1314 - 1320, http://dx.doi.org/10.1145/3626252.3630822
,2024, 'Evaluating LLMs for Hardware Design and Test', in 2024 IEEE LLM Aided Design Workshop, LAD 2024, http://dx.doi.org/10.1109/LAD62341.2024.10691811
,2024, 'LLM-aided explanations of EDA synthesis errors', in 2024 IEEE LLM Aided Design Workshop, LAD 2024, http://dx.doi.org/10.1109/LAD62341.2024.10691721
,2024, 'LLMs Cannot Reliably Identify and Reason about Security Vulnerabilities (Yet?): A Comprehensive Evaluation, Framework, and Benchmarks', in Proceedings - IEEE Symposium on Security and Privacy, pp. 862 - 880, http://dx.doi.org/10.1109/SP54263.2024.00210
,2024, 'Offramps: An FPGA-Based Intermediary for Analysis and Modification of Additive Manufacturing Control Systems', in Proceedings - 2024 54th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, DSN 2024, pp. 535 - 543, http://dx.doi.org/10.1109/DSN58291.2024.00057
,2024, 'Toward Hardware Security Benchmarking of LLMs', in 2024 IEEE LLM Aided Design Workshop, LAD 2024, http://dx.doi.org/10.1109/LAD62341.2024.10691745
,2023, 'Netlist Whisperer: AI and NLP Fight Circuit Leakage!', in ASHES 2023 - Proceedings of the 2023 Workshop on Attacks and Solutions in Hardware Security, pp. 83 - 92, http://dx.doi.org/10.1145/3605769.3623989
,2023, 'An Integrated Testbed for Trojans in Printed Circuit Boards with Fuzzing Capabilities', in Proceedings - 2023 IEEE 29th International Symposium on On-Line Testing and Robust System Design, IOLTS 2023, http://dx.doi.org/10.1109/IOLTS59296.2023.10224878
,2023, 'Benchmarking Large Language Models for Automated Verilog RTL Code Generation', in Proceedings -Design, Automation and Test in Europe, DATE, http://dx.doi.org/10.23919/DATE56975.2023.10137086
,2023, 'Chip-Chat: Challenges and Opportunities in Conversational Hardware Design', in 2023 ACM/IEEE 5th Workshop on Machine Learning for CAD, MLCAD 2023, http://dx.doi.org/10.1109/MLCAD58807.2023.10299874
,2023, 'Examining Zero-Shot Vulnerability Repair with Large Language Models', in Proceedings - IEEE Symposium on Security and Privacy, pp. 2339 - 2356, http://dx.doi.org/10.1109/SP46215.2023.10179324
,2023, 'Examining Zero-Shot Vulnerability Repair with Large Language Models', in Proceedings - IEEE Symposium on Security and Privacy, pp. 2339 - 2356, http://dx.doi.org/10.1109/SP46215.2023.10179420
,2023, 'Invited Paper: Towards the Imagenets of ML4EDA', in IEEE/ACM International Conference on Computer-Aided Design, Digest of Technical Papers, ICCAD, http://dx.doi.org/10.1109/ICCAD57390.2023.10323663
,2023, 'Lost at C: A User Study on the Security Implications of Large Language Model Code Assistants', in 32nd USENIX Security Symposium, USENIX Security 2023, pp. 2205 - 2222
,2022, 'Don t CWEAT it: Toward CWE analysis techniques in early stages of hardware design', in IEEE/ACM International Conference on Computer-Aided Design, Digest of Technical Papers, ICCAD, http://dx.doi.org/10.1145/3508352.3549369
,2022, 'Asleep at the Keyboard? Assessing the Security of GitHub Copilot's Code Contributions', in Proceedings - IEEE Symposium on Security and Privacy, pp. 754 - 768, http://dx.doi.org/10.1109/SP46214.2022.9833571
,2022, 'Runtime Interchange of Enforcers for Adaptive Attacks: A Security Analysis Framework for Drones', in 2022 20th ACM-IEEE International Conference on Formal Methods and Models for System Design, MEMOCODE 2022, http://dx.doi.org/10.1109/MEMOCODE57689.2022.9954593
,2020, 'Dave: Deriving automatically verilog from English', in MLCAD 2020 - Proceedings of the 2020 ACM/IEEE Workshop on Machine Learning for CAD, pp. 27 - 32, http://dx.doi.org/10.1145/3380446.3430634
,2020, 'A compositional approach using Keras for neural networks in real-time systems', in Proceedings of the 2020 Design, Automation and Test in Europe Conference and Exhibition, DATE 2020, pp. 1109 - 1114, http://dx.doi.org/10.23919/DATE48585.2020.9116371
,2019, 'Securing implantable medical devices with runtime enforcement hardware', in MEMOCODE 2019 - 17th ACM-IEEE International Conference on Formal Methods and Models for System Design, http://dx.doi.org/10.1145/3359986.3361200
,2019, 'Synthesizing IEC 61499 function blocks to hardware', in ICEIC 2019 - International Conference on Electronics, Information, and Communication, http://dx.doi.org/10.23919/ELINFOCOM.2019.8706345
,2018, 'Synchronous neural networks for cyber-physical systems', in 2018 16th ACM/IEEE International Conference on Formal Methods and Models for System Design, MEMOCODE 2018, http://dx.doi.org/10.1109/MEMCOD.2018.8556931
,2018, 'Faster function blocks for precision timed industrial automation', in Proceedings - 2018 IEEE 21st International Symposium on Real-Time Computing, ISORC 2018, pp. 67 - 74, http://dx.doi.org/10.1109/ISORC.2018.00017
,2017, 'Simulation of cyber-physical systems using IEC61499', in MEMOCODE 2017 - 15th ACM-IEEE International Conference on Formal Methods and Models for System Design, pp. 136 - 145, http://dx.doi.org/10.1145/3127041.3127052
,2017, 'A model driven approach for cardiac pacemaker design using a PRET processor', in Proceedings - 2017 IEEE 20th International Symposium on Real-Time Distributed Computing, ISORC 2017, pp. 168 - 175, http://dx.doi.org/10.1109/ISORC.2017.5
,2016, 'RunSync: A predictable runtime for precision timed automation systems', in Proceedings - 2016 IEEE 19th International Symposium on Real-Time Distributed Computing, ISORC 2016, pp. 116 - 123, http://dx.doi.org/10.1109/ISORC.2016.25
,Preprints
2024, ARVO: Atlas of Reproducible Vulnerabilities for Open Source Software, http://arxiv.org/abs/2408.02153v1
,2024, Evaluating LLMs for Hardware Design and Test, http://dx.doi.org/10.48550/arxiv.2405.02326
,2024, OffRAMPS: An FPGA-based Intermediary for Analysis and Modification of Additive Manufacturing Control Systems, http://dx.doi.org/10.48550/arxiv.2404.15446
,2024, LLM-aided explanations of EDA synthesis errors, http://dx.doi.org/10.1109/LAD62341.2024.10691721
,2023, LLMs Cannot Reliably Identify and Reason About Security Vulnerabilities (Yet?): A Comprehensive Evaluation, Framework, and Benchmarks, http://arxiv.org/abs/2312.12575v3
,