Select Publications

Preprints

Roy PB; Bhargava M; Chang C-Y; Hui E; Gupta N; Karri R; Pearce H, 2023, A survey of Digital Manufacturing Hardware and Software Trojans, , http://arxiv.org/abs/2301.10336v1

Thakur S; Ahmad B; Fan Z; Pearce H; Tan B; Karri R; Dolan-Gavitt B; Garg S, 2022, Benchmarking Large Language Models for Automated Verilog RTL Code Generation, , http://arxiv.org/abs/2212.11140v1

Ahmad B; Liu W-K; Collini L; Pearce H; Fung JM; Valamehr J; Bidmeshki M; Sapiecha P; Brown S; Chakrabarty K; Karri R; Tan B, 2022, Don't CWEAT It: Toward CWE Analysis Techniques in Early Stages of Hardware Design, , http://dx.doi.org/10.1145/3508352.3549369

Sandoval G; Pearce H; Nys T; Karri R; Garg S; Dolan-Gavitt B, 2022, Lost at C: A User Study on the Security Implications of Large Language Model Code Assistants, , http://arxiv.org/abs/2208.09727v4

Pearce H; Karri R; Tan B, 2022, High-Level Approaches to Hardware Security: A Tutorial, , http://dx.doi.org/10.1145/3577200

Pearce H; Tan B; Krishnamurthy P; Khorrami F; Karri R; Dolan-Gavitt B, 2022, Pop Quiz! Can a Large Language Model Help With Reverse Engineering?, , http://arxiv.org/abs/2202.01142v1

Pearce H; Tan B; Ahmad B; Karri R; Dolan-Gavitt B, 2021, Examining Zero-Shot Vulnerability Repair with Large Language Models, , http://arxiv.org/abs/2112.02125v3

Beckwith C; Naicker HS; Mehta S; Udupa VR; Nim NT; Gadre V; Pearce H; Mac G; Gupta N, 2021, Needle in a Haystack: Detecting Subtle Malicious Edits to Additive Manufacturing G-code Files, , http://dx.doi.org/10.1109/LES.2021.3129108

Pearce H; Yang X; Pinisetty S; Roop PS, 2021, Runtime Interchange for Adaptive Re-use of Intelligent Cyber-Physical System Controllers, , http://arxiv.org/abs/2110.01974v1

Pearce H; Ahmad B; Tan B; Dolan-Gavitt B; Karri R, 2021, Asleep at the Keyboard? Assessing the Security of GitHub Copilot's Code Contributions, , http://arxiv.org/abs/2108.09293v3

Pearce H; Yanamandra K; Gupta N; Karri R, 2021, FLAW3D: A Trojan-based Cyber Attack on the Physical Outcomes of Additive Manufacturing, , http://arxiv.org/abs/2104.09562v1

Pearce H; Tan B; Karri R, 2020, DAVE: Deriving Automatically Verilog from English, , http://dx.doi.org/10.1145/3380446.3430634

Pearce H; Yang X; Roop PS; Katzef M; Strøm TB, 2020, Designing Neural Networks for Real-Time Systems, , http://dx.doi.org/10.1109/LES.2020.3009910

Other

Pinisetty S; Allen N; Pearce H; Trew M; Singh Gaur M; Roop P, 2022, Formal Methods for the Security of Medical Devices1, Wiley, , http://dx.doi.org/10.1002/9781119743187.ch3


Back to profile page