Select Publications

Preprints

Thakur S; Blocklove J; Pearce H; Tan B; Garg S; Karri R, 2023, AutoChip: Automating HDL Generation Using LLM Feedback, http://dx.doi.org/10.48550/arxiv.2311.04887

Chowdhury AB; Thakur S; Pearce H; Karri R; Garg S, 2023, Towards the Imagenets of ML4EDA, http://dx.doi.org/10.48550/arxiv.2310.10560

Veldanda AK; Grob F; Thakur S; Pearce H; Tan B; Karri R; Garg S, 2023, Are Emily and Greg Still More Employable than Lakisha and Jamal? Investigating Algorithmic Hiring Bias in the Era of ChatGPT, http://arxiv.org/abs/2310.05135v1

Taylor A; Vassar A; Renzella J; Pearce H, 2023, Dcc --help: Generating Context-Aware Compiler Error Explanations with Large Language Models, http://arxiv.org/abs/2308.11873v2

Thakur S; Ahmad B; Pearce H; Tan B; Dolan-Gavitt B; Karri R; Garg S, 2023, VeriGen: A Large Language Model for Verilog Code Generation, http://arxiv.org/abs/2308.00708v1

Kande R; Pearce H; Tan B; Dolan-Gavitt B; Thakur S; Karri R; Rajendran J, 2023, (Security) Assertions by Large Language Models, http://dx.doi.org/10.1109/TIFS.2024.3372809

Ahmad B; Tan B; Karri R; Pearce H, 2023, FLAG: Finding Line Anomalies (in code) with Generative AI, http://arxiv.org/abs/2306.12643v1

Blocklove J; Garg S; Karri R; Pearce H, 2023, Chip-Chat: Challenges and Opportunities in Conversational Hardware Design, http://dx.doi.org/10.1109/MLCAD58807.2023.10299874

Udeshi M; Krishnamurthy P; Pearce H; Karri R; Khorrami F, 2023, REMaQE: Reverse Engineering Math Equations from Executables, http://dx.doi.org/10.48550/arxiv.2305.06902

Ahmad B; Thakur S; Tan B; Karri R; Pearce H, 2023, Fixing Hardware Security Bugs with Large Language Models, http://dx.doi.org/10.1109/TIFS.2024.3374558

Roy PB; Bhargava M; Chang C-Y; Hui E; Gupta N; Karri R; Pearce H, 2023, A survey of Digital Manufacturing Hardware and Software Trojans, http://arxiv.org/abs/2301.10336v1

Thakur S; Ahmad B; Fan Z; Pearce H; Tan B; Karri R; Dolan-Gavitt B; Garg S, 2022, Benchmarking Large Language Models for Automated Verilog RTL Code Generation, http://arxiv.org/abs/2212.11140v1

Ahmad B; Liu W-K; Collini L; Pearce H; Fung JM; Valamehr J; Bidmeshki M; Sapiecha P; Brown S; Chakrabarty K; Karri R; Tan B, 2022, Don't CWEAT It: Toward CWE Analysis Techniques in Early Stages of Hardware Design, http://dx.doi.org/10.1145/3508352.3549369

Sandoval G; Pearce H; Nys T; Karri R; Garg S; Dolan-Gavitt B, 2022, Lost at C: A User Study on the Security Implications of Large Language Model Code Assistants, http://arxiv.org/abs/2208.09727v4

Pearce H; Karri R; Tan B, 2022, High-Level Approaches to Hardware Security: A Tutorial, http://dx.doi.org/10.1145/3577200

Pearce H; Tan B; Krishnamurthy P; Khorrami F; Karri R; Dolan-Gavitt B, 2022, Pop Quiz! Can a Large Language Model Help With Reverse Engineering?, http://arxiv.org/abs/2202.01142v1

Pearce H; Tan B; Ahmad B; Karri R; Dolan-Gavitt B, 2021, Examining Zero-Shot Vulnerability Repair with Large Language Models, http://arxiv.org/abs/2112.02125v3

Beckwith C; Naicker HS; Mehta S; Udupa VR; Nim NT; Gadre V; Pearce H; Mac G; Gupta N, 2021, Needle in a Haystack: Detecting Subtle Malicious Edits to Additive Manufacturing G-code Files, http://dx.doi.org/10.1109/LES.2021.3129108

Pearce H; Yang X; Pinisetty S; Roop PS, 2021, Runtime Interchange for Adaptive Re-use of Intelligent Cyber-Physical System Controllers, http://arxiv.org/abs/2110.01974v1

Pearce H; Ahmad B; Tan B; Dolan-Gavitt B; Karri R, 2021, Asleep at the Keyboard? Assessing the Security of GitHub Copilot's Code Contributions, http://arxiv.org/abs/2108.09293v3

Pearce H; Yanamandra K; Gupta N; Karri R, 2021, FLAW3D: A Trojan-based Cyber Attack on the Physical Outcomes of Additive Manufacturing, http://arxiv.org/abs/2104.09562v1

Pearce H; Tan B; Karri R, 2020, DAVE: Deriving Automatically Verilog from English, http://dx.doi.org/10.1145/3380446.3430634

Pearce H; Yang X; Roop PS; Katzef M; Strøm TB, 2020, Designing Neural Networks for Real-Time Systems, http://dx.doi.org/10.1109/LES.2020.3009910

Other

Pinisetty S; Allen N; Pearce H; Trew M; Singh Gaur M; Roop P, 2022, Formal Methods for the Security of Medical Devices1, Wiley, http://dx.doi.org/10.1002/9781119743187.ch3


Back to profile page