Select Publications
Conference Papers
2024, 'Runtime Verified Neural Networks for Cyber-Physical Systems', in Proceedings of the 7th ACM International Workshop on Verification and Monitoring at Runtime Execution, ACM, pp. 44 - 51, presented at VORTEX '24: 7th ACM International Workshop on Verification and Monitoring at Runtime Execution, http://dx.doi.org/10.1145/3679008.3685547
,2024, 'Systematic Study of Cybersecurity Threats for Smart Inverters', in The 15th ACM International Conference on Future and Sustainable Energy Systems, ACM, pp. 669 - 675, presented at e-Energy '24: The 15th ACM International Conference on Future and Sustainable Energy Systems, http://dx.doi.org/10.1145/3632775.3661994
,2024, 'dcc - Help: Transforming the Role of the Compiler by Generating Context-Aware Error Explanations with Large Language Models', in SIGCSE 2024 - Proceedings of the 55th ACM Technical Symposium on Computer Science Education, pp. 1314 - 1320, http://dx.doi.org/10.1145/3626252.3630822
,2024, 'LLMs Cannot Reliably Identify and Reason about Security Vulnerabilities (Yet?): A Comprehensive Evaluation, Framework, and Benchmarks', in Proceedings - IEEE Symposium on Security and Privacy, pp. 862 - 880, http://dx.doi.org/10.1109/SP54263.2024.00210
,2024, 'Offramps: An FPGA-Based Intermediary for Analysis and Modification of Additive Manufacturing Control Systems', in Proceedings - 2024 54th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, DSN 2024, pp. 535 - 543, http://dx.doi.org/10.1109/DSN58291.2024.00057
,2023, 'Netlist Whisperer: AI and NLP Fight Circuit Leakage!', in ASHES 2023 - Proceedings of the 2023 Workshop on Attacks and Solutions in Hardware Security, pp. 83 - 92, http://dx.doi.org/10.1145/3605769.3623989
,2023, 'An Integrated Testbed for Trojans in Printed Circuit Boards with Fuzzing Capabilities', in Proceedings - 2023 IEEE 29th International Symposium on On-Line Testing and Robust System Design, IOLTS 2023, http://dx.doi.org/10.1109/IOLTS59296.2023.10224878
,2023, 'Benchmarking Large Language Models for Automated Verilog RTL Code Generation', in Proceedings -Design, Automation and Test in Europe, DATE, http://dx.doi.org/10.23919/DATE56975.2023.10137086
,2023, 'Chip-Chat: Challenges and Opportunities in Conversational Hardware Design', in 2023 ACM/IEEE 5th Workshop on Machine Learning for CAD, MLCAD 2023, http://dx.doi.org/10.1109/MLCAD58807.2023.10299874
,2023, 'Examining Zero-Shot Vulnerability Repair with Large Language Models', in Proceedings - IEEE Symposium on Security and Privacy, pp. 2339 - 2356, http://dx.doi.org/10.1109/SP46215.2023.10179324
,2023, 'Examining Zero-Shot Vulnerability Repair with Large Language Models', in Proceedings - IEEE Symposium on Security and Privacy, pp. 2339 - 2356, http://dx.doi.org/10.1109/SP46215.2023.10179420
,2023, 'Invited Paper: Towards the Imagenets of ML4EDA', in IEEE/ACM International Conference on Computer-Aided Design, Digest of Technical Papers, ICCAD, http://dx.doi.org/10.1109/ICCAD57390.2023.10323663
,2023, 'Lost at C: A User Study on the Security Implications of Large Language Model Code Assistants', in 32nd USENIX Security Symposium, USENIX Security 2023, pp. 2205 - 2222
,2022, 'Don t CWEAT it: Toward CWE analysis techniques in early stages of hardware design', in IEEE/ACM International Conference on Computer-Aided Design, Digest of Technical Papers, ICCAD, http://dx.doi.org/10.1145/3508352.3549369
,2022, 'Asleep at the Keyboard? Assessing the Security of GitHub Copilot's Code Contributions', in Proceedings - IEEE Symposium on Security and Privacy, pp. 754 - 768, http://dx.doi.org/10.1109/SP46214.2022.9833571
,2022, 'Runtime Interchange of Enforcers for Adaptive Attacks: A Security Analysis Framework for Drones', in 2022 20th ACM-IEEE International Conference on Formal Methods and Models for System Design, MEMOCODE 2022, http://dx.doi.org/10.1109/MEMOCODE57689.2022.9954593
,2020, 'Dave: Deriving automatically verilog from English', in MLCAD 2020 - Proceedings of the 2020 ACM/IEEE Workshop on Machine Learning for CAD, pp. 27 - 32, http://dx.doi.org/10.1145/3380446.3430634
,2020, 'A compositional approach using Keras for neural networks in real-time systems', in Proceedings of the 2020 Design, Automation and Test in Europe Conference and Exhibition, DATE 2020, pp. 1109 - 1114, http://dx.doi.org/10.23919/DATE48585.2020.9116371
,2019, 'Securing implantable medical devices with runtime enforcement hardware', in MEMOCODE 2019 - 17th ACM-IEEE International Conference on Formal Methods and Models for System Design, http://dx.doi.org/10.1145/3359986.3361200
,2019, 'Synthesizing IEC 61499 function blocks to hardware', in ICEIC 2019 - International Conference on Electronics, Information, and Communication, http://dx.doi.org/10.23919/ELINFOCOM.2019.8706345
,2018, 'Synchronous neural networks for cyber-physical systems', in 2018 16th ACM/IEEE International Conference on Formal Methods and Models for System Design, MEMOCODE 2018, http://dx.doi.org/10.1109/MEMCOD.2018.8556931
,2018, 'Faster function blocks for precision timed industrial automation', in Proceedings - 2018 IEEE 21st International Symposium on Real-Time Computing, ISORC 2018, pp. 67 - 74, http://dx.doi.org/10.1109/ISORC.2018.00017
,2017, 'Simulation of cyber-physical systems using IEC61499', in MEMOCODE 2017 - 15th ACM-IEEE International Conference on Formal Methods and Models for System Design, pp. 136 - 145, http://dx.doi.org/10.1145/3127041.3127052
,2017, 'A model driven approach for cardiac pacemaker design using a PRET processor', in Proceedings - 2017 IEEE 20th International Symposium on Real-Time Distributed Computing, ISORC 2017, pp. 168 - 175, http://dx.doi.org/10.1109/ISORC.2017.5
,2016, 'RunSync: A predictable runtime for precision timed automation systems', in Proceedings - 2016 IEEE 19th International Symposium on Real-Time Distributed Computing, ISORC 2016, pp. 116 - 123, http://dx.doi.org/10.1109/ISORC.2016.25
,