Select Publications
Journal articles
2024, 'FEINT: Automated Framework for Efficient INsertion of Templates/Trojans into FPGAs', Information (Switzerland), 15, http://dx.doi.org/10.3390/info15070395
,2024, 'VeriGen: A Large Language Model for Verilog Code Generation', ACM Transactions on Design Automation of Electronic Systems, 29, http://dx.doi.org/10.1145/3643681
,2024, '(Security) Assertions by Large Language Models', IEEE Transactions on Information Forensics and Security, 19, pp. 4374 - 4389, http://dx.doi.org/10.1109/TIFS.2024.3372809
,2024, 'On Hardware Security Bug Code Fixes by Prompting Large Language Models', IEEE Transactions on Information Forensics and Security, 19, pp. 4043 - 4057, http://dx.doi.org/10.1109/TIFS.2024.3374558
,2024, 'Scalable Security Enforcement for Cyber Physical Systems', IEEE Access, 12, pp. 14385 - 14410, http://dx.doi.org/10.1109/ACCESS.2024.3357714
,2023, 'Multi-Modal Side Channel Data Driven Golden-Free Detection of Software and Firmware Trojans', IEEE Transactions on Dependable and Secure Computing, 20, pp. 4664 - 4677, http://dx.doi.org/10.1109/TDSC.2022.3231632
,2023, 'High-Level Approaches to Hardware Security: A Tutorial', ACM Transactions on Embedded Computing Systems, 22, http://dx.doi.org/10.1145/3577200
,2023, 'Decoding ChatGPT's 'impact' on the future of healthcare', Cancer Research, Statistics, and Treatment, 6, pp. 91 - 93, http://dx.doi.org/10.4103/crst.crst_84_23
,2022, 'Application of micro-computed tomography for authentication of 3D printed composite parts', Additive Manufacturing Letters, 3, http://dx.doi.org/10.1016/j.addlet.2022.100104
,2022, 'FLAW3D: A Trojan-Based Cyber Attack on the Physical Outcomes of Additive Manufacturing', IEEE/ASME Transactions on Mechatronics, 27, pp. 5361 - 5370, http://dx.doi.org/10.1109/TMECH.2022.3179713
,2022, 'Determination of Fiber Content in 3-D Printed Composite Parts Using Image Analysis', IEEE Embedded Systems Letters, 14, pp. 115 - 118, http://dx.doi.org/10.1109/LES.2022.3140417
,2022, 'Needle in a Haystack: Detecting Subtle Malicious Edits to Additive Manufacturing G-Code Files', IEEE Embedded Systems Letters, 14, pp. 111 - 114, http://dx.doi.org/10.1109/LES.2021.3129108
,2022, 'Detecting Hardware Trojans in PCBs Using Side Channel Loopbacks', IEEE Transactions on Very Large Scale Integration (VLSI) Systems, 30, pp. 926 - 937, http://dx.doi.org/10.1109/TVLSI.2022.3171174
,2021, 'Uncertainty quantification in dimensions dataset of additive manufactured NIST standard test artifact', Data in Brief, 38, http://dx.doi.org/10.1016/j.dib.2021.107286
,2021, 'Designing Neural Networks for Real-Time Systems', IEEE Embedded Systems Letters, 13, pp. 94 - 97, http://dx.doi.org/10.1109/LES.2020.3009910
,2020, 'Smart I/O Modules for Mitigating Cyber-Physical Attacks on Industrial Control Systems', IEEE Transactions on Industrial Informatics, 16, pp. 4659 - 4669, http://dx.doi.org/10.1109/TII.2019.2945520
,