Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Needle in a Haystack: Detecting Subtle Malicious Edits to Additive Manufacturing G-Code Files., , , , , , , , and . IEEE Embed. Syst. Lett., 14 (3): 111-114 (2022)An Empirical Cybersecurity Evaluation of GitHub Copilot's Code Contributions., , , , and . CoRR, (2021)LLM-assisted Generation of Hardware Assertions., , , , , , and . CoRR, (2023)Runtime Interchange for Adaptive Re-use of Intelligent Cyber-Physical System Controllers., , , and . CoRR, (2021)Can Large Language Models Identify And Reason About Security Vulnerabilities? Not Yet., , , , , and . CoRR, (2023)High-Level Approaches to Hardware Security: A Tutorial., , and . CoRR, (2022)Chip-Chat: Challenges and Opportunities in Conversational Hardware Design., , , and . MLCAD, page 1-6. IEEE, (2023)Don't CWEAT It: Toward CWE Analysis Techniques in Early Stages of Hardware Design., , , , , , , , , and 2 other author(s). ICCAD, page 157:1-157:9. ACM, (2022)High-Level Approaches to Hardware Security: A Tutorial., , and . ACM Trans. Embed. Comput. Syst., 22 (3): 45:1-45:40 (2023)Benchmarking Large Language Models for Automated Verilog RTL Code Generation., , , , , , , and . DATE, page 1-6. IEEE, (2023)