Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Needle in a Haystack: Detecting Subtle Malicious Edits to Additive Manufacturing G-Code Files., , , , , , , , and . IEEE Embed. Syst. Lett., 14 (3): 111-114 (2022)LLM-assisted Generation of Hardware Assertions., , , , , , and . CoRR, (2023)High-Level Approaches to Hardware Security: A Tutorial., , and . CoRR, (2022)Runtime Interchange for Adaptive Re-use of Intelligent Cyber-Physical System Controllers., , , and . CoRR, (2021)An Empirical Cybersecurity Evaluation of GitHub Copilot's Code Contributions., , , , and . CoRR, (2021)Can Large Language Models Identify And Reason About Security Vulnerabilities? Not Yet., , , , , and . CoRR, (2023)Don't CWEAT It: Toward CWE Analysis Techniques in Early Stages of Hardware Design., , , , , , , , , and 2 other author(s). ICCAD, page 157:1-157:9. ACM, (2022)Chip-Chat: Challenges and Opportunities in Conversational Hardware Design., , , and . MLCAD, page 1-6. IEEE, (2023)FLAW3D: A Trojan-based Cyber Attack on the Physical Outcomes of Additive Manufacturing., , , and . CoRR, (2021)Security Implications of Large Language Model Code Assistants: A User Study., , , , , and . CoRR, (2022)