Author of the publication

Needle in a Haystack: Detecting Subtle Malicious Edits to Additive Manufacturing G-Code Files.

, , , , , , , , and . IEEE Embed. Syst. Lett., 14 (3): 111-114 (2022)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Needle in a Haystack: Detecting Subtle Malicious Edits to Additive Manufacturing G-Code Files., , , , , , , , and . IEEE Embed. Syst. Lett., 14 (3): 111-114 (2022)Explaining EDA synthesis errors with LLMs., , and . CoRR, (2024)Don't CWEAT It: Toward CWE Analysis Techniques in Early Stages of Hardware Design., , , , , , , , , and 2 other author(s). ICCAD, page 157:1-157:9. ACM, (2022)Chip-Chat: Challenges and Opportunities in Conversational Hardware Design., , , and . MLCAD, page 1-6. IEEE, (2023)Dataset for REMaQE evaluation., , , , and . (May 2024)Benchmarking Large Language Models for Automated Verilog RTL Code Generation., , , , , , , and . DATE, page 1-6. IEEE, (2023)dcc -help: Transforming the Role of the Compiler by Generating Context-Aware Error Explanations with Large Language Models., , , and . SIGCSE (1), page 1314-1320. ACM, (2024)DAVE: Deriving Automatically Verilog from English., , and . MLCAD, page 27-32. ACM, (2020)High-Level Approaches to Hardware Security: A Tutorial., , and . ACM Trans. Embed. Comput. Syst., 22 (3): 45:1-45:40 (2023)Runtime Interchange of Enforcers for Adaptive Attacks: A Security Analysis Framework for Drones., , , and . MEMOCODE, page 1-11. IEEE, (2022)