ORCID as entered in ROS

Select Publications
2025, 'FLAG: F inding L ine A nomalies (in RTL code) with G enerative AI', ACM Transactions on Design Automation of Electronic Systems, http://dx.doi.org/10.1145/3736411
,2025, 'On cyber sabotage risks in automated manufacturing of advanced composites', Additive Manufacturing Letters, 13, http://dx.doi.org/10.1016/j.addlet.2025.100280
,2025, 'Automatically Improving LLM-based Verilog Generation using EDA Tool Feedback', ACM Transactions on Design Automation of Electronic Systems, http://dx.doi.org/10.1145/3723876
,2025, 'Asleep at the Keyboard? Assessing the Security of GitHub Copilot’s Code Contributions', Communications of the ACM, 68, pp. 96 - 105, http://dx.doi.org/10.1145/3610721
,2024, 'REMaQE: Reverse Engineering Math Equations from Executables', ACM Transactions on Cyber Physical Systems, 8, http://dx.doi.org/10.1145/3699674
,2024, 'FEINT: Automated Framework for Efficient INsertion of Templates/Trojans into FPGAs', Information Switzerland, 15, http://dx.doi.org/10.3390/info15070395
,2024, 'VeriGen: A Large Language Model for Verilog Code Generation', ACM Transactions on Design Automation of Electronic Systems, 29, http://dx.doi.org/10.1145/3643681
,2024, '(Security) Assertions by Large Language Models', IEEE Transactions on Information Forensics and Security, 19, pp. 4374 - 4389, http://dx.doi.org/10.1109/TIFS.2024.3372809
,2024, 'MUDDLE: Multi-Modal Dynamic Detector Loopback Evaluator to Expose Trojans in Zero-Trust PCB Systems', IEEE Micro, http://dx.doi.org/10.1109/MM.2024.3520996
,2024, 'On Hardware Security Bug Code Fixes by Prompting Large Language Models', IEEE Transactions on Information Forensics and Security, 19, pp. 4043 - 4057, http://dx.doi.org/10.1109/TIFS.2024.3374558
,2024, 'Scalable Security Enforcement for Cyber Physical Systems', IEEE Access, 12, pp. 14385 - 14410, http://dx.doi.org/10.1109/ACCESS.2024.3357714
,2023, 'Multi-Modal Side Channel Data Driven Golden-Free Detection of Software and Firmware Trojans', IEEE Transactions on Dependable and Secure Computing, 20, pp. 4664 - 4677, http://dx.doi.org/10.1109/TDSC.2022.3231632
,2023, 'High-Level Approaches to Hardware Security: A Tutorial', ACM Transactions on Embedded Computing Systems, 22, http://dx.doi.org/10.1145/3577200
,2023, 'Decoding ChatGPT's 'impact' on the future of healthcare', Cancer Research Statistics and Treatment, 6, pp. 91 - 93, http://dx.doi.org/10.4103/crst.crst_84_23
,2022, 'Application of micro-computed tomography for authentication of 3D printed composite parts', Additive Manufacturing Letters, 3, http://dx.doi.org/10.1016/j.addlet.2022.100104
,2022, 'FLAW3D: A Trojan-Based Cyber Attack on the Physical Outcomes of Additive Manufacturing', IEEE ASME Transactions on Mechatronics, 27, pp. 5361 - 5370, http://dx.doi.org/10.1109/TMECH.2022.3179713
,2022, 'Determination of Fiber Content in 3-D Printed Composite Parts Using Image Analysis', IEEE Embedded Systems Letters, 14, pp. 115 - 118, http://dx.doi.org/10.1109/LES.2022.3140417
,2022, 'Needle in a Haystack: Detecting Subtle Malicious Edits to Additive Manufacturing G-Code Files', IEEE Embedded Systems Letters, 14, pp. 111 - 114, http://dx.doi.org/10.1109/LES.2021.3129108
,2022, 'Detecting Hardware Trojans in PCBs Using Side Channel Loopbacks', IEEE Transactions on Very Large Scale Integration VLSI Systems, 30, pp. 926 - 937, http://dx.doi.org/10.1109/TVLSI.2022.3171174
,2021, 'Uncertainty quantification in dimensions dataset of additive manufactured NIST standard test artifact', Data in Brief, 38, http://dx.doi.org/10.1016/j.dib.2021.107286
,2021, 'Designing Neural Networks for Real-Time Systems', IEEE Embedded Systems Letters, 13, pp. 94 - 97, http://dx.doi.org/10.1109/LES.2020.3009910
,2020, 'Smart I/O Modules for Mitigating Cyber-Physical Attacks on Industrial Control Systems', IEEE Transactions on Industrial Informatics, 16, pp. 4659 - 4669, http://dx.doi.org/10.1109/TII.2019.2945520
,2024, 'Runtime Verified Neural Networks for Cyber-Physical Systems', in Vortex 2024 Proceedings of the 7th ACM International Workshop on Verification and Monitoring at Runtime Execution Co Located with Issta 2024, pp. 44 - 51, http://dx.doi.org/10.1145/3679008.3685547
,2024, 'Systematic Study of Cybersecurity Threats for Smart Inverters', in The 15th ACM International Conference on Future and Sustainable Energy Systems, ACM, pp. 669 - 675, presented at e-Energy '24: The 15th ACM International Conference on Future and Sustainable Energy Systems, http://dx.doi.org/10.1145/3632775.3661994
,2024, 'dcc - Help: Transforming the Role of the Compiler by Generating Context-Aware Error Explanations with Large Language Models', in SIGCSE 2024 Proceedings of the 55th ACM Technical Symposium on Computer Science Education, pp. 1314 - 1320, http://dx.doi.org/10.1145/3626252.3630822
,2024, 'Evaluating LLMs for Hardware Design and Test', in 2024 IEEE Llm Aided Design Workshop Lad 2024, http://dx.doi.org/10.1109/LAD62341.2024.10691811
,2024, 'Large Language Models for Hardware Security (Invited, Short Paper)', in Proceedings 2024 IEEE 6th International Conference on Trust Privacy and Security in Intelligent Systems and Applications Tps ISA 2024, pp. 420 - 423, http://dx.doi.org/10.1109/TPS-ISA62245.2024.00055
,2024, 'LLM-aided explanations of EDA synthesis errors', in 2024 IEEE Llm Aided Design Workshop Lad 2024, http://dx.doi.org/10.1109/LAD62341.2024.10691721
,2024, 'LLMs Cannot Reliably Identify and Reason about Security Vulnerabilities (Yet?): A Comprehensive Evaluation, Framework, and Benchmarks', in Proceedings IEEE Symposium on Security and Privacy, pp. 862 - 880, http://dx.doi.org/10.1109/SP54263.2024.00210
,2024, 'Offramps: An FPGA-Based Intermediary for Analysis and Modification of Additive Manufacturing Control Systems', in Proceedings 2024 54th Annual IEEE IFIP International Conference on Dependable Systems and Networks Dsn 2024, pp. 535 - 543, http://dx.doi.org/10.1109/DSN58291.2024.00057
,2024, 'Toward Hardware Security Benchmarking of LLMs', in 2024 IEEE Llm Aided Design Workshop Lad 2024, http://dx.doi.org/10.1109/LAD62341.2024.10691745
,2023, 'An Integrated Testbed for Trojans in Printed Circuit Boards with Fuzzing Capabilities', in Proceedings 2023 IEEE 29th International Symposium on on Line Testing and Robust System Design Iolts 2023, http://dx.doi.org/10.1109/IOLTS59296.2023.10224878
,2023, 'Benchmarking Large Language Models for Automated Verilog RTL Code Generation', in Proceedings Design Automation and Test in Europe Date, http://dx.doi.org/10.23919/DATE56975.2023.10137086
,2023, 'Chip-Chat: Challenges and Opportunities in Conversational Hardware Design', in 2023 ACM IEEE 5th Workshop on Machine Learning for CAD Mlcad 2023, http://dx.doi.org/10.1109/MLCAD58807.2023.10299874
,2023, 'Examining Zero-Shot Vulnerability Repair with Large Language Models', in Proceedings IEEE Symposium on Security and Privacy, pp. 2339 - 2356, http://dx.doi.org/10.1109/SP46215.2023.10179324
,2023, 'Examining Zero-Shot Vulnerability Repair with Large Language Models', in Proceedings IEEE Symposium on Security and Privacy, pp. 2339 - 2356, http://dx.doi.org/10.1109/SP46215.2023.10179420
,2023, 'Invited Paper: Towards the Imagenets of ML4EDA', in IEEE ACM International Conference on Computer Aided Design Digest of Technical Papers Iccad, http://dx.doi.org/10.1109/ICCAD57390.2023.10323663
,2023, 'Lost at C: A User Study on the Security Implications of Large Language Model Code Assistants', in 32nd Usenix Security Symposium Usenix Security 2023, pp. 2205 - 2222
,2022, 'Don t CWEAT it: Toward CWE analysis techniques in early stages of hardware design', in IEEE ACM International Conference on Computer Aided Design Digest of Technical Papers Iccad, http://dx.doi.org/10.1145/3508352.3549369
,2022, 'Asleep at the Keyboard? Assessing the Security of GitHub Copilot's Code Contributions', in 43RD IEEE SYMPOSIUM ON SECURITY AND PRIVACY (SP 2022), IEEE COMPUTER SOC, CA, San Francisco, pp. 754 - 768, presented at 43rd IEEE Symposium on Security and Privacy (SP), CA, San Francisco, 23 May 2022 - 26 May 2022, http://dx.doi.org/10.1109/SP46214.2022.00057
,2022, 'Asleep at the Keyboard? Assessing the Security of GitHub Copilot's Code Contributions', in Proceedings IEEE Symposium on Security and Privacy, pp. 754 - 768, http://dx.doi.org/10.1109/SP46214.2022.9833571
,2022, 'Runtime Interchange of Enforcers for Adaptive Attacks: A Security Analysis Framework for Drones', in 2022 20th ACM IEEE International Conference on Formal Methods and Models for System Design Memocode 2022, http://dx.doi.org/10.1109/MEMOCODE57689.2022.9954593
,2021, 'Netlist Whisperer: AI and NLP Fight Circuit Leakage!', in Ashes 2023 Proceedings of the 2023 Workshop on Attacks and Solutions in Hardware Security, pp. 83 - 92, http://dx.doi.org/10.1145/3605769.3623989
,2020, 'Dave: Deriving automatically verilog from English', in Mlcad 2020 Proceedings of the 2020 ACM IEEE Workshop on Machine Learning for CAD, pp. 27 - 32, http://dx.doi.org/10.1145/3380446.3430634
,2020, 'A compositional approach using Keras for neural networks in real-time systems', in Proceedings of the 2020 Design Automation and Test in Europe Conference and Exhibition Date 2020, pp. 1109 - 1114, http://dx.doi.org/10.23919/DATE48585.2020.9116371
,2019, 'Securing implantable medical devices with runtime enforcement hardware', in Memocode 2019 17th ACM IEEE International Conference on Formal Methods and Models for System Design, http://dx.doi.org/10.1145/3359986.3361200
,2019, 'Synthesizing IEC 61499 function blocks to hardware', in Iceic 2019 International Conference on Electronics Information and Communication, http://dx.doi.org/10.23919/ELINFOCOM.2019.8706345
,2018, 'Synchronous neural networks for cyber-physical systems', in 2018 16th ACM IEEE International Conference on Formal Methods and Models for System Design Memocode 2018, http://dx.doi.org/10.1109/MEMCOD.2018.8556931
,2018, 'Synchronous neural networks for cyber-physical systems', in PROCEEDINGS OF THE 2018 16TH ACM/IEEE INTERNATIONAL CONFERENCE ON FORMAL METHODS AND MODELS FOR SYSTEM DESIGN (MEMOCODE), IEEE, PEOPLES R CHINA, Beijing, pp. 33 - 42, presented at 16th ACM/IEEE International Conference on Formal Methods and Models for System Design (MEMOCODE), PEOPLES R CHINA, Beijing, 15 October 2018 - 18 October 2018
,2018, 'Faster function blocks for precision timed industrial automation', in Proceedings 2018 IEEE 21st International Symposium on Real Time Computing Isorc 2018, pp. 67 - 74, http://dx.doi.org/10.1109/ISORC.2018.00017
,