In this study, we explore the capability of Large Language Models (LLMs)...
The security of computer systems typically relies on a hardware root of
...
Code contains security and functional bugs. The process of identifying a...
The vehicle routing problem with time windows (VRPTW) is a classic
optim...
Logic synthesis is the first and most vital step in chip design. This st...
Oracle-less machine learning (ML) attacks have broken various logic lock...
Novel AI-based code-writing Large Language Models (LLMs) such as OpenAI'...
Automating hardware design could obviate a significant amount of human e...
To help prevent hardware security vulnerabilities from propagating to la...
Designers use third-party intellectual property (IP) cores and outsource...
Deep learning techniques have shown promising results in image compressi...
Fabricating an integrated circuit is becoming unaffordable for many
semi...
Generating sub-optimal synthesis transformation sequences ("synthesis
re...
Various logic-locking schemes have been proposed to protect hardware fro...
Large language models (such as OpenAI's Codex) have demonstrated impress...
Human developers can produce code with cybersecurity weaknesses. Can eme...
Semiconductor design houses rely on third-party foundries to manufacture...
Recently, eFPGA-based redaction has been proposed as a promising solutio...
Logic synthesis is a challenging and widely-researched combinatorial
opt...
There is burgeoning interest in designing AI-based systems to assist hum...
Unprecedented data collection and sharing have exacerbated privacy conce...
While specifications for digital systems are provided in natural languag...
Integrated circuits (ICs) are the foundation of all computing systems. T...
Deep learning (DL) offers potential improvements throughout the CAD
tool...
This paper proposes a novel two-stage defense (NNoculation) against
back...
There is substantial interest in the use of machine learning (ML) based
...