no code implementations • 12 Apr 2024 • Matthew DeLorenzo, Vasudev Gohil, Jeyavijayan Rajendran
Large Language Models (LLMs) have proved effective and efficient in generating code, leading to their utilization within the hardware design process.
no code implementations • 21 Feb 2024 • Vasudev Gohil, Satwik Patnaik, Dileep Kalathil, Jeyavijayan Rajendran
We target five GNN-based techniques for four crucial classes of problems in hardware security: IP piracy, detecting/localizing HTs, reverse engineering, and hardware obfuscation.
no code implementations • 5 Feb 2024 • Matthew DeLorenzo, Animesh Basak Chowdhury, Vasudev Gohil, Shailja Thakur, Ramesh Karri, Siddharth Garg, Jeyavijayan Rajendran
Existing large language models (LLMs) for register transfer level code generation face challenges like compilation failures and suboptimal power, performance, and area (PPA) efficiency.
no code implementations • 29 Aug 2022 • Satwik Patnaik, Vasudev Gohil, Hao Guo, Jeyavijayan, Rajendran
In this brief, we outline the development of RL agents in detecting hardware Trojans, one of the most challenging hardware security problems.
no code implementations • 26 Aug 2022 • Vasudev Gohil, Satwik Patnaik, Hao Guo, Dileep Kalathil, Jeyavijayan, Rajendran
Insertion of hardware Trojans (HTs) in integrated circuits is a pernicious threat.
no code implementations • 26 Aug 2022 • Vasudev Gohil, Hao Guo, Satwik Patnaik, Jeyavijayan, Rajendran
Stealthy hardware Trojans (HTs) inserted during the fabrication of integrated circuits can bypass the security of critical infrastructures.