Assert-O: Context-based Assertion Optimization using LLMs
Abstract
References
Recommendations
Evolutionary Large Language Models for Hardware Security: A Comparative Survey
GLSVLSI '24: Proceedings of the Great Lakes Symposium on VLSI 2024Automating hardware (HW) security vulnerability detection and mitigation during the design phase is imperative for two reasons: (i) It must be before chip fabrication, as post-fabrication fixes can be costly or even impractical; (ii) The size and ...
Do we need a holistic approach for the design of secure IoT systems?
CF'17: Proceedings of the Computing Frontiers ConferenceIn this paper, four cryptography and security experts point out to future research directions in internet-of-things (IoT) security. Coming from different research domains, the experts address a broad range of issues related to IoT security. In ...
Security Meets Nanoelectronics for Internet of Things Applications
GLSVLSI '16: Proceedings of the 26th edition on Great Lakes Symposium on VLSIThe internet of things (IoT) is quickly emerging as the next major domain for embedded computer systems. Although the term IoT could be defined in a variety of different ways, IoT always encompasses typically ordinary devices (e.g., thermostats and ...
Comments
Information & Contributors
Information
Published In
Sponsors
Publisher
Association for Computing Machinery
New York, NY, United States
Publication History
Check for updates
Author Tags
Qualifiers
- Research-article
- Research
- Refereed limited
Funding Sources
- Technology Innovation Institute (TII)
Conference
Acceptance Rates
Contributors
Other Metrics
Bibliometrics & Citations
Bibliometrics
Article Metrics
- 0Total Citations
- 279Total Downloads
- Downloads (Last 12 months)279
- Downloads (Last 6 weeks)44
Other Metrics
Citations
View Options
View options
View or Download as a PDF file.
PDFeReader
View online with eReader.
eReaderHTML Format
View this article in HTML Format.
HTML FormatLogin options
Check if you have access through your login credentials or your institution to get full access on this article.
Sign in