Security of Cloud FPGAs: A Survey C Jin, V Gohil, R Karri, J Rajendran arXiv preprint arXiv:2005.04867, 2020 | 45 | 2020 |
DETERRENT: detecting trojans using reinforcement learning V Gohil, S Patnaik, H Guo, D Kalathil, J Rajendran Proceedings of the 59th ACM/IEEE Design Automation Conference, 697-702, 2022 | 16 | 2022 |
ATTRITION: Attacking Static Hardware Trojan Detection Techniques Using Reinforcement Learning V Gohil, H Guo, S Patnaik, J Rajendran Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications …, 2022 | 14 | 2022 |
Make Every Move Count: LLM-based High-Quality RTL Code Generation Using MCTS M DeLorenzo, AB Chowdhury, V Gohil, S Thakur, R Karri, S Garg, ... arXiv preprint arXiv:2402.03289, 2024 | 10 | 2024 |
Security of cloud FPGAs: A survey J Chenglu, G Vasudev, K Ramesh, R Jeyavijayan Cryptography and Security, 1-5, 2020 | 10* | 2020 |
PSOFuzz: Fuzzing Processors with Particle Swarm Optimization C Chen, V Gohil, R Kande, AR Sadeghi, J Rajendran 2023 IEEE/ACM International Conference on Computer Aided Design (ICCAD), 1-9, 2023 | 6 | 2023 |
MABFuzz: Multi-Armed Bandit Algorithms for Fuzzing Processors V Gohil, R Kande, C Chen, AR Sadeghi, J Rajendran 2024 Design, Automation & Test in Europe Conference & Exhibition (DATE), 1-6, 2024 | 3 | 2024 |
ExploreFault: Identifying Exploitable Fault Models in Block Ciphers with Reinforcement Learning H Guo, S Saha, V Gohil, S Patnaik, D Mukhopadhyay, JJV Rajendran 2023 60th ACM/IEEE Design Automation Conference (DAC), 1-6, 2023 | 3 | 2023 |
AttackGNN: Red-Teaming GNNs in Hardware Security Using Reinforcement Learning V Gohil, S Patnaik, D Kalathil, J Rajendran arXiv preprint arXiv:2402.13946, 2024 | 2 | 2024 |
Reinforcement Learning for Hardware Security: Opportunities, Developments, and Challenges S Patnaik, V Gohil, H Guo, JJV Rajendran 2022 19th International SoC Design Conference (ISOCC), 217-218, 2022 | 2 | 2022 |
Games, Dollars, Splits: A Game-Theoretic Analysis of Split Manufacturing V Gohil, M Tressler, K Sipple, S Patnaik, J Rajendran IEEE Transactions on Information Forensics and Security 16, 5077-5092, 2021 | 2 | 2021 |
Vulnerability Assessment of Ciphers To Fault Attacks Using Reinforcement Learning H Guo, S Saha, S Patnaik, V Gohil, D Mukhopadhyay, JJV Rajendran Cryptology ePrint Archive, 2022 | 1 | 2022 |
LLMs for Hardware Security: Boon or Bane? R Kande, V Gohil, M DeLorenzo, C Chen, J Rajendran 2024 IEEE 42nd VLSI Test Symposium (VTS), 1-4, 2024 | | 2024 |
CreativEval: Evaluating Creativity of LLM-Based Hardware Code Generation M DeLorenzo, V Gohil, J Rajendran arXiv preprint arXiv:2404.08806, 2024 | | 2024 |