Similar Items: LLMs for Secure Hardware Design and Related Problems: Opportunities and Challenges
- On the Privacy of LLMs: An Ablation Study
- SILMARILS: Information-Theoretic and Quantum-Secure Designated-Verifier Signatures
- Can I Check What I Designed? Mapping Security Design DSLs to Code Analyzers
- Trident: Improving Malware Detection with LLMs and Behavioral Features
- Re-Triggering Safeguards within LLMs for Jailbreak Detection
- Reflecthernet: Exfiltrating 100BASE-TX Ethernet Traffic Using a Retroreflector Hardware Trojan