Top papers
- SecureRAG-RTL: A Retrieval-Augmented, Multi-Agent, Zero-Shot LLM-Driven Framework for Hardware Vulnerability Detection(8.0)
- Cross-Scale Persistence Analysis of EM Side-Channels for Reference-Free Detection of Always-On Hardware Trojans(4.0)
- SoK: From Silicon to Netlist and Beyond $-$ Two Decades of Hardware Reverse Engineering Research(3.0)