Papers
1–3 of 3Research Paper·Mar 5, 2026
SecureRAG-RTL: A Retrieval-Augmented, Multi-Agent, Zero-Shot LLM-Driven Framework for Hardware Vulnerability Detection
Large language models (LLMs) have shown remarkable capabilities in natural language processing tasks, yet their application in hardware security verification remains limited due to scarcity of publicl...
8.0 viability
Research Paper·Mar 17, 2026
Cross-Scale Persistence Analysis of EM Side-Channels for Reference-Free Detection of Always-On Hardware Trojans
Always-on hardware Trojans pose a serious challenge to integrated circuit trust, as they remain active during normal operation and are difficult to detect in post-deployment settings without trusted g...
4.0 viability
Research Paper·Mar 18, 2026
SoK: From Silicon to Netlist and Beyond $-$ Two Decades of Hardware Reverse Engineering Research
As hardware serves as the root of trust in modern computing systems, Hardware Reverse Engineering (HRE) is foundational for security assurance. In practice, HRE enables critical security applications,...
3.0 viability