LLMs for Hardware Security: Boon or Bane?
Rahul KandeVasudev GohilMatthew DeLorenzoChen ChenJeyavijayan RajendranPublished in: VTS (2024)
Keyphrases
- hardware and software
- real time
- information security
- access control
- intrusion detection
- low cost
- random number generator
- information assurance
- trusted computing
- statistical databases
- security systems
- computer systems
- security management
- security issues
- security level
- data security
- security requirements
- computing systems
- windows xp
- security mechanisms
- security policies
- cyber security
- hardware implementation
- network access
- embedded systems
- data acquisition
- parallel hardware
- advanced encryption standard
- hardware architecture
- security model
- hardware design
- security protocols
- computer security
- network security
- signal processing
- image processing