Unlocking Hardware Security Assurance: The Potential of LLMs.
Xingyu MengAmisha SrivastavaAyush ArunachalamAvik RayPedro Henrique SilvaRafail PsiakisYiorgos MakrisKanad BasuPublished in: CoRR (2023)
Keyphrases
- information security
- low cost
- real time
- network security
- image processing
- access control
- random number generator
- computer systems
- security mechanisms
- security policies
- hardware and software
- trusted computing
- security requirements
- intrusion detection
- computing systems
- network management
- database
- data acquisition
- security level
- security risks
- information systems
- data encryption
- information assurance