Empowering Hardware Security with LLM: The Development of a Vulnerable Hardware Database.
Dipayan SahaKatayoon YahyaeiSujan Kumar SahaMark M. TehranipoorFarimah FarahmandiPublished in: HOST (2024)
Keyphrases
- database
- low cost
- real time
- databases
- hardware and software
- computer systems
- hardware platforms
- database systems
- case study
- hardware implementation
- hardware architectures
- relational databases
- random number generator
- hardware architecture
- software engineering
- commercial off the shelf
- computer hardware
- vlsi implementation
- sensitive data
- statistical databases
- personal computer
- data acquisition
- data management
- data model
- hardware design
- development process
- privacy preserving
- database applications
- data sets