Jailbreaking Pre-trained Large Language Models Towards Hardware Vulnerability Insertion Ability
Abstract
References
Index Terms
- Jailbreaking Pre-trained Large Language Models Towards Hardware Vulnerability Insertion Ability
Recommendations
Evolutionary Large Language Models for Hardware Security: A Comparative Survey
GLSVLSI '24: Proceedings of the Great Lakes Symposium on VLSI 2024Automating hardware (HW) security vulnerability detection and mitigation during the design phase is imperative for two reasons: (i) It must be before chip fabrication, as post-fabrication fixes can be costly or even impractical; (ii) The size and ...
Side-channel analysis of MAC-Keccak hardware implementations
HASP '15: Proceedings of the Fourth Workshop on Hardware and Architectural Support for Security and PrivacyAs Keccak has been selected as the new SHA-3 standard, Message Authentication Code (MAC) (MAC-Keccak) using a secret key will be widely used for integrity checking and authenticity assurance. Recent works have shown the feasibility of side-channel ...
Hardware trojan attacks in FPGA devices: threat analysis and effective counter measures
GLSVLSI '14: Proceedings of the 24th edition of the great lakes symposium on VLSIReconfigurable hardware including Field programmable gate arrays (FPGAs) are being used in a wide range of embedded applications including signal processing, multimedia, and security. FPGA device production is often outsourced to off-shore facilities ...
Comments
Information & Contributors
Information
Published In
![cover image ACM Conferences](/cms/asset/31ddfe83-4545-4d4a-876e-d84264054752/3649476.cover.jpg)
Sponsors
Publisher
Association for Computing Machinery
New York, NY, United States
Publication History
Check for updates
Author Tags
Qualifiers
- Short-paper
- Research
- Refereed limited
Conference
Acceptance Rates
Upcoming Conference
- Sponsor:
- sigda
Contributors
Other Metrics
Bibliometrics & Citations
Bibliometrics
Article Metrics
- 0Total Citations
- 119Total Downloads
- Downloads (Last 12 months)119
- Downloads (Last 6 weeks)13
Other Metrics
Citations
View Options
Login options
Check if you have access through your login credentials or your institution to get full access on this article.
Sign inFull Access
View options
View or Download as a PDF file.
PDFeReader
View online with eReader.
eReaderHTML Format
View this article in HTML Format.
HTML Format