Asleep at the Keyboard? Assessing the Security of GitHub Copilot’s Code Contributions
- H. Pearce, Baleegh Ahmad, Benjamin Tan, Brendan Dolan-Gavitt, R. Karri
- Computer ScienceIEEE Symposium on Security and Privacy
- 20 August 2021
This work systematically investigates the prevalence and conditions that can cause GitHub Copilot to recommend insecure code, and explores Copilot’s performance on three distinct code generation axes—examining how it performs given diversity of weaknesses, diversity of prompts, and diversity of domains.
NNoculation: Broad Spectrum and Targeted Treatment of Backdoored DNNs
- A. Veldanda, Kang Liu, S. Garg
- Computer ScienceArXiv
- 19 February 2020
A novel two-stage defense against backdoored neural networks (BadNets) that outperforms state-of-the-art defenses NeuralCleanse and Artificial Brain Simulation that are shown to be ineffective when their restrictive assumptions are circumvented by the attacker.
Benchmarking at the Frontier of Hardware Security: Lessons from Logic Locking
- Benjamin Tan, R. Karri, Kenneth Plaks
- Computer ScienceArXiv
- 11 June 2020
This work performs a critical review of logic locking techniques in the literature, and exposes several shortcomings, and devise a community-led benchmarking exercise to address the evaluation deficiencies.
Adversarial Perturbation Attacks on ML-based CAD
- Kang Liu, Haoyu Yang, S. Garg
- Computer Science
- 21 August 2020
An adversarial retraining strategy is proposed to improve the robustness of CNN-based hotspot detection and it is shown that this strategy significantly improves robustness (by a factor of ~3) against adversarial attacks without compromising classification accuracy.
An Empirical Cybersecurity Evaluation of GitHub Copilot's Code Contributions
- H. Pearce, Baleegh Ahmad, Benjamin Tan, Brendan Dolan-Gavitt, R. Karri
- Computer ScienceArXiv
- 2021
This work systematically investigates the prevalence and conditions that can cause GitHub Copilot to recommend insecure code, and explores Copilot’s performance on three distinct code generation axes—examining how it performs given diversity of weaknesses, diversity of prompts, and diversity of domains.
Poisoning the (Data) Well in ML-Based CAD: A Case Study of Hiding Lithographic Hotspots
- Kang Liu, Benjamin Tan, R. Karri, S. Garg
- Computer ScienceDesign, Automation and Test in Europe
- 1 March 2020
This work shows that training data poisoning attacks are feasible and stealthy, demonstrating a backdoored neural network that performs normally on clean inputs but misbehaves on inputs when a backdoor trigger is present, and raises some fundamental questions about the robustness of ML-based systems in CAD.
Challenges and New Directions for AI and Hardware Security
- Benjamin Tan, R. Karri
- Computer ScienceMidwest Symposium on Circuits and Systems
- 1 August 2020
The growing overlap betweenAI/ML and hardware for security is examined, where AI/ML techniques provide practitioners with new ways to monitor runtime behavior but also provide new tools for attackers to steal secret information.
Not All Fabrics Are Created Equal: Exploring eFPGA Parameters For IP Redaction
- Jitendra Bhandari, Abdul Khader Thalakkattu Moosa, R. Karri
- Computer ScienceArXiv
- 8 November 2021
The results encourage designers to work with custom eFPGA fabrics rather than off-the-shelf commercial FPGAs and reveals that only considering a redaction fabric’s bitstream size is inadequate for gauging security.
DAVE: Deriving Automatically Verilog from English
- H. Pearce, Benjamin Tan, R. Karri
- Computer ScienceWorkshop on Machine Learning for CAD
- 27 August 2020
The use of state-of-the-art machine learning (ML) is explored to automatically derive Verilog snippets from English via fine-tuning GPT-2, a natural language ML system.
OpenABC-D: A Large-Scale Dataset For Machine Learning Guided Integrated Circuit Synthesis
- Animesh Basak Chowdhury, Benjamin Tan, R. Karri, S. Garg
- Computer ScienceArXiv
- 21 October 2021
OpenABC-D is described, a large-scale, labeled dataset produced by synthesizing open source designs with a leading open-source logic synthesis tool and illustrated its use in developing, evaluating and benchmarking ML-guided logic synthesis.
...
...