Picture for Ramesh Karri

Ramesh Karri

New York University

CyberExplorer: Benchmarking LLM Offensive Security Capabilities in a Real-World Attacking Simulation Environment

Add code
Feb 08, 2026
Viaarxiv icon

TrojanGYM: A Detector-in-the-Loop LLM for Adaptive RTL Hardware Trojan Insertion

Add code
Jan 23, 2026
Viaarxiv icon

Large Language Models (LLMs) for Electronic Design Automation (EDA)

Add code
Aug 27, 2025
Figure 1 for Large Language Models (LLMs) for Electronic Design Automation (EDA)
Figure 2 for Large Language Models (LLMs) for Electronic Design Automation (EDA)
Figure 3 for Large Language Models (LLMs) for Electronic Design Automation (EDA)
Figure 4 for Large Language Models (LLMs) for Electronic Design Automation (EDA)
Viaarxiv icon

VeriLoC: Line-of-Code Level Prediction of Hardware Design Quality from Verilog Code

Add code
Jun 08, 2025
Figure 1 for VeriLoC: Line-of-Code Level Prediction of Hardware Design Quality from Verilog Code
Figure 2 for VeriLoC: Line-of-Code Level Prediction of Hardware Design Quality from Verilog Code
Figure 3 for VeriLoC: Line-of-Code Level Prediction of Hardware Design Quality from Verilog Code
Figure 4 for VeriLoC: Line-of-Code Level Prediction of Hardware Design Quality from Verilog Code
Viaarxiv icon

MapleGrasp: Mask-guided Feature Pooling for Language-driven Efficient Robotic Grasping

Add code
Jun 06, 2025
Viaarxiv icon

CRAKEN: Cybersecurity LLM Agent with Knowledge-Based Execution

Add code
May 21, 2025
Figure 1 for CRAKEN: Cybersecurity LLM Agent with Knowledge-Based Execution
Figure 2 for CRAKEN: Cybersecurity LLM Agent with Knowledge-Based Execution
Figure 3 for CRAKEN: Cybersecurity LLM Agent with Knowledge-Based Execution
Figure 4 for CRAKEN: Cybersecurity LLM Agent with Knowledge-Based Execution
Viaarxiv icon

MARVEL: Multi-Agent RTL Vulnerability Extraction using Large Language Models

Add code
May 17, 2025
Viaarxiv icon

3D CAVLA: Leveraging Depth and 3D Context to Generalize Vision Language Action Models for Unseen Tasks

Add code
May 09, 2025
Viaarxiv icon

VeriLeaky: Navigating IP Protection vs Utility in Fine-Tuning for LLM-Driven Verilog Coding

Add code
Mar 17, 2025
Figure 1 for VeriLeaky: Navigating IP Protection vs Utility in Fine-Tuning for LLM-Driven Verilog Coding
Figure 2 for VeriLeaky: Navigating IP Protection vs Utility in Fine-Tuning for LLM-Driven Verilog Coding
Figure 3 for VeriLeaky: Navigating IP Protection vs Utility in Fine-Tuning for LLM-Driven Verilog Coding
Figure 4 for VeriLeaky: Navigating IP Protection vs Utility in Fine-Tuning for LLM-Driven Verilog Coding
Viaarxiv icon

Can Reasoning Models Reason about Hardware? An Agentic HLS Perspective

Add code
Mar 17, 2025
Figure 1 for Can Reasoning Models Reason about Hardware? An Agentic HLS Perspective
Figure 2 for Can Reasoning Models Reason about Hardware? An Agentic HLS Perspective
Figure 3 for Can Reasoning Models Reason about Hardware? An Agentic HLS Perspective
Figure 4 for Can Reasoning Models Reason about Hardware? An Agentic HLS Perspective
Viaarxiv icon