Publications

Book Chapter(s):

  • Tehranipoor, F., Karimian, N., Wortman, P., Haque, A., Fahrny, J., and Chandy, J., “Exploring Methods of Authentication for the Internet of Things,” Taylor & Francis, 2017. Link

Journal Articles:

  • Karimian, N., Guo, Z., Tehranipoor, F., Woodard, D., Tehranipoor, M., and Forte, D., “Noise Aware Biometric Key Generation in Resource-Constrained Systems and IoTIEEE Transactions on Signal Processing (TSP), 2018 (under review).
  • Wortman, P., Tehranipoor, F., Yan, W., and Chandy, J.,  ” P2M-Sec: Security Enhancement using Combined PUF and PRNG Model for Authenticating Consumer Electronic Devices,” IET Computers & Digital Techniques, 2018 (under review).
  • Anagnostopoulos, N.A., Katzenbeisser, S., Chandy, J., and Tehranipoor, F., ” An Overview of DRAM-based Security Primitives,” Journal of Cryptography, DoI: 10.3390/cryptography2020007 , Vol. 2, ISSN = 2410-387X, 2018. Link
  • Tehranipoor, F., Wortman, P., Karimian, N., Yan, W., and Chandy, J., “DVFT: A Lightweight Solution for Power Supply Noise based TRNG using a Dynamic Voltage Feedback Tuning System,” IEEE Transactions on Very Large-Scale Integration (VLSI) Systems, ”  DOI: 10.1109/TVLSI.2018.2804258, pp.1-14, Mar. 2018. Link
  • Tehranipoor, F., Karimian, N., Yan, W. and Chandy, J.A., “DRAM-Based Intrinsic Physically Unclonable Functions for System-Level Security and Authentication,” IEEE Transactions on Very Large-Scale Integration (VLSI) Systems, DOI: 10.1109/TVLSI.2016.2606658, vol. 25, no. 3, pp.1085-1097, Mar. 2017. (Among most popular articles – IEEE). Link
  • Yan, W., Tehranipoor, F., and Chandy, J.A., “PUF-Based Fuzzy Authentication Without Error Correcting Codes,” IEEE Transactions on Computer-Aided Design of Integrated Circuits and SystemsDOI: 10.1109/TCAD.2016.2638445, vol. 36, no. 9, pp. 1445-1457, Dec. 2017. Link

Conference Papers:

  • Anagnostopoulos, N.A., Arul, T., Fan, Y., Sharma, R., Tehranipoor, F., Hatzfeld, C., and Katzenbeisser, S., “Securing IoT Devices Using Robust DRAM PUFs“, International Performance, Computing, and Communications Conference (IPCCC-CPS), July 2018 (Under Review).
  • Anagnostopoulos, N.A., Schaller,  Arul, T., Fan, Y., Hatzfeld C., Tehranipoor, F., and Katzenbeisser, S., “Addressing the Effects of Temperature Variations on Intrinsic Memory-Based Physical Unclonable Functions”, 28th Krypto-tag, Kirchheim bei München, Germany, Jun 2018 (accepted).
  • Wortman, P., Tehranipoor, F., and Chandy, J., “An Adversarial Risk-based Approach for Network Architecture Security Modeling and Design,” IEEE International Conference on Cyber Security and Protection of Digital Services, 2018. (accepted).
  • Tehranipoor, F., Karimian, N., Wortman, P., and Chandy, J.,” Low-cost Authentication Paradigm for Consumer Electronics within the Internet of Wearable Fitness Tracking Applications,” IEEE Conference on Consumer Electronics (ICCE), Jan. 2018. Link
  • Yan, W., Jin, C., Tehranipoor, F., and Chandy, J., “Phase Calibration PUF Design and Implementation on FPGA,” 27th International Conference on Field-Programmable Logic and Applications (FPL), Sep. 2017. Link
  • Eckert, C., Tehranipoor, F., and Chandy, J., “DRNG: DRAM-based Random Number Generation using its Startup Value Behavior,” 60th IEEE International Midwest Symposium on Circuits and Systems (MWSCAS), Aug. 2017. Link
  • Anagnostopoulos, N.A., Schaller, A., Fan, Y., Xiong, W., Tehranipoor, F., Arul, T., Gabmeyer, S., Szefer, J., Chandy, J., and Katzenbeisser, S., “Insights into the Potential Usage of the Initial Values of DRAM Arrays of Commercial Of-the-Shelf Devices for Security Applications,” 26th Crypto-Day, Nuremberg, Germany, Jun 2017. Link
  • Tehranipoor, F., Karimian, N., Yan, W., and Chandy, J., “DRAM PUFs Reliability Analysis due to Device Accelerated Aging,” IEEE International Symposium on Circuits and Systems (ISCAS), May 2017. Link
  • Karimian, N., Tehranipoor, F., Guo, Z., Tehranipoor, M., and Forte, D., “Noise Assessment Framework for Optimizing ECG-based Key Generation,” IEEE International Symposium on Technologies for Homeland Security (HST), Apr. 2017. Link
  • Tehranipoor, F., Karimian, N., Wortman, P., and Chandy, J., “Investigation of the IoT in its Application to Low-Cost Authentication within Healthcare,” IEEE-EMBS International Conference on Biomedical and Health Informatics (BHI), Feb. 2017. Link
  • Wortman, P., Tehranipoor, F., Karimian, N., and Chandy, J., ” Proposing a modeling framework for minimizing security vulnerabilities in IoT systems in the healthcare domain,” IEEE-EMBS International Conference on Biomedical and Health Informatics (BHI), Feb. 2017. Link
  • Tehranipoor, F., Karimian, N., Yan, W., and Chandy, J., “A study of Power Supply Variation as a Source of Random Noise,” 30th International Conference on VLSI Design & 16th International Conference on Embedded Systems (VLSID), Jan. 2017. (Received Best Paper Award). Link
  • Okwuosah, S., Funes, A., Guo, C., Tehranipoor, F., and Chandy, J., “Multi-Communication Type Debugging Probe,” IEEE MIT Undergraduate Research Technology Conference (MIT-URTC), Nov. 2016. Link
  • Karimian, N., Wortman, P., and Tehranipoor, F., “Evolving Authentication Design Considerations of the Internet of Biometric Things (IoBT),” Proceedings of the Eleventh IEEE/ACM International Conference on Hardware/Software Codesign and System Synthesis (CODES), Oct. 2016. Link
  • Tehranipoor, F., Yan, W., and Chandy, J., “Robust Hardware True Random Number Generators using DRAM Remanence Effects,” IEEE International Symposium on Hardware-Oriented Security and Trust (HOST), May 2016. Link
  • Yan, W., Tehranipoor, F., and Chandy, J., “A Novel Way to Authenticate Untrusted Integrated Circuits,” IEEE International Conference on Computer Aided Design (ICCAD), Nov. 2015. Link
  • Karimian, N., Tehranipoor, F., Rahman, M. T., Kelly, S., and Forte, D., “Genetic Algorithm for Hardware Trojan Detection with Ring Oscillator Network (RON),” IEEE International Conference on Technologies for Homeland Security (HST), Apr. 2015. Link
  • Tehranipoor, F., Karimian, N., Xiao, K., and Chandy, J., “DRAM based Intrinsic Physical Unclonable Functions for System Level Security,” In Proceedings of the 25th edition on Great Lakes Symposium on VLSI (GLSVLSI), May 2015. Link

Preprints:

  • Tehranipoor, F., Karimian, N., Mozaffari-Kermani, M., and Mahmoodi, H., “Deep RNN-Oriented Paradigm Shift through BOCANet: Broken Obfuscated Circuit Attack”, arXiv preprint arXiv:1803.03332, 2018. Link
  • Karimian, N., Guo, Z., Tehranipoor, F., Woodard, D., Tehranipoor, M., and Forte D., “Secure and Reliable Biometric Access Control for Resource-Constrained Systems and IoT,” 2018. Link

Posters:

  • Tehranipoor, F., Yan, W., and Chandy, J., “DRAM Remanence Effects based Hardware TRNG,” HOST Conference,  May 2016. Link
  • Tehranipoor, F., and Chandy, J., “Investigation of DRAM Physical Unclonable Function, CHASE Workshop, March 2015. Link

Dissertation:

  • Tehranipoor, F., “Design and Architecture of Hardware-based Random Function Security Primitives,” Ph.D. Dissertation, Department of Electrical and Computer Engineering, University of Connecticut, August 2017. Link