Publications

Book Chapter(s):

  1. Tehranipoor, F., Karimian, N., Wortman, P., Haque, A., Fahrny, J., and Chandy, J., “Exploring Methods of Authentication for the Internet of Things,” Taylor & Francis, 2017. Link

Journal Articles:

  1. Karimian, N., Tehranipoor, F., Woodard D., Tehranipoor, M.,  and Forte D., “Noise Aware Biometric Key Generation in Resource-Constrained Healthcare Systems and IoT”, IEEE Transactions on Forensics and Security (TIFS), 2018 (under review).
  2. Tehranipoor, F., Karimian, N., Mozaffari-Kermani, M., and Mahmoodi, H., “Deep RNN-Oriented Paradigm Shift through BOCANet: Broken Obfuscated Circuit Attack”, IEEE Transactions on Very Large-Scale Integration (VLSI) Systems, 2018 (under review).
  3. Wortman, P., Tehranipoor, F., Yan, W., and Chandy, J.,  ” P2M-Sec: Security Enhancement using Combined PUF and PRNG Model for Authenticating Consumer Electronic Devices,” IET Computers & Digital Techniques, 2018. Link
  4. Anagnostopoulos, N.A., Katzenbeisser, S., Chandy, J., and Tehranipoor, F., ” An Overview of DRAM-based Security Primitives,” Journal of Cryptography, DoI: 10.3390/cryptography2020007 , Vol. 2, ISSN = 2410-387X, 2018. Link
  5. Tehranipoor, F., Wortman, P., Karimian, N., Yan, W., and Chandy, J., “DVFT: A Lightweight Solution for Power Supply Noise based TRNG using a Dynamic Voltage Feedback Tuning System,” IEEE Transactions on Very Large-Scale Integration (VLSI) Systems, ”  DOI: 10.1109/TVLSI.2018.2804258, pp.1-14, Mar. 2018. Link
  6. Tehranipoor, F., Karimian, N., Yan, W. and Chandy, J.A., “DRAM-Based Intrinsic Physically Unclonable Functions for System-Level Security and Authentication,” IEEE Transactions on Very Large-Scale Integration (VLSI) Systems, DOI: 10.1109/TVLSI.2016.2606658, vol. 25, no. 3, pp.1085-1097, Mar. 2017. (Among most popular articles – IEEE). Link
  7. Yan, W., Tehranipoor, F., and Chandy, J.A., “PUF-Based Fuzzy Authentication Without Error Correcting Codes,” IEEE Transactions on Computer-Aided Design of Integrated Circuits and SystemsDOI: 10.1109/TCAD.2016.2638445, vol. 36, no. 9, pp. 1445-1457, Dec. 2017. Link

Conference Papers:

  1. Karimian, N., and Tehranipoor, F., “HeartID-based Authentication for Autonomous Vehicles using Deep Learning and Random Number Generators” under anonymous review, 2019.
  2. Tehranipoor, F., Karimian, N.,  and Pugazhenthi, A., “DLA-PUF: Deep Learning Attacks on Hardware Security Primitives”, under anonymous review, 2019.
  3. Anagnostopoulos, N.A., Arul, T., Fan, Y., Sharma, R., Tehranipoor, F., Hatzfeld, C., and Katzenbeisser, S., “Securing IoT Devices Using Robust DRAM PUFs“, Global Information Infrastructure and Networking Symposium (GIIS), Greece, 2018 (accepted).
  4. Anagnostopoulos, N.A., Schaller,  Arul, T., Fan, Y., Hatzfeld C., Tehranipoor, F., and Katzenbeisser, S., “Addressing the Effects of Temperature Variations on Intrinsic Memory-Based Physical Unclonable Functions”, 28th Krypto-tag, Kirchheim bei München, Germany, 2018. Link
  5. Wortman, P., Tehranipoor, F., and Chandy, J., “An Adversarial Risk-based Approach for Network Architecture Security Modeling and Design,” IEEE International Conference on Cyber Security and Protection of Digital Services, 2018. (accepted).
  6. Tehranipoor, F., Karimian, N., Wortman, P., and Chandy, J.,” Low-cost Authentication Paradigm for Consumer Electronics within the Internet of Wearable Fitness Tracking Applications,” IEEE Conference on Consumer Electronics (ICCE), Jan. 2018. Link
  7. Yan, W., Jin, C., Tehranipoor, F., and Chandy, J., “Phase Calibration PUF Design and Implementation on FPGA,” 27th International Conference on Field-Programmable Logic and Applications (FPL), Sep. 2017. Link
  8. Eckert, C., Tehranipoor, F., and Chandy, J., “DRNG: DRAM-based Random Number Generation using its Startup Value Behavior,” 60th IEEE International Midwest Symposium on Circuits and Systems (MWSCAS), Aug. 2017. Link
  9. Anagnostopoulos, N.A., Schaller, A., Fan, Y., Xiong, W., Tehranipoor, F., Arul, T., Gabmeyer, S., Szefer, J., Chandy, J., and Katzenbeisser, S., “Insights into the Potential Usage of the Initial Values of DRAM Arrays of Commercial Of-the-Shelf Devices for Security Applications,” 26th Crypto-Day, Nuremberg, Germany, Jun 2017. Link
  10. Tehranipoor, F., Karimian, N., Yan, W., and Chandy, J., “DRAM PUFs Reliability Analysis due to Device Accelerated Aging,” IEEE International Symposium on Circuits and Systems (ISCAS), May 2017. Link
  11. Karimian, N., Tehranipoor, F., Guo, Z., Tehranipoor, M., and Forte, D., “Noise Assessment Framework for Optimizing ECG-based Key Generation,” IEEE International Symposium on Technologies for Homeland Security (HST), Apr. 2017. Link
  12. Tehranipoor, F., Karimian, N., Wortman, P., and Chandy, J., “Investigation of the IoT in its Application to Low-Cost Authentication within Healthcare,” IEEE-EMBS International Conference on Biomedical and Health Informatics (BHI), Feb. 2017. Link
  13. Wortman, P., Tehranipoor, F., Karimian, N., and Chandy, J., ” Proposing a modeling framework for minimizing security vulnerabilities in IoT systems in the healthcare domain,” IEEE-EMBS International Conference on Biomedical and Health Informatics (BHI), Feb. 2017. Link
  14. Tehranipoor, F., Karimian, N., Yan, W., and Chandy, J., “A study of Power Supply Variation as a Source of Random Noise,” 30th International Conference on VLSI Design & 16th International Conference on Embedded Systems (VLSID), Jan. 2017. (Received Best Paper Award). Link
  15. Okwuosah, S., Funes, A., Guo, C., Tehranipoor, F., and Chandy, J., “Multi-Communication Type Debugging Probe,” IEEE MIT Undergraduate Research Technology Conference (MIT-URTC), Nov. 2016. Link
  16. Karimian, N., Wortman, P., and Tehranipoor, F., “Evolving Authentication Design Considerations of the Internet of Biometric Things (IoBT),” Proceedings of the Eleventh IEEE/ACM International Conference on Hardware/Software Codesign and System Synthesis (CODES), Oct. 2016. Link
  17. Tehranipoor, F., Yan, W., and Chandy, J., “Robust Hardware True Random Number Generators using DRAM Remanence Effects,” IEEE International Symposium on Hardware-Oriented Security and Trust (HOST), May 2016. Link
  18. Yan, W., Tehranipoor, F., and Chandy, J., “A Novel Way to Authenticate Untrusted Integrated Circuits,” IEEE International Conference on Computer Aided Design (ICCAD), Nov. 2015. Link
  19. Karimian, N., Tehranipoor, F., Rahman, M. T., Kelly, S., and Forte, D., “Genetic Algorithm for Hardware Trojan Detection with Ring Oscillator Network (RON),” IEEE International Conference on Technologies for Homeland Security (HST), Apr. 2015. Link
  20. Tehranipoor, F., Karimian, N., Xiao, K., and Chandy, J., “DRAM based Intrinsic Physical Unclonable Functions for System Level Security,” In Proceedings of the 25th edition on Great Lakes Symposium on VLSI (GLSVLSI), May 2015. Link

Preprints:

  1. Tehranipoor, F., Karimian, N., Mozaffari-Kermani, M., and Mahmoodi, H., “Deep RNN-Oriented Paradigm Shift through BOCANet: Broken Obfuscated Circuit Attack”, arXiv preprint arXiv:1803.03332, 2018. Link
  2. Karimian, N., Guo, Z., Tehranipoor, F., Woodard, D., Tehranipoor, M., and Forte D., “Secure and Reliable Biometric Access Control for Resource-Constrained Systems and IoT,” 2018. Link

Posters:

  1. Pugazhenthi, A., Tehranipoor, F., “Machine Learning Attacks on Physical Unclonable Functions”, 9th international GREEN and sustainable computing Conference (IGSC), October 2018.
  2. Anagnostopoulos, N.A., Arul, T., Fan Y., Sarangdhar, R., Sharma, R, Rosenstihl, M., Hatzfeld, C., Tehranipoor, F., Katzenbeisser, S.,On the Effects of Environmental Factors on the Functionality of Modern Dynamic Random Access Memory Modules,” 7th International Conference “Micro&Nano 2018”.
  3. Tehranipoor, F., Yan, W., and Chandy, J., “DRAM Remanence Effects based Hardware TRNG,” HOST Conference,  May 2016. Link
  4. Tehranipoor, F., and Chandy, J., “Investigation of DRAM Physical Unclonable Function, CHASE Workshop, March 2015. Link

Dissertation:

  • Tehranipoor, F., “Design and Architecture of Hardware-based Random Function Security Primitives,” Ph.D. Dissertation, Department of Electrical and Computer Engineering, University of Connecticut, August 2017. Link