Mark Tehranipoor

Last updated
Mark M. Tehranipoor
MarkTehranipoorHeadshot.jpg
Born
NationalityIranian-American
Education University of Texas at Dallas
Awards ACM Fellow
IEEE Fellow
NAI Fellow
HOST Hall of Fame Inductee [1]
NSF CAREER Award
MURI Award on Nanoscale Security
SRC Aristotle
Scientific career
Fields Hardware security
Design for testing
Electrical and Computer Engineering
Institutions University of Florida
(f.m.r) University of Connecticut
(f.m.r) University of Maryland
Website tehranipoor.ece.ufl.edu/index.html

Mark M. Tehranipoor is an Iranian American academic researcher specializing in hardware security and trust, electronics supply chain security, IoT security, and reliable and testable VLSI design. He is the Intel Charles E. Young Preeminence Endowed Professor in Cybersecurity at the University of Florida and serves as the Director of the Florida Institute for Cybersecurity Research. [2] Since June 2022, he has served as the chair of the Department of Electrical and Computer Engineering at the University of Florida. [3] He is a fellow of IEEE, ACM, and NAI as well as a Golden Core member of the IEEE. He is a co-founder of the International Symposium on Hardware Oriented Security and Trust (HOST). [1] He is the recipient of the 2023 SRC Aristotle award. Tehranipoor also serves as a co-director of the Air Force Office of Scientific Research CYAN and MEST Centers of Excellence. [4] [5]

Contents

Life

Tehranipoor earned a Bachelor of Science (B.S.) in Electrical Engineering from Tehran Polytechnic in 1997. After completing his Masters of Science (M.S.) in Electrical Engineering from the University of Tehran in 2000, he received the Texas Public Educational Grant and moved to the United States to pursue his Ph.D. in Electrical and Computer Engineering at the University of Texas at Dallas, completing the doctorate in two years and eight months.

He spent two years at the University of Maryland Baltimore as an assistant professor before moving to the University of Connecticut.

At UConn, he started to publish a series of books on Hardware Security, with the first being the Introduction to Hardware Security and Trust.

He initiated and established three centers of excellence in the area of hardware and cyber security; the Center for Hardware Assurance and Engineering (CHASE), [6] Comcast Center of Excellence on Security Innovation (CSI), [7] and the Connecticut Cybersecurity Center (C3). [8]

He received the National Science Foundation (NSF) CAREER Award in 2008 and AFOSR MURI Award in 2014.

Later in 2015, Tehranipoor moved to the University of Florida, acquiring the title of Intel Charles E. Young Preeminence Endowed Professor in Cybersecurity. He serves as the Director of the Florida Institute for Cybersecurity Research. [2] He is an IEEE fellow, ACM fellow and a co-founder of the International Symposium on Hardware Oriented Security and Trust. [1] Tehranipoor also serves as a co-director of the Air Force Office of Scientific Research CYAN and MEST Centers of Excellence. [4] In June 2022, Tehranipoor became the chair of the Department of Electrical and Computer Engineering at the University of Florida. [3]

Publications and patents

Tehranipoor has published over 600 conference and journal papers, 19 books, and holds 22 patents, with at least 24 more pending. [2] [9]

Select Books

Select articles

Select Patents

Related Research Articles

Logic simulation is the use of simulation software to predict the behavior of digital circuits and hardware description languages. Simulation can be performed at varying degrees of physical abstraction, such as at the transistor level, gate level, register-transfer level (RTL), electronic system-level (ESL), or behavioral level.

<span class="mw-page-title-main">Mark Horowitz</span> American computer architect (born 1957)

Mark A. Horowitz is an American electrical engineer, computer scientist, inventor, and entrepreneur who is the Yahoo! Founders Professor in the School of Engineering and the Fortinet Founders Chair of the Department of Electrical Engineering at Stanford University. He holds a joint appointment in the Electrical Engineering and Computer Science departments and previously served as the Chair of the Electrical Engineering department from 2008 to 2012. He is a co-founder, the former chairman, and the former chief scientist of Rambus Inc.. Horowitz has authored over 700 published conference and research papers and is among the most highly-cited computer architects of all time. He is a prolific inventor and holds 374 patents as of 2023.

An application-specific instruction set processor (ASIP) is a component used in system on a chip design. The instruction set architecture of an ASIP is tailored to benefit a specific application. This specialization of the core provides a tradeoff between the flexibility of a general purpose central processing unit (CPU) and the performance of an application-specific integrated circuit (ASIC).

<span class="mw-page-title-main">Physical unclonable function</span> Unreproducible object used in digital security

A physical unclonable function, or PUF, is a physical object whose operation cannot be reproduced ("cloned") in physical way, that for a given input and conditions (challenge), provides a physically defined "digital fingerprint" output (response). that serves as a unique identifier, most often for a semiconductor device such as a microprocessor. PUFs are often based on unique physical variations occurring naturally during semiconductor manufacturing. A PUF is a physical entity embodied in a physical structure. PUFs are implemented in integrated circuits, including FPGAs, and can be used in applications with high-security requirements, more specifically cryptography, Internet of Things (IOT) devices and privacy protection.

Virgil Dorin Gligor is a Romanian-American professor of electrical and computer engineering who specializes in the research of network security and applied cryptography.

A Hardware Trojan (HT) is a malicious modification of the circuitry of an integrated circuit. A hardware Trojan is completely characterized by its physical representation and its behavior. The payload of an HT is the entire activity that the Trojan executes when it is triggered. In general, Trojans try to bypass or disable the security fence of a system: for example, leaking confidential information by radio emission. HTs also could disable, damage or destroy the entire chip or components of it.

Hardware obfuscation is a technique by which the description or the structure of electronic hardware is modified to intentionally conceal its functionality, which makes it significantly more difficult to reverse-engineer. In other words, hardware obfuscation modifies the design in such a away that the resulting architecture becomes un-obvious to an adversary. Hardware Obfuscation can be of two types depending on the hardware platform targeted: (a) DSP Core Hardware Obfuscation - this type of obfuscation performs certain high level transformation on the data flow graph representation of DSP core to convert it into an unknown form that reflects an un-obvious architecture at RTL or gate level. This type of obfuscation is also called 'Structural Obfuscation'. Another type of DSP Core Obfuscation method is called 'Functional Obfuscation' - It uses a combination of AES and IP core locking blocks (ILBs) to lock the functionality of the DSP core using key-bits. Without application of correct key sequence, the DSP core produces either wrong output or no output at all (b) Combinational/Sequential Hardware Obfuscation - this type of obfuscation performs changes to the gate level structure of the circuit itself.

<span class="mw-page-title-main">Farinaz Koushanfar</span> Computer scientist

Farinaz Koushanfar is an Iranian-American computer scientist whose research concerns embedded systems, ad-hoc networks, and computer security. She is a professor and Henry Booker Faculty Scholar of Electrical and Computer Engineering at the University of California, San Diego.

Physical unclonable function (PUF), sometimes also called physically unclonable function, is a physical entity that is embodied in a physical structure and is easy to evaluate but hard to predict.

<span class="mw-page-title-main">Salvatore J. Stolfo</span> American computer scientist

Salvatore J. Stolfo is an academic and professor of computer science at Columbia University, specializing in computer security.

Ramesh Karri is a researcher specializing in trustworthy hardware, high assurance nanoscale integrated circuits, architectures and systems. He is a Professor of Electrical and Computer Engineering at New York University Polytechnic School of Engineering. Additionally, Karri is the co-founder of Trust-Hub, Embedded Security Challenge and NYU CRISSP center, the IEEE/ACM Symposium on Nanoscale Architectures and the IEEE Computer Society Technical Committee on Nanoscale Architectures. He is a member of NYU WIRELESS. He was awarded the Humboldt Fellowship and the National Science Foundation CAREER Award.

Surendra Prasad is an Indian communications engineer, a former director and an Usha chair professor of the Indian Institute of Technology, Delhi. He is also an emeritus professor of Bharti School of Telecommunication Technology And Management, a joint venture of IIT Delhi and is known for developing new techniques, algorithms and hardware in signal processing. He is an elected fellow of all the three major Indian science academies viz. Indian Academy of Sciences, Indian National Science Academy and the National Academy of Sciences, India. as well as the Indian National Academy of Engineering. The Council of Scientific and Industrial Research, the apex agency of the Government of India for scientific research, awarded him the Shanti Swarup Bhatnagar Prize for Science and Technology, one of the highest Indian science awards for his contributions to Engineering Sciences in 1988.

Hardware backdoors are backdoors in hardware, such as code inside hardware or firmware of computer chips. The backdoors may be directly implemented as hardware Trojans in the integrated circuit.

Venkata Narayana Padmanabhan is a computer scientist and principal researcher at Microsoft Research India. He is known for his research in networked and mobile systems. He is an elected fellow of the Indian National Academy of Engineering, Institute of Electrical and Electronics Engineers and the Association for Computing Machinery. The Council of Scientific and Industrial Research, the apex agency of the Government of India for scientific research, awarded him the Shanti Swarup Bhatnagar Prize for Science and Technology, one of the highest Indian science awards for his contributions to Engineering Sciences in 2016.

<span class="mw-page-title-main">Birendra Nath Mallick</span> Indian neurobiologist (born 1956)

Birendra Nath Mallick is an Indian neurobiologist and a professor of neurobiology at the School of Life Sciences of Jawaharlal Nehru University. Known for his research on the Neuroscience of sleep, Mallick has authored and edited articles and in the first monograph on REM Sleep. He is a J. C. Bose National Fellow of the Department of Biotechnology and an elected fellow of all the three major Indian science academies viz. National Academy of Sciences, India, Indian Academy of Sciences, and Indian National Science Academy.

Hardware security is a discipline originated from the cryptographic engineering and involves hardware design, access control, secure multi-party computation, secure key storage, ensuring code authenticity, measures to ensure that the supply chain that built the product is secure among other things.

Yashwant Gupta is an Indian astrophysicist and a professor at the National Centre for Radio Astrophysics (NCRA) of the Tata Institute of Fundamental Research. He is currently a Distinguished Professor and also the Centre Director at NCRA.

This is a list of cybersecurity information technology. Cybersecurity is security as it is applied to information technology. This includes all technology that stores, manipulates, or moves data, such as computers, data networks, and all devices connected to or included in networks, such as routers and switches. All information technology devices and facilities need to be secured against intrusion, unauthorized use, and vandalism. Additionally, the users of information technology should be protected from theft of assets, extortion, identity theft, loss of privacy and confidentiality of personal information, malicious mischief, damage to equipment, business process compromise, and the general activity of cybercriminals. The public should be protected against acts of cyberterrorism, such as the compromise or loss of the electric power grid.

Reverse engineering of Printed circuit boards is the process of generating fabrication and design data for an existing circuit board, either closely or exactly replicating its functionality.

<span class="mw-page-title-main">Prabhat Mishra</span> American computer scientist

Prabhat Mishra is a Professor in the Department of Computer and Information Science and Engineering and a UF Research Foundation Professor at the University of Florida. Prof. Mishra's research interests are in hardware security, quantum computing, embedded systems, system-on-chip validation, formal verification, and machine learning.

References

  1. 1 2 3 HOST Symposium Hall of Fame
  2. 1 2 3 Mark Tehranipoor, University of Florida
  3. 1 2 "ECE Florida Welcomes Mark Tehranipoor as Department Chair – ECE FLORIDA". 6 June 2022.
  4. 1 2 Hardware Security Research and Education Centers of Excellence open at University of Florida and Ohio State
  5. National Micro Electronics Security Training Center - Our Team
  6. Center for Hardware Assurance and Engineering
  7. Comcast Center of Excellence on Security Innovation
  8. Connecticut Cybersecurity Center
  9. Mark M. Tehranipoor - Google Scholar
  10. Tehranipoor, Mark (20 February 2021). Emerging Topics in Hardware Security. Springer. ISBN   978-3-030-64447-5.
  11. Asadizanjani , Rahman, Tehranipoor, Navid, Mir Tanjidur, Mark (16 February 2021). Physical Assurance For Electronic Devices and Systems. Springer. ISBN   978-3-030-62608-2.{{cite book}}: CS1 maint: multiple names: authors list (link)
  12. Bhunia, Tehranipoor, Swarup, Mark (October 30, 2018). Hardware Security: A Hands-on Learning Approach. Morgan Kaufmann. ISBN   9780128124772.{{cite book}}: CS1 maint: multiple names: authors list (link)
  13. Forte, Bhunia, Tehranipoor, Domenic, Swarup, Mark (30 June 2020). Security Opportunities in Nano Devices and Emerging Technologies. CRC Press. ISBN   9780367572624.{{cite book}}: CS1 maint: multiple names: authors list (link)
  14. Bhunia, Tehranipoor, Swarup, Mark (29 November 2017). The Hardware Trojan War: Attacks, Myths, and Defenses. Springer. ISBN   978-3-319-68511-3.{{cite book}}: CS1 maint: multiple names: authors list (link)
  15. Forte, Bhunia, Tehranipoor, Domenic, Swarup, Mark (2 January 2017). Hardware Protection through Obfuscation. Springer. ISBN   978-3-319-49019-9.{{cite book}}: CS1 maint: multiple names: authors list (link)
  16. Mishra, Bhunia, Tehranipoor, Prabhat, Swarup, Mark (2 January 2017). Hardware IP Security and Trust. Springer. ISBN   978-3-319-49025-0.{{cite book}}: CS1 maint: multiple names: authors list (link)
  17. Tehranipoor, Guin, Forte, Mark, Ujjwal, Domenic (12 February 2015). Counterfeit Integrated Circuits: Detection and Avoidance. Springer. ISBN   978-3-319-11824-6.{{cite book}}: CS1 maint: multiple names: authors list (link)
  18. Tehranipoor, Salmani, Zhang, Mark, Hassan, Xuehui (4 October 2013). Integrated Circuit Authentication: Hardware Trojans and Counterfeit Detection. Springer. ISBN   978-3-319-00816-5.{{cite book}}: CS1 maint: multiple names: authors list (link)
  19. Tehranipoor, Wang, Mark, Cliff (22 September 2011). Introduction to Hardware Security and Trust. Springer. ISBN   978-1-4419-8080-9.{{cite book}}: CS1 maint: multiple names: authors list (link)
  20. Tehranipoor, Peng, Chakrabarty, Mark, Ke, Krishnendu (8 September 2011). Test and Diagnosis for Small-Delay Defects. Springer. ISBN   978-1-4419-8297-1.{{cite book}}: CS1 maint: multiple names: authors list (link)
  21. Tehranipoor, Mark (8 December 2007). Emerging Nanotechnologies: Test, Defect Tolerance, and Reliability. Springer. ISBN   978-0-387-74747-7.
  22. Ahmed, Tehranipoor, Nisar, Mark (2008). Nanometer Technology Designs: High-Quality Delay Tests. Springer. doi:10.1007/978-0-387-75728-5. ISBN   978-0-387-76486-3.{{cite book}}: CS1 maint: multiple names: authors list (link)
  23. Tehranipoor, Mohammad; Koushanfar, Farinaz (January 2010). "A Survey of Hardware Trojan Taxonomy and Detection". IEEE Design & Test of Computers. 27 (1): 10–25. doi:10.1109/MDT.2010.7. S2CID   206459491.
  24. Guin, Huang, DiMase, Carulli, Tehranipoor, Makris, Ujjwal, Ke, Daniel, John M., Mark, Yiorgos (July 15, 2014). "Counterfeit Integrated Circuits: A Rising Threat in the Global Semiconductor Supply Chain". Proceedings of the IEEE. 102 (8): 1207–1228. doi: 10.1109/JPROC.2014.2332291 . S2CID   15766845.{{cite journal}}: CS1 maint: multiple names: authors list (link)
  25. Salmani, Tehranipoor, Plusquellic, Hassan, Mark, Jim (January 2, 2011). "A Novel Technique for Improving Hardware Trojan Detection and Reducing Trojan Activation Time". IEEE Transactions on Very Large Scale Integration (VLSI) Systems. 20 (1): 112–125. doi:10.1109/TVLSI.2010.2093547. S2CID   5242798.{{cite journal}}: CS1 maint: multiple names: authors list (link)
  26. Xu, Shakya, Tehranipoor, Forte, Xiaolin, Bicky, Mark, Domenic (August 25, 2017). "Novel Bypass Attack and BDD-based Tradeoff Analysis Against All Known Logic Locking Attacks" (PDF). Cryptographic Hardware and Embedded Systems – CHES 2017. Lecture Notes in Computer Science. Vol. 10529. pp. 189–210. doi:10.1007/978-3-319-66787-4_10. ISBN   978-3-319-66786-7.{{cite book}}: CS1 maint: multiple names: authors list (link)
  27. Xiao, Tehranipoor, Kan, Mark (August 16, 2013). "BISA: Built-in self-authentication for preventing hardware Trojan insertion". 2013 IEEE International Symposium on Hardware-Oriented Security and Trust (HOST). pp. 45–50. doi:10.1109/HST.2013.6581564. ISBN   978-1-4799-0601-7. S2CID   13915850.{{cite book}}: CS1 maint: multiple names: authors list (link)
  28. Nahiyan, Xiao, Yang, Jin, Forte, Tehranipoor, Adib, Kan, Kun, Yier, Domenic, Mark (August 18, 2016). "AVFSM". Proceedings of the 53rd Annual Design Automation Conference. pp. 1–6. doi:10.1145/2897937.2897992. ISBN   9781450342360. S2CID   11378273.{{cite book}}: CS1 maint: multiple names: authors list (link)
  29. Guin, Shi, Forte, Tehranipoor, Ujjwal, Qihang, Domenic, Mark (May 27, 2016). "FORTIS: A Comprehensive Solution for Establishing Forward Trust for Protecting IPs and ICs". ACM Transactions on Design Automation of Electronic Systems. 21 (4). doi:10.1145/2893183. S2CID   17234477.{{cite journal}}: CS1 maint: multiple names: authors list (link)
  30. Rahman, Rahman, Wang, Tajik, Khalil, Farahmandi, Forte, Asadizanjania, Tehranipoor, M. Tanjidur, M. Sazadur, Huanyu, Shahin, Waleed, Farimah, Domenic, Navid, Mark (July 20, 2019). "Defense-in-Depth: A Recipe for Logic Locking to Prevail". Integration. 72: 39–57. arXiv: 1907.08863 . doi:10.1016/j.vlsi.2019.12.007. S2CID   198147689.{{cite journal}}: CS1 maint: multiple names: authors list (link)
  31. United StatesActive 8,850,608,Mark Tehranipoor, Xiaoxiao Wang, Xuehui Zhang,"Embedded ring oscillator network for integrated circuit security and threat detection",published September 30, 2014,issued September 30, 2014, assigned to University of Connecticut
  32. United StatesActive 9,071,428,Mark Tehranipoor, Nicholas Tuzzio,"Methods and systems for hardware piracy prevention",published June 30, 2015,issued June 30, 2015, assigned to University of Connecticut
  33. United StatesActive 9,218,506,Mark Tehranipoor, Kan Xiao,"Methods and Systems for Preventing Hardware Trojan Insertion",published December 22, 2015,issued December 22, 2015, assigned to University of Connecticut
  34. United StatesActive 9,785,789,Bahram Javidi, Adam Markman, Mark Tehranipoor,"Method and System for Verification and Authentication Using Optically Encoded QR Codes",published October 10, 2017,issued October 10, 2017, assigned to University of Connecticut
  35. United StatesActive 10,181,065,Mark Tehranipoor, Haoting Shen, Kun Yang, Domenic Forte,"UCR: An Unclonable Environmentally-Sensitive Chipless RFID Tag",published January 15, 2019,issued January 15, 2019, assigned to University of Florida Research Foundation Inc
  36. United StatesActive 10,283,459,Swarup Bhunia, Haoting Shen, Mark Tehranipoor, Domenic Forte, Navid Asadizanjani,"Vanishing Via for Hardware IP Protection Against Reverse Engineering",published May 7, 2019,issued May 7, 2019, assigned to University of Florida Research Foundation Inc
  37. United StatesActive 10,181,065,Mark Tehranipoor, Haoting Shen, Kun Yang, Domenic Forte,"Unclonable environmentally-sensitive chipless RFID tag with a plurality of slot resonators",published January 15, 2019,issued January 15, 2019, assigned to University of Florida Research Foundation Inc
  38. United StatesActive 10,573,605,Mark Tehranipoor, Domenic Forte, Navid Asadizanjani, Qihang Shi,"Layout-Driven Method to Assess Vulnerability of ICs to Microprobing Attacks",published February 25, 2020,issued February 25, 2020, assigned to University of Connecticutand University of Florida Research Foundation Inc