Mark Tehranipoor

From Wikipedia, the free encyclopedia
Mark M. Tehranipoor
Born
NationalityIranian-American
EducationUniversity of Texas at Dallas
AwardsACM Fellow
IEEE Fellow
NAI Fellow
HOST Hall of Fame Inductee[1]
NSF CAREER Award
MURI Award on Nanoscale Security
SRC Aristotle
Scientific career
FieldsHardware security
Design for testing
Electrical and Computer Engineering
InstitutionsUniversity of Florida
(f.m.r) University of Connecticut
(f.m.r) University of Maryland
Websitetehranipoor.ece.ufl.edu/index.html

Mark M. Tehranipoor is an Iranian American academic researcher specializing in hardware security and trust, electronics supply chain security, IoT security, and reliable and testable VLSI design. He is the Intel Charles E. Young Preeminence Endowed Professor in Cybersecurity at the University of Florida and serves as the Director of the Florida Institute for Cybersecurity Research.[2] Since June 2022, he has served as the chair of the Department of Electrical and Computer Engineering at the University of Florida.[3] He is a fellow of IEEE, ACM, and NAI as well as a Golden Core member of the IEEE. He is a co-founder of the International Symposium on Hardware Oriented Security and Trust (HOST).[1] He is the recipient of the 2023 SRC Aristotle award. Tehranipoor also serves as a co-director of the Air Force Office of Scientific Research CYAN and MEST Centers of Excellence.[4][5]

Life[edit]

Tehranipoor earned a Bachelor of Science (B.S.) in Electrical Engineering from Tehran Polytechnic in 1997. After completing his Masters of Science (M.S.) in Electrical Engineering from the University of Tehran in 2000, he received the Texas Public Educational Grant and moved to the United States to pursue his Ph.D. in Electrical and Computer Engineering at the University of Texas at Dallas, completing the doctorate in two years and eight months.

He spent two years at the University of Maryland Baltimore as an assistant professor before moving to the University of Connecticut.

At UConn, he started to publish a series of books on Hardware Security, with the first being the Introduction to Hardware Security and Trust.

He initiated and established three centers of excellence in the area of hardware and cyber security; the Center for Hardware Assurance and Engineering (CHASE),[6] Comcast Center of Excellence on Security Innovation (CSI),[7] and the Connecticut Cybersecurity Center (C3).[8]

He received the National Science Foundation (NSF) CAREER Award in 2008 and AFOSR MURI Award in 2014.

Later in 2015, Tehranipoor moved to the University of Florida, acquiring the title of Intel Charles E. Young Preeminence Endowed Professor in Cybersecurity. He serves as the Director of the Florida Institute for Cybersecurity Research.[2] He is an IEEE fellow, ACM fellow and a co-founder of the International Symposium on Hardware Oriented Security and Trust.[1] Tehranipoor also serves as a co-director of the Air Force Office of Scientific Research CYAN and MEST Centers of Excellence.[4] In June 2022, Tehranipoor became the chair of the Department of Electrical and Computer Engineering at the University of Florida.[3]

Publications and patents[edit]

Tehranipoor has published over 600 conference and journal papers, 19 books, and holds 22 patents, with at least 24 more pending.[2][9]

Select Books[edit]

  • Mark Tehranipoor, Emerging Topics in Hardware Security, Springer, 2020.[10]
  • Navid Asadi, Md. Tanjid Rahman and Mark M. Tehranipoor, Physical Assurance: For Electronic Devices and Systems, Springer, 2020.[11]
  • Swarup Bhunia and Mark M. Tehranipoor, Hardware Security: A Hands-on Learning Approach, Elsevier, Morgan Kaufmann imprint, 2018.[12]
  • M. Tehranipoor, D. Forte, G, Rose, and S. Bhunia, Security Opportunities in Nano Devices and Emerging Technologies, CRC Press, 2017.[13]
  • S. Bhunia and M. Tehranipoor, The Hardware Trojan War: Attacks, Myths, and Defenses, Springer, 2017.[14]
  • D. Forte, S. Bhunia, and M. Tehranipoor, Hardware Protection through Obfuscation, Springer, 2017.[15]
  • P. Mishra, S. Bhunia, and M. Tehranipoor, Hardware IP Security and Trust, Springer, 2017.[16]
  • M. Tehranipoor, U. Guin, and D. Forte, Counterfeit Integrated Circuits: Detection and Avoidance, Springer, 2015.[17]
  • M. Tehranipoor, H. Salmani, and X. Zhang, Integrated Circuit Authentication: Hardware Trojans and Counterfeit Detection, Springer, July 2013.[18]
  • M. Tehranipoor and C. Wang, Introduction to Hardware Security and Trust, Springer, August 2011.[19]
  • M. Tehranipoor, K. Peng, and K. Chakrabarty, Test and Diagnosis for Small-Delay Defects, Springer, September 2011.[20]
  • M. Tehranipoor, Emerging Nanotechnologies: Test, Defect Tolerance, and Reliability, Springer, November 2007.[21]
  • M. Tehranipoor and N. Ahmed, Nanometer Technology Designs: High-Quality Delay Tests, Springer, December 2007.[22]

Select articles[edit]

  • M. Tehranipoor and F. Koushanfar, "A Survey of Hardware Trojan Taxonomy and Detection," IEEE Design and Test of Computers, 2010.[23]
  • U. Guin, K. Huang, D. DiMase, J. Carulli, M. Tehranipoor, Y. Makris, "Counterfeit Integrated Circuits: A Rising Threat in the Global Semiconductor Supply Chain," Proceedings of IEEE, 2014.[24]
  • H. Salmani, M. Tehranipoor, and J. Plusquellic, "A Novel Technique for Improving Hardware Trojan Detection and Reducing Trojan Activation Time," IEEE Transactions on VLSI (TVLSI), 2012.[25]
  • X. Xu, B. Shakiya, M. Tehranipoor, and D. Forte, "Novel Bypass Attack and BDD-based Tradeoff Analysis Against all Known Logic Locking Attacks," Conference on Cryptographic Hardware and Embedded Systems (CHES), 2017.[26]
  • K. Xiao and M. Tehranipoor, "BISA: Built-In Self-Authentication for Preventing Hardware Trojan Insertion," Int. IEEE Symposium on Hardware-Oriented Security and Trust (HOST), 2013.[27]
  • A. Nahiyan, K. Xiao, D. Forte, Y. Jin, and M. Tehranipoor, "AVFSM: A Framework for Identifying and Mitigating Vulnerabilities in FSMs," Design Automation Conference (DAC), 2016.[28]
  • U. Guin, Q. Shi, D. Forte, and M. Tehranipoor, "FORTIS: A Comprehensive Solution for Establishing Forward Trust for Protecting IPs and ICs," ACM Transactions on Design Automation of Electronic Systems (TODAES), 2016.[29]
  • M. T. Rahman, M. S. Rahman, H. Wang, S. Tajik, W. Khalil, F. Farahmandi, D. Forte, N. Asadi, and M. Tehranipoor, "Defense-in-Depth: A Recipe for Logic Locking to Prevail," Integration, the VLSI Journal, 2020.[30]

Select Patents[edit]

  • Embedded ring oscillator network for integrated circuit security and threat detection, 2014, M. Tehranipoor, X. Wang, X. Zhang, US 8850608 B2, WO 2012122309 A3 (Grant) [31]
  • Methods and Systems for Hardware Piracy Prevention, 2014, M. Tehranipoor and N. Tuzzio, US9071428 B2 (Grant) [32]
  • Methods and Systems for Preventing Hardware Trojan Insertion, M. Tehranipoor and K. Xiao, US20140283147 A1 (Grant)[33]
  • Photon-Counting Security Tagging and Verification Using Optically Encoded QR Codes, B. Javidi, A. Markman, and M. Tehranipoor, US20150295711 A1 (Grant)[34]
  • UCR: An Unclonable Environmentally-Sensitive Chipless RFID Tag, Jan. 15, 2019, M. Tehranipoor, D. Forte, K. Yang, and H. Shen, 10181065 (Grant)[35]
  • Vanishing Via for Hardware IP Protection Against Reverse Engineering, 2017, S. Bhunia, M. Tehranipoor, D. Forte, N. Asadi, and H. Shen, 10283459 (Grant)[36]
  • Unclonable environmentally-sensitive chipless RFID tag with a plurality of slot resonators, 10181065, Mark Tehranipoor, Kun Yang, Haoting Shen, and Domenic Forte (Grant)[37]
  • Layout-Driven Method to Assess Vulnerability of ICs to Microprobing Attacks, M. Tehranipoor, D. Forte, N. Asadi, and Q. Shi, U.S. Patent No. 10,573,605 (Grant)[38]

References[edit]

  1. ^ a b c HOST Symposium Hall of Fame
  2. ^ a b c Mark Tehranipoor, University of Florida
  3. ^ a b "ECE Florida Welcomes Mark Tehranipoor as Department Chair – ECE FLORIDA". 6 June 2022.
  4. ^ a b Hardware Security Research and Education Centers of Excellence open at University of Florida and Ohio State
  5. ^ National Micro Electronics Security Training Center - Our Team
  6. ^ Center for Hardware Assurance and Engineering
  7. ^ Comcast Center of Excellence on Security Innovation
  8. ^ Connecticut Cybersecurity Center
  9. ^ Mark M. Tehranipoor - Google Scholar
  10. ^ Tehranipoor, Mark (20 February 2021). Emerging Topics in Hardware Security. Springer. ISBN 978-3-030-64447-5.
  11. ^ Asadizanjani , Rahman, Tehranipoor, Navid, Mir Tanjidur, Mark (16 February 2021). Physical Assurance For Electronic Devices and Systems. Springer. ISBN 978-3-030-62608-2.{{cite book}}: CS1 maint: multiple names: authors list (link)
  12. ^ Bhunia, Tehranipoor, Swarup, Mark (October 30, 2018). Hardware Security: A Hands-on Learning Approach. Morgan Kaufmann. ISBN 9780128124772.{{cite book}}: CS1 maint: multiple names: authors list (link)
  13. ^ Forte, Bhunia, Tehranipoor, Domenic, Swarup, Mark (30 June 2020). Security Opportunities in Nano Devices and Emerging Technologies. CRC Press. ISBN 9780367572624.{{cite book}}: CS1 maint: multiple names: authors list (link)
  14. ^ Bhunia, Tehranipoor, Swarup, Mark (29 November 2017). The Hardware Trojan War: Attacks, Myths, and Defenses. Springer. ISBN 978-3-319-68511-3.{{cite book}}: CS1 maint: multiple names: authors list (link)
  15. ^ Forte, Bhunia, Tehranipoor, Domenic, Swarup, Mark (2 January 2017). Hardware Protection through Obfuscation. Springer. ISBN 978-3-319-49019-9.{{cite book}}: CS1 maint: multiple names: authors list (link)
  16. ^ Mishra, Bhunia, Tehranipoor, Prabhat, Swarup, Mark (2 January 2017). Hardware IP Security and Trust. Springer. ISBN 978-3-319-49025-0.{{cite book}}: CS1 maint: multiple names: authors list (link)
  17. ^ Tehranipoor, Guin, Forte, Mark, Ujjwal, Domenic (12 February 2015). Counterfeit Integrated Circuits: Detection and Avoidance. Springer. ISBN 978-3-319-11824-6.{{cite book}}: CS1 maint: multiple names: authors list (link)
  18. ^ Tehranipoor, Salmani, Zhang, Mark, Hassan, Xuehui (4 October 2013). Integrated Circuit Authentication: Hardware Trojans and Counterfeit Detection. Springer. ISBN 978-3-319-00816-5.{{cite book}}: CS1 maint: multiple names: authors list (link)
  19. ^ Tehranipoor, Wang, Mark, Cliff (22 September 2011). Introduction to Hardware Security and Trust. Springer. ISBN 978-1-4419-8080-9.{{cite book}}: CS1 maint: multiple names: authors list (link)
  20. ^ Tehranipoor, Peng, Chakrabarty, Mark, Ke, Krishnendu (8 September 2011). Test and Diagnosis for Small-Delay Defects. Springer. ISBN 978-1-4419-8297-1.{{cite book}}: CS1 maint: multiple names: authors list (link)
  21. ^ Tehranipoor, Mark (8 December 2007). Emerging Nanotechnologies: Test, Defect Tolerance, and Reliability. Springer. ISBN 978-0-387-74747-7.
  22. ^ Ahmed, Tehranipoor, Nisar, Mark (2008). Nanometer Technology Designs: High-Quality Delay Tests. Springer. doi:10.1007/978-0-387-75728-5. ISBN 978-0-387-76486-3.{{cite book}}: CS1 maint: multiple names: authors list (link)
  23. ^ Tehranipoor, Mohammad; Koushanfar, Farinaz (January 2010). "A Survey of Hardware Trojan Taxonomy and Detection". IEEE Design & Test of Computers. 27 (1): 10–25. doi:10.1109/MDT.2010.7. S2CID 206459491.
  24. ^ Guin, Huang, DiMase, Carulli, Tehranipoor, Makris, Ujjwal, Ke, Daniel, John M., Mark, Yiorgos (July 15, 2014). "Counterfeit Integrated Circuits: A Rising Threat in the Global Semiconductor Supply Chain". Proceedings of the IEEE. 102 (8): 1207–1228. doi:10.1109/JPROC.2014.2332291. S2CID 15766845.{{cite journal}}: CS1 maint: multiple names: authors list (link)
  25. ^ Salmani, Tehranipoor, Plusquellic, Hassan, Mark, Jim (January 2, 2011). "A Novel Technique for Improving Hardware Trojan Detection and Reducing Trojan Activation Time". IEEE Transactions on Very Large Scale Integration (VLSI) Systems. 20 (1): 112–125. doi:10.1109/TVLSI.2010.2093547. S2CID 5242798.{{cite journal}}: CS1 maint: multiple names: authors list (link)
  26. ^ Xu, Shakya, Tehranipoor, Forte, Xiaolin, Bicky, Mark, Domenic (August 25, 2017). "Novel Bypass Attack and BDD-based Tradeoff Analysis Against All Known Logic Locking Attacks" (PDF). Cryptographic Hardware and Embedded Systems – CHES 2017. Lecture Notes in Computer Science. Vol. 10529. pp. 189–210. doi:10.1007/978-3-319-66787-4_10. ISBN 978-3-319-66786-7.{{cite book}}: CS1 maint: multiple names: authors list (link)
  27. ^ Xiao, Tehranipoor, Kan, Mark (August 16, 2013). "BISA: Built-in self-authentication for preventing hardware Trojan insertion". 2013 IEEE International Symposium on Hardware-Oriented Security and Trust (HOST). pp. 45–50. doi:10.1109/HST.2013.6581564. ISBN 978-1-4799-0601-7. S2CID 13915850.{{cite book}}: CS1 maint: multiple names: authors list (link)
  28. ^ Nahiyan, Xiao, Yang, Jin, Forte, Tehranipoor, Adib, Kan, Kun, Yier, Domenic, Mark (August 18, 2016). "AVFSM". Proceedings of the 53rd Annual Design Automation Conference. pp. 1–6. doi:10.1145/2897937.2897992. ISBN 9781450342360. S2CID 11378273.{{cite book}}: CS1 maint: multiple names: authors list (link)
  29. ^ Guin, Shi, Forte, Tehranipoor, Ujjwal, Qihang, Domenic, Mark (May 27, 2016). "FORTIS: A Comprehensive Solution for Establishing Forward Trust for Protecting IPs and ICs". ACM Transactions on Design Automation of Electronic Systems. 21 (4). doi:10.1145/2893183. S2CID 17234477.{{cite journal}}: CS1 maint: multiple names: authors list (link)
  30. ^ Rahman, Rahman, Wang, Tajik, Khalil, Farahmandi, Forte, Asadizanjania, Tehranipoor, M. Tanjidur, M. Sazadur, Huanyu, Shahin, Waleed, Farimah, Domenic, Navid, Mark (July 20, 2019). "Defense-in-Depth: A Recipe for Logic Locking to Prevail". Integration. 72: 39–57. arXiv:1907.08863. doi:10.1016/j.vlsi.2019.12.007. S2CID 198147689.{{cite journal}}: CS1 maint: multiple names: authors list (link)
  31. ^ United States Active 8,850,608, Mark Tehranipoor, Xiaoxiao Wang, Xuehui Zhang, "Embedded ring oscillator network for integrated circuit security and threat detection", published September 30, 2014, issued September 30, 2014, assigned to University of Connecticut 
  32. ^ United States Active 9,071,428, Mark Tehranipoor, Nicholas Tuzzio, "Methods and systems for hardware piracy prevention", published June 30, 2015, issued June 30, 2015, assigned to University of Connecticut 
  33. ^ United States Active 9,218,506, Mark Tehranipoor, Kan Xiao, "Methods and Systems for Preventing Hardware Trojan Insertion", published December 22, 2015, issued December 22, 2015, assigned to University of Connecticut 
  34. ^ United States Active 9,785,789, Bahram Javidi, Adam Markman, Mark Tehranipoor, "Method and System for Verification and Authentication Using Optically Encoded QR Codes", published October 10, 2017, issued October 10, 2017, assigned to University of Connecticut 
  35. ^ United States Active 10,181,065, Mark Tehranipoor, Haoting Shen, Kun Yang, Domenic Forte, "UCR: An Unclonable Environmentally-Sensitive Chipless RFID Tag", published January 15, 2019, issued January 15, 2019, assigned to University of Florida Research Foundation Inc 
  36. ^ United States Active 10,283,459, Swarup Bhunia, Haoting Shen, Mark Tehranipoor, Domenic Forte, Navid Asadizanjani, "Vanishing Via for Hardware IP Protection Against Reverse Engineering", published May 7, 2019, issued May 7, 2019, assigned to University of Florida Research Foundation Inc 
  37. ^ United States Active 10,181,065, Mark Tehranipoor, Haoting Shen, Kun Yang, Domenic Forte, "Unclonable environmentally-sensitive chipless RFID tag with a plurality of slot resonators", published January 15, 2019, issued January 15, 2019, assigned to University of Florida Research Foundation Inc 
  38. ^ United States Active 10,573,605, Mark Tehranipoor, Domenic Forte, Navid Asadizanjani, Qihang Shi, "Layout-Driven Method to Assess Vulnerability of ICs to Microprobing Attacks", published February 25, 2020, issued February 25, 2020, assigned to University of Connecticut and University of Florida Research Foundation Inc