WARNING: This directory contains pdf/ps files of articles that may be covered by copyright. You may browse the articles at your convenience, in the same spirit as you may read a journal or a proceedings article in a public library. Retrieving, copying, or distributing these files may violate copyright protection laws.
Books
- M. Tehranipoor, K. Z. Azar, N. Asadi, F. Rahman, H. M. Kamali, and F. Farahmandi, Hardware Security: A Look into the Future, Springer, 2024.
- N. Asadi, C. Xi and M. Tehranipoor, Materials for Electronics Security and Assurance, Elsevier, 2024.
- K. Z. Azar, H. M. Kamali, F. Farahmandi, and M. Tehranipoor, Understanding Logic Locking, Springer, 2023.
- M. Tehranipoor, N. Anandakumar, and F. Farahmandi, Hardware Security Training, Hands-on!, Springer, 2023.
- F. Farahmandi, S. Rajendran, S. Rahman, and M. Tehranipoor, CAD for Hardware Security, Springer, 2023.
- M. Tehranipoor, N. Pundir, N. Vashistha, and F. Farahmandi, Hardware Security Primitives, Springer 2023.
- M. Tehranipoor, Emerging Topics in Hardware Security, Springer, 2021.
- N. Asadi, Md. T. Rahman and M. Tehranipoor, Physical Assurance: For Electronic Devices and Systems, Springer, 2021
- S. Bhunia and M. Tehranipoor, Hardware Security: A Hands-on Learning Approach, Elsevier, Morgan Kaufmann imprint, 2018.
- M. Tehranipoor, D. Forte, G, Rose, and S. Bhunia, Security Opportunities in Nano Devices and Emerging Technologies, CRC Press, 2017.
- S. Bhunia and M. Tehranipoor, The Hardware Trojan War: Attacks, Myths, and Defenses, Springer, 2017.
- D. Forte, S. Bhunia, and M. Tehranipoor, Hardware Protection through Obfuscation, Springer, 2017.
- P. Mishra, S. Bhunia, and M. Tehranipoor, Hardware IP Security and Trust, Springer, 2017.
- M. Tehranipoor, U. Guin, and D. Forte, Counterfeit Integrated Circuits: Detection and Avoidance, Springer, 2015.
- M. Tehranipoor, H. Salmani, and X. Zhang, Integrated Circuit Authentication: Hardware Trojans and Counterfeit Detection, Springer, July 2013.
- M. Tehranipoor and C. Wang, Introduction to Hardware Security and Trust, Springer, August 2011.
- M. Tehranipoor, K. Peng, and K. Chakrabarty, Test and Diagnosis for Small-Delay Defects, Springer, September 2011.
- M. Tehranipoor, Emerging Nanotechnologies: Test, Defect Tolerance, and Reliability, Springer, November, 2007.
- M. Tehranipoor and N. Ahmed, Nanometer Technology Designs: High-Quality Delay Tests, Springer, December 2007.
Book Chapters
- M. M. Hossain, F. Rahman, F. Farahmandi, and M. Tehranipoor, Firmware Protection, in Emerging Topics in Hardware Security, Springer, 2021.
- M. M. Hossain, F. Rahman, F. Farahmandi, and M. Tehranipoor, Software Security with Hardware in Mind, in Emerging Topics in Hardware Security, Springer, 2021.
- A. Nahiyan, M. He, Jungmin Park, and M. Tehranipoor, CAD for Side-Channel Assessment, in Emerging Topics in Hardware Security, Springer, 2021.
- M. R. Makki, N. Pundir, M. Tehranipoor, and F. Farahmandi, Security Assessment of High-Level Synthesis, in Emerging Topics in Hardware Security, Springer, 2021.
- P. Cui, U. Guin, and M. Tehranipoor, Trillion Sensors Security, in Emerging Topics in Hardware Security, Springer, 2021.
- H. Wang, S. Chen, S. Islam Sami, F. Rahman, and M. Tehranipoor, Digital Twin with a Perspective from Manufacturing Industry, in Emerging Topics in Hardware Security, Springer, 2021.
- M. Rahman and M. Tehranipoor, Blockchain-Enabled Electronics Supply Chain Assurance, in Emerging Topics in Hardware Security, Springer, 2021.
- O. Arias, F. Rahman, M. Tehranipoor, and Yier Jin, “IoT Device Authentication: From a Cross-Layer Perspective” 2020.
- Q. Shi, D. Forte, and M. Tehranipoor, “Deterrent Approaches Against Hardware Trojan Insertion,” in Hardware Trojan War, Springer 2017.
- S. Bhunia, A. Prasad Deb Nath, and M. Tehranipoor, “Introduction to Hardware Trojans,” in Hardware Trojan War, Springer 2017.
- F. Rahman, A. Prasad Deb Nath, D. Forte, S. Bhunia, and M. Tehranipoor, “Nano CMOS Logic-Based Security Primitive,” in Security Opportunities in Nano Devices and Emerging Technologies, CRC Press, 2017.
- H. Shen, F. Rahman, M. Tehranipoor, and D. Forte, “Carbon-Based Novel Devices for Hardware Security,” in Security Opportunities in Nano Devices and Emerging Technologies, CRC Press, 2017.
- F. Rahman, A. Prasad Deb Nath, S. Bhunia, D. Forte, and M. Tehranipoor, “Composition of Physical Unclonable Functions: From Device to Architecture,” in Security Opportunities in Nano Devices and Emerging Technologies, CRC Press, 2017.
- B. Shakya, X. Xu, N. Asadi, M. Tehranipoor, and D. Forte, “Leveraging Circuit Edit for Low-Volume Trusted Nanometer Fabrication,” in Security Opportunities in Nano Devices and Emerging Technologies, CRC Press, 2017.
- U. Guin and M. Tehranipoor, and F. Forte, “Obfuscation and Encryption for Securing Semiconductor Supply Chain,” in Hardware Protection through Obfuscation, 2016.
- Q. Shi, K. Xiao, D. Forte, and M. Tehranipoor, “Obfuscated Built-in Self Authentication,” in Hardware Protection through Obfuscation, 2016.
- T. Rahman, D. Forte, M. Tehranipoor, “Protection of Assets from Scan Chain Vulnerabilities through Obfuscation,” in Hardware Protection through Obfuscation, 2016.
- Z. Guo, M. Tehranipoor, and F. Forte, “Permutation based Obfuscation,” in Hardware Protection through Obfuscation, 2016.
- B. Shakya, M. Tehranipoor, S. Bhunia, and F. Forte, “Introduction to Hardware Obfuscation: Motivation, Methods and Evaluation,” in Hardware Protection through Obfuscation, 2016.
- Q. Shi, D. Forte and M. Tehranipoor, “Analyzing Circuit Layout to Probing Attack,” in Hardware IP Security and Trust: Validation and Test, 2016.
- A. Nahiyan and M. Tehranipoor, “Code Coverage Analysis for IP Trust Verification,” in Hardware IP Security and Trust: Validation and Test, 2016.
- H. Salmani and M. Tehranipoor, “Digital Circuits Vulnerability to Hardware Trojans,” in Hardware IP Security and Trust: Validation and Test, 2016.
- A. Nahiyan, K. Xiao, D. Forte, and M. Tehranipoor, “Security Rule Check,” in Hardware IP Security and Trust: Validation and Test, 2016.
- P. Mishra, S. Bhunia, and M. Tehranipoor, “Security and Trust Vulnerabilities in Third-Party IPs,” in Hardware IP Security and Trust: Validation and Test, 2016.
- P. Mishra, S. Bhunia, and M. Tehranipoor, “The Future of Trustworthy Design,” in Hardware IP Security and Trust: Validation and Test, 2016.
- K. Xiao, D. Forte, and M. Tehranipoor, “Circuit Timing Signature (CTS) for Detection of Counterfeit Integrated Circuits,” in Secure System Design and Trustable Computing, by Chip Hong Chang and Miodrag Potkonjak, 2015.
- N. Tuzzio and M. Tehranipoor, “RSA: Implementation And Security,” in Introduction to Hardware Security and Trust, Springer, August 2011.
- M. Tehranipoor and J. Lee, “Protecting IPs Against Scan-Based Side-Channel Attacks,” in Introduction to Hardware Security and Trust, Springer, August 2011.
- J. Ma and M. Tehranipoor, “Introduction to VLSI Testing,” in Introduction to Hardware Security and Trust, Springer, August 2011.
- M. Tehranipoor, “Built-In Self-Test and Defect Tolerance for Molecular Electronics-Based NanoFabrics“, in Robust Nano-Computing by Chao Huang, Springer 2010.
- M. Tehranipoor and B. Sunar, “Hardware Trojan Horses“, in Towards Hardware Intrinsic Security: Foundation and Practice, by Ahmad R. Sadeghi, Springer, 2010.
- M. Tehranipoor and N. Ahmed, “Faster-than-at-speed Test for Screening SDDs,” in Testing for Small-Delay Defects in Nanoscale CMOS Integrated Circuits by Sandeep Goel and Krish Chakrabarty, Springer, 2010.
- K. Peng, M. Yilmaz, and M. Tehranipoor, “Circuit Path-Grading Considering Layout, Process Variations, and Crosstalk,” in Testing for Small-Delay Defects in Nanoscale CMOS Integrated Circuits by Sandeep Goel and Kr/private/var/folders/db/9m3dyzl957bb4tfnb8vftrkm0000gn/T/bc09a5d3-26b7-4999-b7a9-9c9d75a9c280/home/users/tehranipoor/htdocs/publications.htmlish Chakrabarty, Springer, 2010.
- M. Kassab amd M. Tehranipoor, “Test for Power Management Structures,” in Power Aware Testing and Test Strategies for Low Power Devices, by P. Girard, N. Nicolici, and X. Wen, Springer, 2009.
- M. Tehranipoor, “Test and Defect Tolerance for Nanoscale Crossbar-based Circuits,” in System on Chip Test Architectures: Nanometer Design for Testability, by L.T. Wang, Charles Stroud and Nur Touba, Elsevier, Target Publication Date: Oct. 2007.
- M. Tehranipoor and R. Rad, “Defect Tolerance for Reconfigurable Nanoscale Architectures,” in Emerging Nanotechnologies: Test, Defect Tolerance, and Reliability, by Mohammad Tehranipoor, Springer, 2007.
Patents
- Embedded ring oscillator network for integrated circuit security and threat detection, 2014, M. Tehranipoor, X. Wang, X. Zhang, US 8850608 B2, WO 2012122309 A3 .
- Methods and Systems for Hardware Piracy Prevention, 2014, M. Tehranipoor and N. Tuzzio, US 9071428 B2.
- Methods and systems for preventing hardware trojan insertion, 2015, M. Tehranipoor and K. Xiao, US 9218506.
- Photon-Counting Security Tagging and Verification Using Optically Encoded QR Codes, 2017, B. Javidi, A. Markman, and M. Tehranipoor, US20150295711 A1.
- UCR: An Unclonable Environmentally-Sensitive Chipless RFID Tag, January 2019, M. Tehranipoor, D. Forte, K. Yang, and H. Shen, 10181065.
- Vanishing Via for Hardware IP Protection Against Reverse Engineering RFID Tag, May 2019, S. Bhunia, M. Tehranipoor, D. Forte, N. Asadi, and H. Shen, 10283459.
- A Split Manufacturing Approach for Unclonable Chipless RFIDs for Pharmaceutical Supply Chain Security, 2020 Mark Tehranipoor, Kun Yang, Ulbert Botero, Haoting Shen, and Domenic Forte, ” UF #17157.
- Cross-registration of Unclonable RFID Tags, Feb 2021, K. Yan, U. Boreto, D. Forte, H. Shen, and M. Tehranipoor, 10929741
- Circuit Edit and Obfuscation for Trusted Chip Fabrication, June 2021, M. Tehranipoor, N. Asadi, D. Forte, and B. Shakya, 11030348
- Hardware Trojan Scanner, June 2021, M. Tehranipoor, N. Asadi, D. Woodard, H. Shen, M. T. Rahman, and N. Vashistha, 11030737
- Covert Gates to Protect Gate-Level Semiconductors, July 2021, M. Tehranipoor, D. Forte, B. Shakya, H. Shen, 11056448
- Prevention ofFront-Side Probing Attacks, July 2021, H. Wang. Q. Shi, H. Chen, D. Forte, and M. Tehranipoor, 11087058
- Protecting Obfuscated Circuits Against Attacks that Utilize Test Infrastructures, January 2022, M. Tehranipoor, A. Nahiyan, D. Forte, S. Rahman, F. Farahmandi, and F. Rahman, 11222098
- Hardware Trojan Detection Through Information Flow Security Verification, March 2022, Adib Nahyan, and Domenic Forte, Mark Tehranipoor, 11270002
- Image Processing for Printed Circuit Board Component Detection, 2022, N. Asadi, M. Azhagan, M. Sathiaseelan, and M. Tehranipoor, 11308605
- CAD Framework for Power-Side Channel Vulnerability Assessment, 2022, M. Tehranipoor, A. Nahiyan, D. Forte, and J. Park, 11475168
- Optical Scrambler with Nano-Pyramids, 2022, H. Dhen, N. Asadi, D. Forte, and M. Tehranipoor, 11508857
- Techniques for Printed Circuit Board Component Detection, 2022, N. Asadi, N. Jessurun, O. P. Paradis, and M. Tehranipoor, 11520967
- A Comprehensive Framework for Protecting Intellectual Property in the Semiconductor Industry, M. Tehranipoor, D. Forte, and U. Guin, 049648/525281
- Hardness Amplification of Physical Unclonable Functions (PUFS), Fatemeh Ganji, Shahin Tajik, Jean-Pierre Seifert, Domenic Forte, Mark M. Tehranipoor, Provisional Appl. No. 62/836,829, filed April 22, 2019, A&B Ref. 049648/529675
- Hardware Deprocessing using Voltage Imaging for Hardware Assurance, M. Tehranipoor, N. Asadi, O. P. Paradis, and N. Vashistha, 11,604,912
- Methods, Apparatus and Computer Program Products for Protecting Confidential Integrated Circuit Design, M. Tehranipoor, A. Stern, A. Nahiyan, F. Farahmandi, and F. Rahman, 2023, 11,704,415
Editorial Notes
- F. Farahmandi, A. Srivastava, D. Di Natale, and M. Tehranipoor, Introduction to the Special issue on CAD for Security: Pre-silicon Security Sign-off Solutions Through Design Cycle, ACM Journal of Emerging Technologies in Computing (JETC), 2023.
- M. Tehranipoor, Microelectronics Supply Chain Security, EDFA Magazine, 2022.
- N. Asadi and M. Tehranipoor, Physical Assurance and Inspection of Electronics, Springer Journal on Hardware and Systems Security (HaSS), 2020.
- S. Bhunia and M. Tehranipoor, “First Ever Issue of HaSS Journal,” Editorial, Journal of Hardware and Systems Security (HaSS), March 2017.
- S. Hu, Y. Jin, K. Heffner, and M. Tehranipoor, “Hardware/Software Cross-Layer Technologies for Trustworthy and Secure Computing,” Guest Editorial, IEEE TMSCS, 2016.
- I. Polian and M. Tehranipoor, “Special Issue on Hardware Security,” Guest Editorial, IET Computers and Digital Techniques, 2015.
- M. Tehranipoor and F. Koushanfar, “Hardware Security and Trust,” Guest Editorial, IEEE Computer Society Computing Now, September 2010.
- M. Tehranipoor and F. Koushanfar, “Confronting the Hardware Trustworthiness Problem,” Guest Editorial, IEEE Design and Test of Computers, Jan 2010.
- M. Tehranipoor and K. Butler, “IR-Drop and Power Supply Noise Effects on Design and Test of Very Deep Submicron Designs,” Guest Editorial, IEEE Design and Test of Computers, July 2007.
- M. Tehranipoor, “Test, Defect Tolerance and Reliability of Nanoscale Devices,” Guest Editorial, Journal of Electronic Testing: Theory and Applications (JETTA), Vol. 23, No. 2/3, pp. 115-116, June 2007.
Journal Papers
- D. Saha, S. Tarek, K. Yahyaei, S. K. Saha, J. Xhou, M. Tehranipoor, and F. Farahmandi, “LLM for SoC Security: A Paradigm Shift,” IEEE ACCESS, 2024.
- S. Tarek, D. Saha, S. Saha, M. Tehranipoor, and F. Farahmandi, “SoCureLLM: An LLM-driven Approach for Large-Scale System-on-Chip Security Verification and Policy Generation,” ePrint, https://eprint.iacr.org/2024/983.pdf.
- A. Ayalasomayajula, N. Farzana, M. Tehranipoor, and F. Farahmandi, “Automatic Asset Identification for Assertion-based SoC Security Verification,” IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems (TCAD), 2024.
- M. R. Muttaki, M. H. Rahman, A. Kulkani, M. Tehranipoor, and F. Farahmandi, “FTC: A Universal Framework for Fault-Injection Attack Detection and Prevention,” IEEE Transactions on VLSI (TVLSI), 2024.
- A. M. Shuvo, T. Zhang, F. Farahmandi, and M. Tehranipoor, “FLAT: Layout-Aware and Security Property Assisted Timing Fault-Injection Attack Assessment,” IEEE Transactions on VLSI (TVLSI), 2024.
- S. U. I. Sami, T. Zhang, A. Mazumder, S. Haque, P. Calzada, K. Z. Azar, F. Rahman, F. Farahmandi, and M. Tehranipoor, “Advancing Trustworthiness in System-in-Package: A Novel Root-of-Trust Hardware Security Module for Heterogeneous Integration,” IEEE Access, 2024.
- M. M. Hossain, K. Z. Azar, F. Rahman, F. Farahmandi, and M. Tehranipoor, “Fuzzing for Automated SoC Security Verification: Challenges and Solution,” IEEE Design & Test of Computers (D&T), 2024.
- T. Zhang, S. Shi, M. H. Rahman, N. Varshney, A. Kulkarni, F. Farahmandi, and M. Tehranipoor, “INSPECT: Investigating Supply Chain and Cyber-Physical Security of Battery Systems,” ePrint, 2024. https://eprint.iacr.org/2024/211.pdf
- K. Z. Azar, H. M. Kamali, F. Farahmandi, and M. Tehranipoor, “Improving Bounded Model Checkers Scalability for Circuit De-obfuscation: An Exploration,” IEEE Transactions on Information Forensics & Security (TIFS), 2024.
- S. Rajendran, N. Farzana, S. Tarek, H. Kamali, F. Farahmandi, and M. Tehranipoor, “Exploring the Abyss? Unveiling Systems-on-Chip Hardware Vulnerabilities beneath Softwar,” IEEE Transactions on Information Forensics & Security (TIFS), 2024.
- N. Farzana, A. Ayalasomayajula, M. Tehranipoor, and F. Farahmandi, “AGILE: Automated Assertion Generation to Detect Information Leakage,” IEEE Transactions on Information Forensics & Security (TIFS), 2024.
- T. Zhang, M. Tehranipoor, and F. Farahmandi, “TrustGuard: Standalone FPGA-based Security Monitoring Through Power Side-Channel,” IEEE Transactions on VLSI (TVLSI), 2024.
- M. H. Monir, K. Z. Azar, F. Rahman, F. Farahmandi, and M. Tehranipoor, “Fuzzing for Automated SoC Security Verification: Challenges and Solutions,” IEEE Design & Test of Computers (D&T), 2024.
- A. Mazumder, T. Zhang, F. farahmandi, M. Tehranipoor, “A Comprehensive Survey on Non-Invasive Fault Injection Attacks,” 2023, ePrint, https://eprint.iacr.org/2023/1769.pdf
- D. Saha, S. Tarek, K. Yahyaei, S. Kumar, J. Zhuo, M. Tehranipoor, and F. Farahmandi, “LLM for SoC Security: A Paradigm Shift” 2023, ePrint, https://eprint.iacr.org/2023/1561.pdf
- P. Calzada, M. S. Ul Islam, K. Z. Azar, F. Rahman, F. Farahmandi, and M. Tehranipoor, “Heterogeneous Integration Supply Chain Integrity through Blockchain and CHSM,” ACM Transactions on Design Automation of Electronic Systems (TODAES), 2023.
- M. S. Khan, C. Xi, M. S. Ul Haque, M. Tehranipoor, and N. Asadi, “Exploring Advanced Packaging Technologies for Reverse Engineering a System-in-Package (SiP),” IEEE Transactions on Components, Packaging and Manufacturing Technology (TCPMT), 2023.
- M. M. Rahman, S. Tarek, K. Z. Azar, M. Tehranipoor, and F. Farahmandi, “Efficient SoC Security Monitoring: Quality Attributes and Potential Solutions,” IEEE Design & Test of Computers (D&T), 2023.
- M. Tao, M. S. Rahman, N. Varshney, M. Tehranipoor, and D. Forte, “iProbe: Internal Shielding Approach for Protecting Against Front-side and Back-side Probing Attacks,” IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems (TCAD), 2023.
- S. S. Ul Islam, H. M. Kamali. F. Farahmandi, F. Rahman, and M. Tehranipoor, “Enabling Security of Heterogeneous Integration: From Supply Chain to In-Field Operations,” IEEE Design & Test of Computers (D&T), 2023.
- R. Kibria, F. Farahmandi, and M. Tehranipoor, “FSMx-Ultra: Finite State Machine Extraction from Gate-Level Netlist for Security Assessment,” IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems (TCAD), 2023.
- N. Jessurun, O. D. Paradis, J. Harrison, S. Shosh, M. Tehranipoor, D. Woodard, N. Asadi, “FPIC: A Novel Semantic Dataset for Optical PCB Assurance,” ACM Journal of Emerging Technologies in Computing Systems (JETC), 2023.
- S. Rahman, R. Gui, H. M. Kamali, F. Rahman, F. Farahmandi, and M. Tehranipoor, “ReTrustFSM: Towards RTL Hardware Obfuscation – A Hybrid FSM Approach,” IEEE Access, 2023.
- T. Zhang, F. Rahman, M. Tehranipoor, and F. Farahmandi, “FPGA-Chain: Enabling Holistic Protection of FPGA Supply Chain with Blockchain Technology,” IEEE Design & Test of Computers (D&T), 2023.
- N. Vashistha, M. L. Rahman, S. Haque, A. Uddin, S. Islam Sami, A. Mazumder, P/ Calzada, F. Farahmandi, N. Asadi, F. Rahman, and M. Tehranipoor, “ToSHI – Towards Secure Heterogeneous Integration: Security Risks, Threat Assessment, and Assurance,” IACR Cryptology ePrint Archive, August 2022, https://eprint.iacr.org/2022/984.pdf
- S. Dey, J. Park, N. Pundir, D. Saha, A. mazumdar, D. Mehta, N. Asadi, F. Rahman, F. Farahmandi, and M. Tehranipoor, “Secure Physical Design,” IACR Cryptology ePrint Archive, May 2022, https://eprint.iacr.org/2022/891
- D. Mehta, J. True, O. Dizon-Paradis, N. Jessurun, D. Woodard, N. Asadi, and M. Tehranipoor, “FICS PCB X-ray: A Dataset for Automated Printed Circuit Board Inter-Layers Inspection,” IACR Cryptology ePrint Archive, May 2022. https://eprint.iacr.org/2022/924
- L. Biswas, L. Lavdas, T. Rahman, M. Tehranipoor, and N. Asadi, “On Backside Probing Techniques and their Emerging Security Threats,” IEEE Design & Test of Computers (D&T), 2022.
- M. M. Hossain, N. Vashistha, J. Allen, M. Allen, F. Farahmandi, F. Rahman, and M. Tehranipoor, “Thwarting Counterfeit Electronics by Blockchain,” IEEE Blockchain, 2022.
- N. Pundir, J. Park, F. farahmandi, and M. Tehranipoor, “Power Side-Channel Leakage Assessment Framework at Register-Transfer Level,” IEEE Transactions on VLSI (TVLSI), 2022.
- J. Park, N. Anandakumar, D. Saha, D. Mehta, N. Pundir, F. Rahman, F. Farahmandi, and M. Tehranipoor, “PQC-SEP: Power Side-channel Evaluation Platform for Post-Quantum Cryptography Algorithms,” IACR Cryptology ePrint Archive, May 2022, https://eprint.iacr.org/2022/527.pdf
- K. Z. Azar, M. M. Hossain, A. Vafaei, H. Al Sheikh, N. Mondol, F. Rahman, M. Tehranipoor, and F. Farahmandi, “Fuzz, Penetration, and AI Testing for SoC Security Verification: Challenges and Solutions,” IACR Cryptology ePrint Archive, March 2022, https://eprint.iacr.org/2022/394.pdf
- Y. Bai, A, Stern, J. Park, M. Tehranipoor, and D. Forte, “RASCv2: Enabling Remote Access to Side-Channels for Mission Critical and IoT Systems,” ACM Transactions on Design Automation of Electronic Systems (TODAES), 2022.
- Y. Bai, J. Park, M. Tehranipoor, and D. Forte, “Real-time Instruction-level Verification of Remote IoT/CPS Devices via Side-Channels,” Springer Discover Internet of Things, 2022.
- H. A. Shaikh, M. B. Monjil, S. Chen, F. Farahmandi, N. Asadi, M. Tehranipoor, and F. Rahman, “Digital Twin for Secure Semiconductor Lifecycle Management: Prospects and Applications,” IACR Cryptology ePrint Archive, https://eprint.iacr.org/2022/258.pdf
- H. M. Kamali, K. Z. Azar, F. Farahmandi, and M. Tehranipoor, “Advances in Logic Locking: Past, Present, and Prospects,” IACR Cryptology ePrint Archive, https://eprint.iacr.org/2022/260.pdf
- N. N. Anandakumar, M. S. Rahman, M. M. M. Rahman, R. Kibria, U. Das, F. Farahmandi, F. Rahman, M. Tehranipoor, “Rethinking watermark: Providing Proof of IP Ownership in Modern SoCs,” IACR Cryptology ePrint Archive, https://eprint.iacr.org/2022/092.pdf
- S. Khan, C. Xi, A. Khan, T. Rahman, M. Tehranipoor, and N. Asadi, “Secure Interposer-Based Heterogenegous Integration,” IEEE Design & Test of Computers (D&T), 2022.
- N. Vashishta, M M. Hossain, R. Shahriar, F. Rahman, F. Farahmandi, and M. Tehranipoor, “eChain: A Blockchain-enabled Ecosystem for Electronic Device Authenticity Verification,” IEEE Transactions on Computer Electronics (TCE), 2022.
- J. He, X. Guo, M. Tehranipoor, A. Vassilev, and Y. Jin, “EM Side Channel in Hardware Security: Attacks and Defenses,” IEEE Design & Test of Computers (D&T), 2022.
- A. Stern, H. Wang, F. Rahim, F. Farahmandi, and M. Tehranipoor, “ACED-IT: Assuring Confidential Electronic Design against Insider Threat in a Zero Trust Environment,” IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems of Integrated Circuits and Systems (TCAD), 2022.
- R. Muttaki, R. Mohammadivojdan, H. M. Kamali, M. Tehranipoor, and F. Farahmandi, “HLock+: A Robust and Low Overhead Logic Locking at the High-Level Language,” IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems (TCAD), Oct. 2022.
- N. Pundir, S. Aftabjahani, R. Cammarota, M. Tehranipoor, and F. Farahmandi, “Analyzing Security Vulnerabilities Induced by High-level Synthesis,” ACM Journal of Emerging Technologies in Computing Systems (JETC), 2022.
- B. Ahmed, K. Bepary, N. Pundir, M. Borza, O. Raikhman, A. Garg, D. Dunchin, A. Cron, M. Abdel-Moneum, F. Farahmandi, F. Rahman, and M. Tehranipoor, “Quantifiable Assurance: From IPs to Platforms,” 2021, https://eprint.iacr.org/2021/1654.pdf
- F. Rahman, F. Farahmandi, and M. Tehranipoor, “An End-to-End Bitstream Tamper Attack Against Flip-chip Package,” IACR Cryptology ePrint Archive, 2021, https://eprint.iacr.org/2021/1542.pdf.
- B. Park, D. Forte, M. Tehranipoor, and N. Maghari, “A Metal-Via Resistance Based Physical Unclonable Function with Backend Incremental ADC,” IEEE Transactions on Circuits and Systems I (TCAS-I), 2021.
- N. Farzana, F. Farahmandi, and M. Tehranipoor, “SoC Security Properties and Rules,” IACR Cryptology ePrint Archive, 2021, https://eprint.iacr.org/2021/1014.pdf.
- N. Vashishtha, H. Lu, Q. Shi, D. Woodard, N. Asdi, and M. Tehranipoor, “Detecting Hardware Trojans using Combined Self Testing and Imaging,” IEEE Transactions on CAD (TCAD), 2021.
- N. N. Anandakumar, M. S. Hashmi and M. Tehranipoor, “A Primer on FPGA-based Physical Unclonable Functions: Comprehensive Overview of Theory and Architectures“. Integration, the VLSI Journal, Elsevier, 2021.
- N. Pundir, F. Rahman, F. Rahman, and M. Tehranipoor, “What is All the FaaS About? Remote Exploitation of FPGA-as-a-Service Platforms,” IACR Cryptology ePrint Archive, 2021, https://eprint.iacr.org/2021/746.pdf.
- F. Ganji, U. Boreto, R. Wilson, M. T. Rahman, M. Azhagan, N. Asadi, M. Tehranipoor, D. Woodard, and D. Forte, “Hardware Trust and Assurance through Reverse Engineering: A Tutorial and Outlook from Image Analysis and Machine Learning Perspective,” ACM Journal of Emerging Technologies in Computing Systems (JETC), 2021.
- J. Harrison, N. Asadi, and M. Tehranipoor, “On Malicious Implants in PCBs Throughout the Supply Chain,” VLSI Integration Journal, 2021.
- H. Wang, H. Li, F. Rahman, M. Tehranipoor, and F. Farahmandi, “SoFI: Security Property-Driven Vulnerability Assessments of ICs Against Fault-Injection Attacks,” IEEE Transactions on Computer-Aided Design (TCAD), 2021.
- M. T. Rahman, N. F. Dipu, D. Mehta, S. Tajik, M. Tehranipoor, and N. Asadi, “Concealing-Gate: Optical Contactless Probing Resilient Design,” ACM Journal of Emerging Technologies in Computing Systems (JETC), Feb. 2021.
- M. S. Rahman, A. Nahiyan, F. Rahman, S. Fazzari, K. Plaks, F. Farahmandi, D. Forte, and M. Tehranipoor, “Security Assessment of Dynamically Obfuscated Scan Chain Against Oracle-Guided Attacks,” ACM Transactions on Design Automation of Electronic Systems (TODAES), Vol. 26, Issue 4, March 2021.
- D. Mehta, H. Lu, O. Paradis, M. Azhagan, T. Rahman, Y. Iskander, Praveen Chawla, D. Woodard, M. Tehranipoor, and N. Asadi, “The Big Hack Explained: Detection and Prevention of PCB Supply Chain Implants,” ACM Journal of Emerging Technologies in Computing Systems (JETC), 2020.
- M. Alam, A. Nahiyan, M. Sadi, D. Forte, and M. Tehranipoor, “Soft-HaT: Software-based Silicon Reprogramming for Hardware Trojan Implementation,” ACM Transactions on Design Automation of Electronic Systems (TODAES), 2020.
- F. Ganji, et. al., “Rock’n’roll PUFs: Crafting Provably Secure PUFs from Less Secure Ones,” Journal of Cryptographic Engineering (JCEN), 2020.
- J. Park, S. Cho, T. Lim, and M. Tehranipoor, “QEC: A Quantum Entropy Chip and Its Applications,” IEEE Transactions on VLSI (TVLSI), 2020.
- A. Nahiyan, J. Park, M. He, Y. Iskander, F. Farahmandi, and M. Tehranipoor, “SCRIPT: A CAD Framework for Power Side-channel Vulnerability Assessment using Information Flow Tracking and Pattern Generation,” ACM Transactions on Design Automation of Electronic Systems (TODAES), 2020.
- Y. Yang, Z. Duan, and M. Tehranipoor, “Identify Spoofing Attack of In-vehicle CAN Bus Based on Deep Features of ECU Fingerprint Signal,” Smart Cities, MDPI, 2020.
- M. T. Rahman, M. S. Rahman, H. Wang, S. Tajik, W. Khalil, F. Farahmandi, D. Forte, N. Asadi, and M. Tehranipoor, “Defense-in-Depth: A Recipe for Logic Locking to Prevail,” Integration, the VLSI Journal, 2020.
- Z. Guo, M. Tehranipoor, and D. Forte, “Permutation Network De-obfuscation: A Delay-based Attack and Countermeasure Investigation,” ACM Journal on Emerging Technologies in Computing Systems (JETC), 2020.
- H. Wang, Q. Shi, D. Forte, and M. Tehranipoor, “A Physical Design Flow against Front-side Probing Attacks by Internal Shielding,” IEEE Transactions on Computer-Aided Design (TCAD), 2020.
- A. Stern, J. Ulberto, Fahim Rahman, D. Forte, and M. Tehranipoor, “EMFORCED: EM-Based Fingerprinting Framework for Remarked and Cloned Counterfeit IC Detection using Machine Learning Classification,” IEEE Transactions on VLSI (TVLSI), 2020.
- N. Pundir, M. Tehranipoor, and F. Rahman, “RanStop: A Hardware-Assisted Runtime Crypto-Ransomeware Detection Technique,” 2020, arXiv, https://arxiv.org/abs/2011.12248
- B. Shakya, X. Xu, M. Tehranipoor, and D. Forte, “Defeating CAS-Unlock,” IACR Cryptology ePrint Archive, 2020, https://eprint.iacr.org/2020/324.pdf
- H. Lu, D. Mehta, O. Paradis, N. Asadizanjani, M. Tehranipoor, and D. L. Woodard, “FICS-PCB: A Multi-Modal Image Dataset for Automated Printed Circuit Board Visual Inspection,” IACR Cryptology ePrint Archive, https://eprint.iacr.org/2020/366, March 2020.
- B. Shakya, X. Xu, M. Tehranipoor, D. Forte, “CAS-Lock: A Security-Corruptibility Trade-off Resilient Logic Locking Scheme,” Transactions on Cryptographic Hardware and Embedded Systems (TCHES), 2020.
- T. Hoque, K. Yang, R. Karam, Shahin Tajik, D. Forte, M. Tehranipoor, and S. Bhunia, “Hidden in Plaintext: An Obfuscation-based Countermeasure against FPGA Bitstream Tampering Attacks,” ACM Transactions on Design Automation of Electronic Systems (TODAES), 2019.
- F. Ganji, D. Forte, N. Asadizanjani, M. Tehranipoor, D. Woodard, “The power of IC Reverse Engineering for Hardware Trust and Assurance”, Electronic Device Failure Analysis (EDFA), May 2019.
- L. Yu, X. Wang, F. Rahman, and M. Tehranipoor, “Interconnect-based PUF with Signature Uniqueness Enhancement,” IEEE Transactions on VLSI (TVLSI), 2019.
- J. Park. F. Rahman, A. Vassilev, D. Forte, and M. Tehranipoor, “Leveraging Side Channel Information for Disassembly and Security,” ACM Journal on Emerging Technologies in Computing Systems (JETC), 2019.
- M. T. Rahman, S. Tajik, M. S. Rahman, M. Tehranipoor and N. Asadizanjani, “The Key is Left under the Mat: On the Inappropriate Security Assumption of Logic Locking Schemes,” IACR Cryptology ePrint Archive, https://eprint.iacr.org/2019/719, 2019
- M Tanjidur Rahman, M Sazadur Rahman, Huanyu Wang, Shahin Tajik, Waleed Khalil, Farimah Farahmandi, Domenic Forte, Navid Asadizanjani, Mark Tehranipoor, “Defense-in-Depth: A Recipe for Logic Locking to Prevail,” arXiv, https://arxiv.org/abs/1907.08863, 2019
- U. Guin, N. Asadi, and M. Tehranipoor, “Standards for Hardware Security,” Mobile Computing and Communications, vol. 23, issue 1, pp. 5-9, March 2019.
- Y. Han, X. Wang and M. Tehranipoor, “System-Level Counterfeit Detection Using On-Chip Ring Oscillator Array,” IEEE Transactions on VLSI (TVLSI), 2019.
- M. Alam, M. Tehranipoor, and D. Forte, “Recycled FPGA Detection Using Exhaustive LUT Path Delay Characterization and Voltage Scaling,” IEEE Transactions on VLSI (TVLSI), 2019.
- H. Shen, N. Asadi, D. Forte, M. Tehranipoor, “Nanopyramid: An Optical Scrambler Against Backside Probing Attacks,” Journal of Hardware and Systems Security (HaSS), 2019.
- B. Shakya, H. Chen, M. Tehranipoor, and D. Forte, “Covert Gates: Protecting Integrated Circuits with Undetectable Camouflaging,” IACR Trans. on Cryptographic Hardware and Embedded Systems (TCHES), 2019.
- N. Karimian, D. Woodard, M. Tehranipoor, and D. Forte, “Unlock Your Heart: Next Generation Biometric in Resource-Constrained Healthcare Systems and IoT,” IEEE Access, Vol. 7, Issue 1, pp. 49135-49149, Dec. 2019.
- H. Wang, Q. Shi, D. Forte, and M. Tehranipoor, “Probing Assessment Framework and Evaluation of Anti-probing Solutions,” IEEE Transactions on VLSI (TVLSI), 2019.
- X. Xu, F. Rahman, B. Shakya, A. Vassilev, D. Forte, and M. Tehranipoor, “Electronic Supply Chain Integrity Enabled by Blockchain,” ACM Transactions on Design Automation of Electronic Systems (TODAES), 2019.
- K. Yang, U. Botero, H. Shen, D. Woodard, D. Forte, “UCR: An Unclonable Environmentally-Sensitive Chipless RFID Tag for Protecting Supply Chain,” ACM Transactions on Design Automation of Electronic Systems (TODAES), 2018.
- Q. Shi, M. Tehranipoor, and D. Forte, “Obfuscated Built-In Self-Authentication with Secure and Efficient Wire-Lifting,” IEEE Transactions on Computer-Aided Design (TCAD), 2018.
- X. Xu, S. Keshavarz, D. Forte, M. Tehranipoor, and D. Holcomb, “Bimodal Oscillation as a Mechanism for Automotive Majority Voting in PUFs,” IEEE Transactions on VLSI (TVLSI), 2018.
- N. Karimian, Z. Guo, F. Tehranipoor, D. Woodard, M. Tehranipoor, and D. Forte, “Noise Aware Biometric Key Generation in Resource-Constrained Systems and IoT,” IEEE Transactions on Signal Processing, 2018.
- U. Botero, M. Tehranipoor, and D. Forte, “Upgrade/Downgrade: Efficient and Secure Legacy Electronic System Replacement,” IEEE Design & Test of Computers (D&T), 2018.
- D. Zhang, X. Wang, T. Rahman, and M. Tehranipoor, “An On-Chip Dynamically-Obfuscated Wrapper for Protecting Supply Chain Against IP and IC Piracy,” IEEE Transactions on VLSI (TVLSI), 2018.
- S. Amir, B. Shakya, X. Xu, Y. Jin, S. Bhunia, M. Tehranipoor, D. Forte, “Development and Evaluation of Hardware Obfuscation Benchmarks,” Journal of Hardware and Systems Security (HaSS), 2018.
- N. Vashistha, M. T. Rahman, H. Shen, D. Woodard, N. Asadi and M. Tehranipoor, “Detecting Hardware Trojans Inserted by Untrusted Foundry using Physical Inspection and Advanced Image Processing Techniques,” Journal of Hardware and Systems Security (HaSS), 2018.
- A. Nahiyan, F. Farahmandi, P. Mishra, D. Forte, and M. Tehranipoor, “Security-Aware FSM Design Flow for Identifying and Mitigating Vulnerabilities to Fault Attacks,” IEEE Transactions on Computer-Aided Design (TCAD), 2018.
- K. Yang, D. Forte, and M. Tehranipoor, “ReSC: An RFID-Enabled Solution for Defending IoT Supply Chain,” ACM Transactions on Design Automation of Electronic Systems (TODAES), 2018.
- M. Alam, S. Choudhury, B. Park, D. Munzer, N. Maghari, M. Tehranipoor, and D. Forte, “Challenges and Opportunities in Analog and Mixed Signal (AMS) Integrated Circuit (IC) Security,” Journal of Hardware and Systems Security (HaSS), 2018.
- Z. Guo, X. Xu, T. Rahman, M. Theranipoor, and D. Forte, “SCARe: An SRAM based Countermeasure Against IC Recycling Framework,” IEEE Transactions on VLSI (TVLSI), 2018.
- X. Wang, D. Zhang, M. He, and M. Tehranipoor, “Secure Scan and Test Using Obfuscation Throughout Supply Chain,” IEEE Trans. On Computer-Aided Design (TCAD), 2018.
- E. Principe, N. Asadi, D. Forte, R. Chivas, M. DiBattista, and S. Silverman, “Plasma FIB Deprocessing of Integrated Circuits from the Backside,” Electronic Device Failure Analysis (EDFA), 2018.
- K. Yang, H. Shen, D. Forte, S. Bhunia, and M. Tehranipoor, “Hardware-Enabled Pharmaceutical Supply Chain Security,” ACM Transactions on Design Automation of Electronic Systems (TODAES), 2018.
- S. Ray, S. Bhunia, and M. Tehranipoor, “System-on-Chip Platform Security Assurance: Architecture and Validation,” Proceedings of IEEE, vol. 106, Issue 1, page 21-37, 2018.
- T. Rahman, A. Hosey, J. Carrol, D. Forte, and M. Tehranipoor, “Systematic Correlation and Cell Neighborhood Analysis of SRAM-PUF for Robust and Unique Key Generation,” Journal of Hardware and Systems Security (HaSS), 2017.
- F. Rahman, B. Shakya, X. Xu, D. Forte, and M. Tehranipoor, “Security Beyond CMOS: Fundamentals, Applications, and Roadmap,” IEEE Transactions on VLSI (TVLSI), 2017.
- M. Sadi, G. Contreras, J. Chen, L. Winemberg, and M. Tehranipoor, “Design of Reliable SoCs with BIST Hardware and Machine Learning,” IEEE Transactions on VLSI (TVLSI), 2017.
- H. Shen, F. Rahman, B. Shakya, X. Xu, M. Tehranipoor, and D. Forte, “Poly-Si Based Physical Unclonable Functions,” IEEE Transactions on VLSI (TVLSI), 2017.
- H. Wang, Q. Shi, D. Forte, M. Tehranipoor, “Probing Attacks on Integrated Circuits: Challenges and Research Opportunities,” IEEE Design & Test of Computers, 2017.
- M. Alam, M. Tehranipoor, and U. Guin, “TSensors Vision, Infrastructure, and Security Challenges in Trillion Sensor Era,” Journal of Hardware and Systems Security (HaSS), 2017.
- M. He and M. Tehranipoor, “An Access Mechanism for Embedded Sensors in Modern SoCs,” Journal of Electronics Testing: Theory and Applications (JETTA), 2017.
- T. He, G. Contreras, D. Tran, L. Winemberg, and M. Tehranipoor, “Test-Point Insertion Efficiency Analysis for LBIST in High-Assurance Applications,” IEEE Transactions on VLSI (TVLSI), 2017.
- M. Tehranipoor, U. Guin, and S. Bhunia, “Invasion of the Hardware Snatchers: Fake Hardware Could Open the Door to Malicious Malware and Critical Failure,” IEEE Spectrum, 2017.
- B. Shakya, H. Salmani, D. Forte, S. Bhunia, and M. Tehranipoor, “Benchmarking of Hardware Trojans and Maliciously Affected Circuits,” Journal of Hardware and Systems Security (HaSS), 2017.
- M. Alam, N. Asadi, M. Tehranipoor, and D. Forte, “Impact of X-ray Tomography on the Reliability of Integrated Circuits,” IEEE Transaction on Device and Materials Reliability, 2017.
- Z. Guo, J. Di, M. Tehranipoor, and D. Forte, “Obfuscation based Protection Framework Against Printed Circuit Boards Piracy Violations,” ACM Transactions on Design Automation of Electronic Systems (TODAES), 2017.
- N. Asadi, M. Tehranipoor, and D. Forte, “PCB Reverse Engineering Using Non-destructive X-ray Tomography and Advanced Image Processing,” IEEE Transactions on Components, Packaging and Manufacturing Technology (TCPMT), 2017.
- U. Guin, S. Bhunia, D. Forte, and M. Tehranipoor, “SMA: A System-Level Mutual Authentication for Protecting Electronic Hardware and Firmware,” IEEE Transactions on Dependable and Secure Computing (TDSC), 2016.
- K. Yang, D. Forte, and M. Tehranipoor, “CDTA: A Comprehensive Solution for Counterfeit Detection, Traceability and Authentication in IoT Supply Chain,” ACM Transactions on Design Automation of Electronic Systems (TODAES), 2016.
- N. Karimian, Z. Guo, M. Tehranipoor, and D. Forte, “Highly Reliable Key Generation from Electrocardiogram (ECG),” IEEE Transactions on Biomedical Engineering (TBME), 2016.
- X. Wang, P. Jiao, M. Sadi, L. Winemberg, and M. Tehranipoor, “TRO: An On-chip Ring Oscillator Based GHz Transient IR-Drop Monitor,” IEEE Trans. On Computer-Aided Design (TCAD), 2016.
- M. Sadi, L. Winemberg, S. Kannan, and M. Tehranipoor, “SoC Speed Binning Using Machine Learning and On-chip Slack Sensors,” IEEE Trans. On Computer-Aided Design (TCAD), 2016.
- K. Xiao, A. Nahiyan, and M. Tehranipoor, “ Security Rule Checking in IC Design,” IEEE Computer Magazine, 2016.
- J. Wurm, Y. Jin, Y. Liu, S. Hu, K. Heffner, F. Rahman, and M. Tehranipoor, “Introduction to Cyber Physical System Security: A Cross-Layer Perspective,” IEEE Trans. On Multi-Scale Computing Systems (TMSCS), 2016.
- Y. Xie, C. Bao, C. Serafy, T. Lu, A. Srivastava, and M. Tehranipoor, “Security and Vulnerability Implications of 3D ICs,” IEEE Trans. On Multi-Scale Computing Systems (TMSCS), 2016.
- K. Xiao, D. Forte, Y. Jin, R. Karri, S. Bhunia, and M. Tehranipoor, “Hardware Trojans: Lessons Learned After One Decade of Research,” ACM Transactions on Design Automation of Electronic Systems (TODAES), 2016. (made the 2016 most notable computing articles list, Computingreviews.com). The paper also received the Best Paper Award from TODAES.
- U. Guin, Q. Shi, D. Forte, and M. Tehranipoor, “FORTIS: A Comprehensive Solution for Establishing Forward Trust for Protecting IPs and ICs,” ACM Transactions on Design Automation of Electronic Systems (TODAES), 2016.
- Q. Shi, X. Wang, L. Winemberg, and M. Tehranipoor, “On-Chip Sensor Selection for Effective Speed-Binning,” Int. Journal on Analog Integrated Circuits and Signal Processing, 2016.
- H. Salmani and M. Tehranipoor, “Vulnerability Analysis of a Circuit Layout to Hardware Trojan Insertion,” IEEE Transactions on Information Forensics & Security (TIFS), 2016.
- M. Sadi and M. Tehranipoor, “Design of a Network of Digital Sensor macros for Extracting Power Supply Noise Profile in SoCs,” IEEE Transactions on VLSI (TVLSI), 2016.
- X. Wang, D. Zhang, D. Su, L. Winemberg, and M. Tehranipoor, “A Novel Peak Power Supply Noise Measurement and Adaptation System for Integrated Circuits,” IEEE Transactions on VLSI (TVLSI), 2016.
- T. Rahman, F. Rahman, D. Forte, and M. Tehranipoor, “An Aging-Resistant RO-PUF for Reliable Key Generation,” IIEEE Transactions on Emerging Topics in Computing (TETC), 2015.
- U. Guin, D. Forte, and M. Tehranipoor, “Design of Accurate Low-Cost On-Chip Structures for Protecting Integrated Circuits Against Recycling,” IEEE Transactions on VLSI (TVLSI), 2015.
- S. Quadir, J. Chen, D. Forte, N. Asadi, S. Shahbaz, L. Wang, J. Chandy, and M. Tehranipoor, “A Survey on Chip to System Reverse Engineering,” ACM Journal on Emerging Technologies in Computing Systems (JETC), 2015.
- S. Kelly, X. Zhang, M. Tehranipoor, and A. Ferraiuolo, “Detecting Hardware Trojans using On-chip Sensors in an ASIC Design,” Journal of Electronic Testing: Theory and Applications (JETTA), 2015.
- X. Wang, D. Tran, S. George, L. Winemberg, N. Ahmed, S. Palosh, L. Dobia, M. Tehranipoor, “Aging Adaption in Integrated Circuits Using a Novel Built-In Sensor,” IEEE Transactions on CAD (TCAD), 2015.
- K. Xiao, D. Forte, and M. Tehranipoor, “A Novel Built-In Self-Authentication Technique to Prevent Inserting Hardware Trojans,” IEEE Transactions on CAD (TCAD), 2014.
- A. Tomita, X. Wen, Y. Sato, S. Kajihara, K. Miyase, S. Holst, P. Girard, M. Tehranipoor, L.T. Wang, “On Achieving Capture Power Safety in At-Speed Scan-Based Logic BIST,” IEICE Transactions, 2014.
- U. Guin, K. Huang, D. DiMase, J. Carulli, M. Tehranipoor, Y. Makris, “Counterfeit Integrated Circuits: A Rising Threat in the Global Semiconductor Supply Chain,” Proceedings of IEEE, 2014.
- Z. Collier, D. DiMase, S. Walters, M. Tehranipoor, J. Lambert, and I. Linkov, “Risk-Based Cybersecurity Standards: Policy Challenges and Opportunities,” IEEE Computer Magazine, 2014.
- U. Guin, D. DiMase, and M. Tehranipoor, “A Counterfeit Integrated Circuits: Detection, Avoidance, and the Challenges Ahead,” Journal of Electronic Testing: Theory and Applications (JETTA), 2014.(Most Downloaded Article in 2014)
- U. Guin, D. DiMase, and M. Tehranipoor, “A Comprehensive Framework for Counterfeit Defect Coverage Analysis and Detection Assessment,” Journal of Electronic Testing: Theory and Applications (JETTA), 2014.
- A. Markman, B. Javidi, and M. Tehranipoor, “Photon-Counting Security Tagging and Verification Using Optically Encoded QR Codes,” IEEE Photonics Journal, 2013.
- X. Zhang and M. Tehranipoor, “Design of On-chip Light-weight Sensors for Effective Detection of Recycled ICs,,” IEEE Transactions on VLSI (TVLSI), 2013.
- F. Bao, K. Peng, M. Tehranipoor, and K. Chakrabarty, “Generation of Effective 1-Detect TDF Patterns for Detecting Small-Delay Defects,,” IEEE Trans. on CAD (TCAD), 2013.
- S. Wang and M. Tehranipoor, “A Light-Weight On-Chip Structure for Measuring Timing Uncertainty Induced by Noise in Integrated Circuits,” IEEE Transactions on VLSI (TVLSI), 2013.
- W. Zhao, J. Ma, M. Tehranipoor, and S. Chakravarty, “Power-Safe Application of TDF Patterns to Flip-Chip Designs during Wafer Test,” ACM Transactions on Design Automation of Electronic Systems (TODAES), 2013.
- M. Li, A. Davoodi, and M. Tehranipoor, “A Sensor-Assisted Self-Authentication Framework for Hardware Trojan Detection,” IEEE Design & Test, 2013.
- K. Xiao, X. Zhang, and M. Tehranipoor, “A Clock Sweeping Technique for Detecting Hardware Trojans Impacting Circuits Delay,” IEEE Design & Test, 2013.
- F. Bao, K. Peng, M. Yilmaz, K. Chakrabarty, L. Winemberg, and M. Tehranipoor, “Efficient Pattern Generation for Small-Delay Defects Using Selection of Critical Faults,” Journal of Electronic Testing: Theory and Applications (JETTA), 2013.
- J. Chen, S. Wang, and M. Tehranipoor, “Critical-Reliability Path Identification and Delay Analysis,” ACM Journal on Emerging Technologies in Computing Systems (JETC), 2013.
- X. Zhang, A. Ferraiuolo, and M. Tehranipoor, “Detection of Hardware Trojans using a Combined Ring Oscillator Network and Off-chip Transient-Power Analysis,” ACM Journal on Emerging Technologies in Computing Systems (JETC), 2013
- J. Villasenor and M. Tehranipoor, “ The Hidden Dangers of Chop-Shop Electronics,” IEEE Spectrum, October 2013.
- K. Peng, M. Yilmaz, K. Chakrabarty, and M. Tehranipoor, “Crosstalk- and Process Variations-Aware High-Quality Tests for Small-Delay Defects,”IEEE Transactions on VLSI (TVLSI), 2012.
- M. Abramovici, et. al., “Protecting Against Hardware Trojan Attacks: Towards a Comprehensive Solution,” IEEE Design & Test of Computers, 2012.
- W. Zhao, M. Tehranipoor, and S. Chakravarty, “Ensuring Power-Safe Application of Test Patterns Using An Effective Gating Approach Considering Current Limits,” Journal of Low Power Electronics (JOLPE), 2012.
- X. Wang, M. Tehranipoor, S. George, D. Tran and L. Winemberg, “Design and Analysis of a Delay Sensor Applicable to Process/Environmental Variations and Aging Measurement“, IEEE Transactions on VLSI (TVLSI), 2012.
- H. Salmani, W. Zhao, M. Tehranipoor, S. Chakravarty, P. Girard, and X. Wen, “Layout-Aware Pattern Evaluation and Analysis for Power-Safe Application of TDF Patterns,” Journal of Low Power Electronics (JOLPE), 2012.
- H. Salmani, M. Tehranipoor, and J. Plusquellic, “A Novel Technique for Improving Hardware Trojan Detection and Reducing Trojan Activation Time,” IEEE Transactions on VLSI (TVLSI), 2012.
- H. Salmani and M. Tehranipoor, “A Layout-Aware Approach for Improving Localized Switching to Detect Hardware Trojans in Digital Integrated Circuits,” Transactions on Information Forensics & Security (TIFS), 2012.
- J. Ma, M. Tehranipoor, and P. Girard, “A Layout-Aware Pattern Grading Procedure for Critical Paths Testing Considering Crosstalk and Power Supply Noise,” Journal of Electronics Testing: Theory and Applications (JETTA), 2012.
- J. Ma and M. Tehranipoor, “Layout-Aware Critical Path Delay Test under Maximum Power Supply Noise Effects,” IEEE Transactions on CAD (TCAD), 2011.
- C. Lamech, R. Rad, J. Plusquellic, and M. Tehranipoor, “An Experimental Analysis of Power and Delay Signal-to-Noise Requirements for Detecting Trojans and Methods for Achieving the Required Detection Sensitivities,” IEEE Transactions on Information Forensics & Security (TIFS), 2011.
- M. Tehranipoor, H. Salmani, X. Zhang, X. Wang, R. Karri, J. Rajendran, and K. Rosenfeld, “Trustworthy Hardware: Trojan Detection Solutions and Design-for-Trust Challenges,” IEEE Computer Magazine, 2011.
- M. Yilmaz, K. Chakrabarty, and M. Tehranipoor, “Adaptation and Evaluation of the Output-Deviations Metric to Target Small-Delay Defects in Industrial Circuits,” IEEE Design and Test of Computers, 2010.
- R. Karri, J. Rajendran, K. Rosenfeld, and M. Tehranipoor, “Trustworthy Hardware: Identifying and Classifying Hardware Trojans,” IEEE Computer Magazine, 2010.
- M. Tehranipoor and K. Butler, “Power Supply Noise: A Survey on Effects and Research,” in IEEE Design and Test of Computers, 2010.
- F. Wu, L. Dilillo, A. Bosio, P. Girard, S. Pravossoudovitch, A. Virazel, M. Tehranipoor, X. Wen, and N. Ahmed, “A Comprehensive Analysis of Transition Fault Coverage and Test Power Dissipation for LOS and LOC Schemes,” Journal of Low Power Electronics (JOLPE), 2010.
- M. Yilmaz, K. Chakrabarty, and M. Tehranipoor, “Test-Pattern Selection Small-Delay Defects in Very-Deep Submicron Integrated Circuits,” IEEE Transactions on CAD, 2010.
- N. Ahmed and M. Tehranipoor, “A Novel IR-drop Tolerant Transition Delay Fault Test Pattern Generation Procedure,” Journal of Low Power Electronics (JOLPE), 2010.
- M. Tehranipoor and F. Koushanfar, “A Survey of Hardware Trojan Taxonomy and Detection,” IEEE Design and Test of Computers, 2010.
- N. Ahmed and M. Tehranipoor, “A Novel Faster-than-at-speed Transition Delay Test Method Considering IR-drop Effects,” IEEE Trasactions on CAD, 2010.
- R. Rad, J. Plusquellic, and M. Tehranipoor, “A Sensitivity Analysis of Power Signal Methods for Detecting Hardware Trojans under Real Process and Environmental Conditions,” IEEE. Transactions on VLSI (TVLSI), 2009
- K. Miyase, X. Wen, H. Furukawa, Y. Yamato, S. Kajihara, P. Girard, L.-T. Wang, and M. Tehranipoor, “High Launch Switching Activity Reduction in At- Speed Scan Testing using CTX: A Clock-Gating-Based Test Relaxation and X-Filling Scheme,” IEICE Trans. Fundamentals/Commun./Electron/Inf. & Syst., vol. E85-A/B/C/D, 2009.
- J. Lee and M. Tehranipoor, “Layout-Aware Transition-Delay Fault Pattern Generation with Evenly Distributed Switching Activity,” Journal of Low Power Electronics (JOLPE), Vol. 4, No. 3, 2008.
- M. Tehranipoor and R. Rad, “Defect Tolerance for Nanoscale Crossbar-based Devices,” in IEEE Design & Test of Computers, 2008.
- R. Rad and M. Tehranipoor, “SCT: A Novel Approach For Testing and Configuring Nanoscale Devices,” in ACM Journal on Emerging Technologies in Computing Systems (JETC), 2008.
- M. Nourani, M. Tehranipoor and N. Ahmed, “Low-Transition Test Pattern Generation for BIST-Based Applications,” IEEE Transactions on Computers, vol. 57, no. 3, pp. 303-315, March 2008.
- J. Lee, M. Tehranipoor, C. Patel and J. Plusquellic, “Securing Designs Against Scan-Based Side-Channel Attacks,” IEEE Transactions on Dependable and Secure Computing (TDSC), vol. 4, no. 4, Oct.-Dec. 2007. .
- R. Rad and M. Tehranipoor, “Evaluating Area and Performance of a Hybrid FPGA with Nanoscale Clusters and CMOS Routing,” ACM Journal on Emerging Technologies in Computing Systems (JETC), vol. 3, no. 3, Nov. 2007.
- M. ElShoukry and M. Tehranipoor and C.P. Ravikumar, “A Critical-Path Aware Partial Gating Approach for Test Power Reduction,” ACM Transactions on Design Automation of Electronic Systems (TODAES), Volume 12 , Issue 2, April 2007.
- N. Ahmed, M. Tehranipoor, C.P. Ravikumar and K. Butler, “Local At-Speed Scan Enable Generation for Transition Fault Testing Using Low-Cost Testers,” IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems (CAD/ICAS), vol. 26, no. 5, pp. 896-906, May 2007.
- M. Tehranipoor and R. M.P. Rad, “Built-In Self-Test and Recovery Procedures for Molecular Electronics-Based NanoFabrics,” IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems (CAD/ICAS), vol. 26, no. 5, 943-958, May 2007.
- N. Ahmed and M. Tehranipoor, “Improving Quality of Transition Delay Test Using Hybrid Scan-Based Technique,” IEEE Design and Test of Computers, 2006.
- D. Acharyya, A. Singh, M. Tehranipoor, C. Patel and J. Plusquellic, “Quiescent Signal Analysis: a Multiple Supply Pad IDDQ Method,” IEEE Design and Test of Computers, vol. 23, no. 4, pp. 278-293, 2006.
- M. Tehranipoor, M. Nourani and K. Chakrabarty, “Nine-Coded Compression Technique for Testing Embedded Cores in SoCs,” IEEE Transactions on Very Large Scale Integration Systems (TVLSI), vol. 13, no. 6, pp. 719-731, June 2005.
- M. Nourani and M. H. Tehranipour, “RL-Huffman Encoding for Test Compression and Power Reduction in Scan Application,” ACM Transactions on Design Automation of Electronic Systems (TODAES), vol. 10, no. 1, pp. 91-115, Jan. 2005.
- M. H. Tehranipour, N. Ahmed and M. Nourani, “Testing SoC Interconnects for Signal Integrity Using Extended JTAG Architecture,” IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems (CAD/ICAS), vol. 23, issue 5, pp. 800-811, May 2004.
- M. H. Tehranipour, S. M. Fakhraie, Z. Navabi and M. R. Movahedin, “A Low-Cost At-Speed BIST Architecture for Embedded Processor and SRAM Cores,” Journal of Electronic Testing: Theory and Applications (JETTA), vol. 20, pp. 155-168, April 2004.
- M. H. Tehranipour, S. M. Fakhraie, M. Nourani, M. R. Movahedin and Z. Navabi, “Embedded Test for Processor and Memory Cores in System-on-Chips,” International Journal of Science and Technology, vol. 10, no. 4, pp. 486-494, Oct. 2003.
Conference Papers
- M. S. Haque, A. Uddin, J. Zhou, H. M. Kamali, F. Farahmandi, and M. Tehranipoor, “NoXLock: SiP Activation and Licensing through Obfuscated On-Chip Network and Fuzzy Traffic,” the Asia and South Pacific Design Automation Conference (ASP-DAC), 2025.
- A. Uddin, S. K. Saha, F. Farahmandi, and M. Tehranipoor, “Case Study: Fault-Injection Vulnerability Assessment at RTL Level,” IEEE Physical Assurance and Inspection of Electronics (PAINE), 2024.
- M. Monjil, J. Zhou, N. Varshney, N. Asadi, F. Farahmandi, and M. Tehranipoor, “ChiPICA: Chiplet Physical Inspection Certification Authority for Trust Verification in Heterogeneous Integration,” IEEE Physical Assurance and Inspection of Electronics (PAINE), 2024.
- S. Islam, S. Khan, F. Farahmandi, M. Tehranipoor, and N. Asadi, “CAKE-SiP: Chiplet Authenticate & Key Exchange for Secure Provisioning in System-in-Package,” IEEE Physical Assurance and Inspection of Electronics (PAINE), 2024.
- G. Haidar, S. Islam, J. Zhou, K. Z. Azar, M. Tehranipoor, and F. Farahmandi, “SECT-HI: Enabling Secure Testing for Heterogeneous Integration to Prevent SiP Counterfeits,” International Test Confeence (ITC), 2024.
- B. Ahmed, J. Zhou, S. Saha, S. Aftabjahani, M. Tehranipoor, and F. Farahmandi, “Continuity in Security: Leveraging LLM for Translating Security Properties Across Hardware Designs,” Int. Conference on Very Large-Scale Integration (VLSI-SoC), 2024. Best Paper Candidate.
- P. Sarker, U. Das, N. Vershney, M. Monjil, J. Zhou, M. Tehranipoor, F. Farahmandi, “OPTI-WM: Optical Probing for Enhanced IP Watermark Identification in SoC Using Covert FSM to Combat IP Piracy,” International Symposium for Testing and Failure Analysis (ISTFA), 2024.
- A. M. Shuvo, S. Sami, L. Rahman, J. Zhou, K. Z. Azar, F. Farahmandi, M. Tehranipoor, “SYSFID: System-Aware Fault-Injection Attack Detection for System-in-Package Architectures,” International Symposium for Testing and Failure Analysis (ISTFA), 2024.
- P. Calzada, S. Ul Islam Sami, J. Zhou, K. Zamiri Azar, F. Farahmandi, M. Tehranipoor, “HI-SST: Safeguarding SiP Authenticity through Secure Split-Test in Heterogeneous Integration,” IEEE Computer Society Annual Symosium on VLSI (ISVLSI), 2024.
- J. Harrison, N. Jessurun, R. R. Dos Santos, S. Ghosh, N. Asadi, and M. Tehranipoor, “Analysis of Etcher Configuration on Part Marking Characteristics for Counterfeit Identification,” International Symposium on the Physical and Failure Analysis of Integrated Circuits (IPFA), 2024.
- B. Ahmed, S. Rahman, K. Z. Azar, F. Farahmandi, F. Rahman and M. Tehranipoor, “SeeMLess: Security Evaluation of Logic Locking using Machine Learning oriented Estimation,” GLSVLSI, 2024.
- S. U. I Sami, S. Saha, J. Zhuo, F. Rahman, F. Farahmandi, and M. Tehranipoor, “SAP: Silicon Authentication Platform for System-on-Chip Supply Chain Vulnerabilities” IEEE Int. Symposiu, on Performance Analysis of Systems and Software (ISPASS), 2024.
- D. Saha, K. Yahyaei, S. Saha, M. Tehranipoor, and F. Farahmandi, “Empowering Hardware Security with LLM: The Development of a Vulnerable Hardware Database,” IEEE Int. Symposium on Hardware-Oriented Security and Trust (HOST), 2024.
- G. I. Haidar, K. Z. Azar, H. M. Kamali, M. Tehranipoor, and F. Farahmandi, “GATE-SiP: Enabling Authenticated Encryption Testing in Systems-in-Package,” Design Automation Conference (DAC), 2024.
- H. Li, L. Lin, N. Chang, S. Chowdhury, M. Tehranipoor, K. Monta, and M. Nagata, “ML-Based Optimal Virtual Placement Exploration for EM Side-Channel Mitigation” DesignCon, 2024 (Best Paper Candidate).
- M. Sami, K. Azar, H. Kamali, F. Farahmandi, and M. Tehranipoor, “PQC-HIL PQC-enabled Chiplet authentication and Key Exchange in Heterogeneous Integration,” Electronics Components and Technology (ECTC), 2024.
- N. Mondol, A. Vafaei, K. Z. Azar, F. Farahmandi, and M. Tehranipoor, “RL-TPG: Automated Pre-silicon Security Verification through Reinforcement Learning-based Test Pattern Generation,” Design Automation and Test in Europe (DATE), 2024.
- H. Li, L. Lin, N. Chang, S. Chowdhury, D. McGuire, B. Novakovic, N. Agata, Y. Li, Pramod MS, C. Xi, Q. Jin, N. Asadi, and M. Tehranipoor, “Photon Emission Modeling and Machine-Learning Assisted Pre-Silicon Optical Side-channel Simulation,” IEEE Int. Hardware-Oriented Security and Trust (HOST), 2024.
- S. R. Rajendran, F. Farahmandi, and M. Tehranipoor, “CAD Tools Pathways in Hardware Security,” International Conference on VLSI Design (VLSID), 2024.
- N. F. Dipu, M. M. Hossain, K. Z. Azar, F. Farahmandi, and M. Tehranipoor, “FormalFuzzer: Formal Verification Assisted Fuzz Testing for SoC Vulnerability Detection,” Asian and South Pacific Conference on Design Automation Conference (ASP-DAC), 2024.
- M. R. Muttaki, H. M. Kamali, M. Tehranipoor and F. Farahmandi, “PALLET: Protecting Analog Devices using a Last-Level Edit Technique,” IEEE Conference on Physical Assurance and inspection of Electronics (PAINE), 2023.
- M. S. Ul Haque, R. Guo, M. Sazadur Rahman, H. M. Kamali, F. Farahmandi and M. Tehranipoor, “SHI-Lock: Enabling Co-Obfuscation for Secure Heterogeneous Integration against RE and Cloning,” IEEE Conference on Physical Assurance and inspection of Electronics (PAINE), 2023.
- M. Hossain, N. D. Farzana, K. Z. Azar, F. Rahman, and M. Tehranipoor, “TaintFuzzer: SoC Security Verification using Taint Inference-enabled Fuzzing,” Int. Conference on Computer-Aided Design (ICCAD), 2023.
- R. Kibria, F. Farahmandi and M. Tehranipoor, “ARC-FSM-G: Automatic Security Rule Checking for Finite State Machine at the Netlist Abstraction,” International Test Conference (ITC), 2023 (Honorable Mention).
- P. P. Sarker, U. Das, M. Monjil, H. M. Kamali, F. Farahmandi, and Mark Tehranipoor, “GEM-Water: Generation of EM-based Watermark for SoC IP Validation with Hidden FSMs,” International Symposium for Testing and Failure Analysis (ISTFA), 2023.
- S. Rahman, N. Varshney, F. Farahmandi, N. Asadi, and M. Tehranipoor, “LLE: Mitigating IC Piracy and Reverse Engineering by Last Level Edit,” International Symposium for Testing and Failure Analysis (ISTFA), 2023.
- H. Al-Shaikh, M. B. Monjil, K. Z. Azar, F. Farahmandi, M. Tehranipoor, and F. Rahman, “QuardTropy: Detecting and Quantifying Unathorized Information Leakage in Hardware Designs using g-entropy,” IEEE Defect and Fault Tolerant Systems (DFTS), 2023.
- M. Monir, K. Z. Azar, F. Farahmandi, and M. Tehranipoor, “EmuFuzzer: Emulation-based Cost Function Guided Fuzzing for SoC Vulnerability Detection,” SRC TECHCON, 2023.
- S. Tarek, S. Rajendran, M. Tehranipoor, and F. Farahmandi, “Benchmarking of SoC-level Hardware Vulnerabilities: A Complete Walkthrough,” ISVLSI, 2023.
- D. Volya, T. Zhang, N. Alam, M. Tehranipoor, and O. Mishra, “Towards Secure Classical-Quantum Systems,” IEEE Internaional Symposium on Hard-Oriented Security and Trust (HOST), 2023.
- Y. Bai, J. Park, M. Tehranipoor, and D. Forte, “Dual Channel EM/Power Attack Using Mutual Information and its Real-time Implementation,” IEEE Internaional Symposium on Hard-Oriented Security and Trust (HOST), 2023.
- T. Rahman, K. Bepary, S. Haque, M. Tehranipoor, and F. Rahman, “Design and Security Mitigation of Configurable and Generative Hardware Cryprosystems,” IEEE Dallas Circuits and Systems (DCAS) Conference, 2023.
- Z. Ibnat, S. Rahman, M. Tehranipoor, and F. Farahmandi, “ActiWate: Adaptive Design-agnostic Active Watermark for IP Ownership in Modern SoCs,” Design Automation Conference (DAC), 2023.
- U. Das, M S. Rahman, N. N. Anandakumar, K. Zamiri Azar, F. Rahman, M. Tehranipoor, and Farimah Farahmandi, “PSC-Watermark: Power Side Channel Based IP Watermarking Using Clock Gates,” IEEE European Test Symposium (ETS), 2023.
- T. Zhang, M. Tehranipoor, and F. Farahmandi, “BitFREE: On Significant Speedup and Security Applications of FPGA Bitstream Format Reverse Engineering,” IEEE European Test Symposium (ETS), 2023.
- B. Ahmed, M. Tehranipoor, and F. Farahmandi, “SoC Security Verification: Challenges and Solutions,” IEEE VLSI Test Symposium (VTS), 2023.
- M. M. Rahman, S. M. Rahman, R. Kibria, M. Borza, B. Reddy, A. Cron, F. Rahman, M. Tehranipoor, and F. Farahmandi, “CAPEC: A Cellular Automata Cuided FSM-based IP Authentication Scheme,” IEEE VLSI Test Symposium (VTS), 2023.
- T. Zhang, L. Rahman, H. M. Kamali, K. Z. Azar, M. Tehranipoor, and F. Farahmandi, “Fault Injection Detection in Secure Heterogeneous Integration via Power Noise Variations,” Electronic Components and Technology Conference (ECTC), 2023.
- M. R. Muttaki, S. Saha, H. M. Kamali, F. Rahman, M. Tehranipoor and F. Farahmandi, “RTLock: IP Protection using Scan-Aware Logic Locking at RTL,” Design, Automation and Test in Europe (DATE), 2023. Nominated for Best Paper Award.
- S. R. Rajendran, S. Tarek, B. M. Hicks, H. M. Kamali, F. Farahmandi and M. Tehranipoor, “HUnTer: Hardware Underneath Trigger for Exploiting SoC-level Vulnerabilities,” Design, Automation and Test in Europe (DATE), 2023.
- R. Guo, M. S. Rahman, H. M. Kamali, F. Rahman, F. Farahmandi and M. Tehranipoor, “EvoLUTe: Evaluation of Look-Up-Table-based Fine-Grained IP Redaction,” Design, Automation and Test in Europe (DATE), 2023.
- H. M. Kamali, K. Z. Azar, F. Farahmandi and M. Tehranipoor, “SheLL: Shrinking eFPGA Fabrics for Logic Locking,” Design, Automation and Test in Europe (DATE), 2023. Nominated for Best Paper Award.
- M. M. Hossain, A. Vafaei, K. Z. Azar, F. Rahman, F. Farahmandi and M. Tehranipoor, “SoCFuzzer: SoC Vulnerability Detection using Cost Function enabled Fuzz Testing,” Design, Automation and Test in Europe (DATE), 2023. Nominated for Best Paper Award.
- M. S. Haque, F. Rahman, F. Farahmandi, and M. Tehranipoor, “Countering Reverse Engineering and Cloning in Heterogeneously Integrated Systems,” GomacTech, 2023.
- J. Harrison, Nathan Jessurun, N. Asadi, and M. Tehranipoor, “Exploration of Automated Laser Marking Analysis for Counterfeit IC Identification,” GomacTech, 2023.
- M. K. Bepray, F. Rahman, F. Farahmandi, and M. Tehranipoor, “Security Assessment and Modeling of EM Side-Channel Leakage at Gate-Level,” GomacTech, 2023.
- E. Tawfik, et. al. “Holistic Secure SoC Design for Resource Constrained Applications,” GomacTech, 2023.
- M. Monjil, F. Rahman, F. Farahmandi, and M. Tehranipoor, “Robust Verification for Physical Inspection Based Chiplet Authentication,” GomacTech, 2023.
- S. R. Rajendran, M. Tehranipoor, and F. Farahmandi, “An ISA-based Software Snippet Generation for Exploiting Hardware Vulnerabilities,” GomacTech, 2023.
- S. Shi, N. Pundir, H. Mardani Kamali, M. Tehranipoor, F. Farahmandi, “SecHLS: Enabling Security Awareness in High-Level Synthesis,” Asian and South Pacific Conference on Design Automation Conference (ASP-DAC), 2023.
- H. Al-Shaikh, A. Vafaei, M. Md Mashahedur Rahman, K. Zamiri Azar, F. Rahman, F. Farahmandi, M. Tehranipoor, “SHarPen: SoC Security Verification by Hardware Penetration Test,” Asian and South Pacific Conference on Design Automation Conference (ASP-DAC), 2023.
- R. Muttaki, M. Tehranipoor, and F. Farahmandi, “FTC: A Universal Low-Overhead Fault-Injection Attack Detection Solution,” International Symposium for Testing and Failure Analysis (ISTFA), 2022.
- N. Pundir, H. Li, L. Lin, N. Chang, “SPILI: Security Properties and Machine Learning Assisted Pre-silicon Laser Fault Injection Assessment,” International Symposium for Testing and Failure Analysis (ISTFA), 2022.
- R. Kibria, S. Rahman, F. Farahmandi, and M. Tehranipoor, “RTL-FSMx: Fast and Accurate Finite State Machine Extraction ar the RTL for Security Application,” International Test Conference (ITC), 2022.
- U. Das, R. Muttaki, m. Tehranipoor, and F. Farahmandi, “ADWIL: A Zero-Overhead Analog Device Watermarking Using Inherent IP Features,” International Test Conference (ITC), 2022.
- A. Mazumder Shuvo, N. Pundir, J. Park, F. Farahmandi, and M. Tehranipoor, “LDTFI: Layout-Aware Timing Fault-Injection Attack Assessment Against Differential Fault Analysis,” IEEE Computer Society Annual Symposium on VLSI (ISVLSI), 2022.
- N. Jessurun, J. Harrison, M. Tehranipoor, and N. Asadi, “PinPoint: An SMD Pin Localization Method” IEEE International Symposium pn Physical and Failure Analysis (IPFA), 2022.
- K. Zamiri Azar, H. Kamali, F. Farahmandi, and M. Tehranipoor, “Warm Up before Circuit De-obfuscatio? An Exploration of Possibilities,” IEEE International Symposium on Hardware-Oritented Security and Trust (HOST), 2022.
- R. Muttaki, M. Tehranipoor, and F. Farahmandi, “FTC: A Universal Fault Injection Attack Detection Sensor,” IEEE International Symposium on Hardware-Oritented Security and Trust (HOST), 2022
- N. Pundir, L. Lin, N. Chang, F. Farahmandi, and M. Tehranipoor, “Security Property Driven Pre-Silicon Laser Fault Injection Assessment,” IEEE International Symposium on Hardware-Oritented Security and Trust (HOST), 2022.
- S. Rahman, R. Guo, H. M. Kamali, F. Rahman, F. Farahmandi, M. Abdel-Moneum, and M. Tehranipoor, “O’Clock: Lock the Clock via Clock-gating for SoC IP Protection,” Design Automation Conference (DAC), 2022.
- R. Kibria, N. Farzana, F. Farahmandi, and M. Tehranipoor, “FSMx: Finite State Machine Extraction from Flattened Netlist with Application to Security,” IEEE VLSI Test Symposium (VTS), 2022.
- C. Xi, N. Jessurun, A. Khan, M. Tehranipoor, and N. Asadi, “A Naturally Inherent Tracking Methodology for Secure Packaging Using Geo-Magnetic Signatures,” GomacTech, 2022.
- P. Calzada, J. Harrison, P. Chawla, N. Asadi, and M. Tehranipoor, “PCB Trojan Detection using Optical Imaging,” GOMACTech, 2022.
- M. Farmani, J. Harrison, F. Rahman, and M. Tehranipoor, “Efficient Rowhammer-Aware DRAM Test Under Reduced Voltage and Increased Temperature,” GOMACTech, 2022.
- M. Azhagan, M. Y. Vutukuru, O. Paradis, M. Tehranipoor, N. Asadi, “Logo Detection and Localization for IC Authentication, Marking Recognition, and Counterfeit Detection,” GOMACTech, 2022.
- N. Vashishta, Al Hassan, Md. Mahfuz, F. Rahman, N. Asadi, and M. Tehranipoor, “Trust Validation of Chiplets using a Physical Inspection Based Certificate Authorithy,” Electronic Components and Technology Conference (ECTC), 2022.
- D. Mehta, N. Mondol, F. Farahmandi, and M. Tehranipoor, “AIME: Watermarking AL Models by Leveraging Errors,” Design, Automation, and Test in Europe (DATE), 2022.
- T. Zhang, F. Rahman, M. Tehranipoor, and F. Farahmandi, “FPGA-Chain: Enabling Holistic Protection of FPGA Supply Chain with Blockchain Technology,” IEEE Workshop on Silicon Lifecycle Management (SLM), Oct. 2021.
- H. Wang, H. Li, F. Rahman, F. Farahmandi, and M. Tehranipoor, “Security Property-Driven Fault-Injection Vulnerability Assessment of Modern SoCs,” iSecCon, 2021.
- S. U. Sami, F. Rahman, D. Donchin, A. Cron, M. Borza, F. Farahmandi, and M. Tehranipoor, “POCA: First Power-on Chip Authentication in Untrusted Foundry and Assembly,” IEEE International Symposium on Hardware-Oriented Security and Trust (HOST), 2021.
- S. Rahman, H. Li, R. Guo, F. Rahman, F. Farahmandi, and M. Tehranipoor, “LL-ATPG: Logic-Locking Aware Test Using Valet Keys in an Untrusted Environment,” International Test Conference (ITC), 2021.
- A. Vafaei, N. Hooten, M. Tehranipoor, and F. Farahmandi, “Symba: Symbolic Execution at C-level for Hardware Trojan Detection,” International Test Conference (ITC), 2021.
- B. Ahmed, F. Rahman, N. Hooten, F. Farahmandi, and M. Tehranipoor, “AutoMap: Automated Mapping of Security Properties Between Different Levels of Abstraction in Design Flow,” International Conference on Computer-Aided Design (ICCAD), 2021.
- N. Pundir, S. Shi, M. Tehranipoor, and F. Farahmandi, “HLS-Induced Information Leakage Verification,” SRC TECHCON, 2021.
- J. True, N. Jessurun, D. Mehta, M. Tehranipoor, N. Asadizanjani, “Q.U.A.I.N.T.P.E.A.X. QUantifying Algorithmically INTrinsic Properties of Electronic Assemblies via X-ray CT“, Microscopy and Microanalysis (M&M), August 2021.
- J. True, C. Xi, N. Jessurun, K. Ahi, M. Tehranipoor, N. Asadizanjani, “Terahertz Based Machine Learning Approach to Integrated Circuit Assurance” Electronic Components and Technology Conference (ECTC), June 2021
- M. M. Al Hasan, N. Vashistha, S. Taheri, M. Tehranipoor, N. Asadizanjani “Generative Adversarial Network for Integrated Circuits Physical Assurance Using Scanning Electron Microscopy“, IEEE International Symposium on the Physical and Failure Analysis of Integrated Circuits (IPFA), September 2021.
- N. Pundir, F. Farahmandi, and M. Tehranipoor, “HLS-Induced Information Leakage Verification,” TECHCON 2021.
- M. M. Rahman, S. Mohammad, J. Vosatka, J. Allen, M. Allen, F. Farahmandi, F. Rahman, and M. Tehranipoor, “HEXON: Protecting Firmware Using Hardware-Assisted Execution-Level Obfuscation,” International Symposium on VLSI (ISVLSI), 2021.
- T. Farheen, U. Boreto, N. Varshney, H. Shen, D. Woodard, M. Tehranipoor, and D. Forte, “Proof of Reverse Engineering Barrier: SEM Image Analysis on Covert Gates,” International Sympoium on Test and Failure Analysis (ISTFA), 2021.
- S. Aftabjahani, R. Kastner, M. Tehranipoor, F. Farahmandi, J. Oberg, A. Nordstrom, N. Fern, A. Alric, “CAD for Hardware Security – Automation is Key to Adoption of Solution,” IEEE VLSI Test Symposium (VTS), 2021.
- H. Wang, F. Farahmandi, and M. Tehranipoor, “SOFI: Security Property-Driven Vulnerability Assessment of ICs Against Fault-Injection Attacks,” SNUG, 2021.
- Md. S. Ul Islam, F. Rahman, Farimah Farahmandi, A. Cron, M. Borza, and Mark Tehranipoor, “End-to-End Secure SoC Lifecycle Management,” Design Automation Conference (DAC), 2021.
- T. Zhang, J. Park, M. Tehranipoor, and F. Farahmandi, “PSC-TG: RTL Power Side-Channel Leakage Assessment with Test Pattern Generation,” Design Automation Conference (DAC), 2021.
- R. Muttaki, M. Tehranipoor, and F. Farahmandi, “HLock: Locking IPs at the High-Level Language,” Design Automation Conference (DAC), 2021.
- M. Farmani, F. Rahman, and M. Tehranipoor, “RHAT: Efficient RowHammer-Aware Test for Modern DRAM Modules,” IEEE European Test Symposium (ETS), 2021.
- N. Dipu, A. Ayalasomayajula, F. Rahman, F. Farahmandi, and M. Tehranipoor, “SAIF: Automated Asset Identification for Security Verification ar the Register Transfer Level,” IEEE VLSI Test Symposium (VTS), 2021.
- J. Harrison, P. Calzada, N. Asadi, and Mark Tehranipoor, “A Comprehensive Benchmark Suite for PCB Assurance,” GoamcTech 2021.
- A. Khan, C. Xi, N. Asadi, and Mark Tehranipoor, “Security Assessment of Interposer in Advanced Packaging,” GomacTech 2021.
- H. Wang, H. Li, F. Farahmandi, and Mark Tehranipoor, “SOFI: Security Property-Driven Vulnerability Assessment of ICs Against Fault-Injection Attacks,” GoamcTech 2021.
- O. Paradis, D. Woodard, M. Tehranipoor, and N. Asadi, “Frameowrk for Automatic OCB Marking Detection and Recognition for Hardware Assurance,” GOMACTech 2021.
- N, Jessurrun, O. Paradis, M. Tehranipoor, N. Asadi, “Improvements on the SHADE Algorithm for PCB Component Estimate Refinement,” GOMACTech 2021.
- N. Pundir, F. Farahmandi, and M. Tehranipoor, “Secure High-Level Synthesis: Challenges and Solutions,” International Symposium on Quality Electronics Design (ISQED), 2021.
- M. M. Hossain, F. Farahmandi, M. Tehranipoor and F. Rahman, “BOFT: Exploitable Buffer Overflow Detection by Information Flow Tracking,” Design, Automation, and Test in Europe (DATE), 2021.
- L. Lavdas, M. T. Rahman, M. Tehranipoor, and N. Asadi, “On Optical Attacks Making Logic Obfuscation Fragile,” International Test Conference, Asia (ITC-Asia), 2020..
- 2. A. Stern, D. Mehta, S. Tajik, F. Farahmandi, and M. Tehranipoor,, “SPARTA: A Laser Probing Approach for Trojan Detection,” International Test Conference (ITC), 2020.
- A. Stern, D. Mehta, S. Tajik, U. Guin, F. Farahmandi, and M. Tehranipoor, “Trust Assessment for Electronic Components using Laster and Emission-based Microscopy,” IEEE RAPID, 2020.
- J. Vosatka, A. Stern, M. Hossain, F. Rahman, J. Allen, M. Allen, F. Farahmandi, and M. Tehranipoor, “Confidence Modeling and Tracking of Recycled Integrated Circuits, Enabled by Blockchain,” IEEE RAPID, 2020.
- H. Lu, N. Vashishta, N. Asadi, M. Tehranipoor, D. Woodard, “Knowledge-based Object Localization in Scanning Electron Microscopy Images for Hardware Assurance,” International Symposium on Test and Failure Analysis (ISTFA), 2020.
- O. Paradis, N. Jessurun, M. Tehranipoor, and N. Asadi, “Color Normalization for Robust Automatic Bill of Materials Generation and Visual Inspection of PCBs,” International Symposium on Test and Failure Analysis (ISTFA), 2020.
- N. Jessurun, O. Paradis, M. Tehranipoor, and N. Asadi, “SHADE: Automated Refinement of PCB Component Estimates Using Detected Shadows,” IEEE Conference on Physical Assurance and Inspection of Electronics (PAINE), 2020. (Received Best Student Paper Award)
- J. Vosatka, A. Stern, M. M. Hossain, F. Rahman, F. Allen, M. Allen, F. Farahmandi, and M. Tehranipoor, “Tracking Cloned Elecronic Components using a Consortium-based Blockchain Infrastructure,” IEEE Conference on Physical Assurance and Inspection of Electronics (PAINE), 2020.
- A. Stern, D. Mehta, S. Tajik, U. Guin, F. Farahmandi, and M. Tehranipoor, “SPARTA: Laser Probing Approach for Sequential Trojan Detection in COTS Integrated Circuits,” IEEE Conference on Physical Assurance and Inspection of Electronics (PAINE), 2020.
- A. Duncan, A. Nahiyan, F. Rahman, G. Skipper, M. Swany, A. Lukefahr, F. Farahmandi, and M. Tehranipoor,, “SERFI: Secure Remote FPGA Initialization in an Untrusted Environment,” IEEE VLSI Test Symposium (VTS), 2020.
- N. Pundir, F. Rahman, M. Tehranipoor, and F. Farahmandi, “Analyzing Security Vulnerabilities Induced by High-Level Synthesis,” GomacTech 2020.
- J. Vosatka, M.M. Hossain, F. Rahman, J. Allen, M. Allen, F. Farahmandi, and M. Tehranipoor, “Modeling Risk in Electronics Supply Chains Enabled by Blockchain,” GomacTech 2020.
- A. Stern, A. Duncan, S. Tajik, F. Farahmandi, and M. Tehranipoor, “Sequential Hardware Trojan Detection usong Clock Activity Analysis,” GomacTech, 2020.
- A. Duncan, A. Nahiyan, F. Rahman, G. Skipper. M. Swany, A. Lukefahr, F. Farahmandi, and M. Tehranipoor, “SERFI: Secure Remote FPGA Initialization,” GomacTech, 2020.
- T. Rahman, S. M. Rahman, S. Tajik, M. Tehranipoor, and N. Asadi, “The Key is Left under the Mat: On the Inappropriate Security Assumption of Logic Locking Schemes,” IEEE International Hardware-Oriented Security and Trust (HOST), 2020.
- N. Farzana, F. Rahman, M. Tehranipoor, and F. Farahmandi, “Security Verification of System on Chip using Property Checking,” International Test Conference (ITC), 2019.
- A. Duncan, F. Rahman, A. Lukefahr, F. Farahmandi, and M. Tehranipoor, “FPGA Bitstream Security: A Day in the Life,” International Test Conference (ITC), 2019.
- M. Azhagan, D. Mehta, H. Lu, S. Agrawal, P. Chawla, M. Tehranipoor, D. Woodard, and Navid Asadi, “A New Framework for Automated Bill of Material Generation and Visual Inspection,” International Symposium on Test and Failure Analysis (ISTFA), 2019.
- M. Alam, F. Ganji, S. Tajik, M. Tehranipoor, and D. Forte, “RAM-Jam: Remote Temperature and Voltage Fault Attack on FPGAs using Memory Collisions,” Fault Diagnosis and Tolerance in Cryptography (FDTC), 2019.
- F. Ganji, S. Tajik, J. P. Seifert, M. Tehranipoor, and D. Forte, “Approaches for Hardness Amplification of PUFs,” PROOFS, 2019.
- J. Park, S. Cho, T. Lim, S. Bhunia, M. Tehranipoor, “SCR-QRNG: Side-Channel Resistant Design using Quantum Random Number Generator,” International Conference on Computer-Aided Design (ICCAD), 2019.
- T. Aravin, H. Shen, M. Tehranipoor, and Q. Qu, “LPN-based Device Authentication Using Resistive Memory,” ACM GLS-VLSI, 2019.
- A. Duncan, A. Skipper, A, Stern, F. Rahman, A. Nahiyan, A. Lukefahr, M. Swany, and M. Tehranipoor, “FLATS: Filling Logic and Testing Spatially for FPGA Authentication and Tamper Detection,” IEEE International Hardware-Oriented Security and Trust (HOST), 2019.
- X. Guo, M. Tehranipoor, and Y. Jin, “QIF-Verilog: Quantitative Information-Flow based Hardware Description Languages for Pre-Silicon Security Assessment,” IEEE International Hardware-Oriented Security and Trust (HOST), 2019.
- B. Park, M. Tehranipoor, D. Forte, and N. Maghari, “A Metal-Via Resistance Based Physically Unclonable Function with 1.18% Native Instability,”IEEE Custom Integrated Circuits Conference (CICC), 2019.
- J. Park, T. Miao, A. Nahiyan, A. Vassilev, Y. Jin, and M. Tehranipoor, “RTL-PSC: Automated Power Side-Channel Leakage Assessment at Register-Transfer Level,” IEEE VLSI Test Symposium (VTS), 2019.
- A. Stern, K. Yang, J. Vosatka, A. Duncan, J. Park, D. Forte, and M. Tehranipoor, “RASC: Enabling Remote Access to Side-Channels for Mission Critical Systems,” GomacTech, 2019.
- A. Duncan, A. Lukefahr, A. Sterm, M. Tehranipoor, and M. Swany, “Lifetime Physical Authentication of FPGAs Through Infrared Watermarking,” GomacTech, 2019.
- Q. Shi, H. Wang, N. Asadi, M. Tehranipoor, and D. Forte, “A Comprehensive Analysis on Vulnerability of Active Shields to Tilted Microprobing Attacks,” IEEE Asian HOST, 2018.
- M. T. Rahman, Q. Shi. S. Tajik, H. Shen, D. Woodard, M. Tehranipoor, and N. Asadi, “Physical Inspection and Attacks: New Frontier in Hardware Security,” IEEE International Verification and Security Workshop (IVSW), 2018.
- A. Stern, U. Botero, B. Shakya, H. Shen, and M. Tehranipoor, “EMFORCED: EM-based Fingerprinting Framework for Counterfeit Detection with Demonstration on Remarked ICs,” International Test Conference (ITC), 2018.
- Y. Han, X. Wang, and M. Tehranipoor, “IPA: Concurrent IC and PCB Authentication Using On-Chip Ring Oscillator Array,” IEEE Asian Test Symposium (ATS), 2018.
- H. Shen, N. Asadi, M. Tehranipoor, and D. Forte, “Nanopyramid: An Optical Scrambler Against Backside Probing Attacks,” International Symposium on Test and Failure Analysis (ISTFA), 2018.
- H. Shen, M. Tehranipoor, and S. Bhunia, “Tampering, Snooping, and Electromagnetic Attack Proof Coating on Printed Circuit Boards,” International Symposium on Test and Failure Analysis (ISTFA), 2018.
- N. Vashistha, H. Shen, T. Rahman, D. Woodard, N. Asadi, and M. Tehranipoor, “Trojan Scanner: Detecting Hardware Trojans with Rapid Imaging Combined with Image Processing and Machine Learning,” International Symposium on Test and Failure Analysis (ISTFA), 2018.
- H. Wang, Q. Shi, D. Forte, and M. Tehranipoor, “Metrics and Physical Design Flow for Internal Shielding Against Front Side Probing Attack,” SRC TECHCON, 2018.
- A. Nahiyan, D. Forte, and M. Tehranipoor, “Framework for Automated and Systematic Security Assessment of Modern SoCs,” SRC TECHCON, 2018.
- K. Yang, J. Park, M. Tehranipoor, and S. Bhunia, “Robust Timing Attack Countermeasure on Virtual Hardware,” IEEE Computer Society Annual Symposium on VLSI (ISVLSI), 2018.
- J. Park, X. Xu, Y. Jin, D. Forte, and M. Tehranipoor, “Power-based Side-channel Instruction-level Disassembler,” Design Automation Conference (DAC). 2018.
- M. Alam, S. Chowdhury, M. Tehranipoor, and U. Guin, “Robust, Low-Cost, and Accurate Detection of Recycled ICs using Digital Signatures,” IEEE International Symposium on Hardware Oriented Security and Trust (HOST), 2018.
- K. Yang, J. Park, M. Tehranipoor, and S. Bhunia, “Hardware Virtualization for Protection against Power Analysis Attack,” IEEE International Symposium on Hardware-Oriented Security and Trust (HOST), 2018.
- O. Arias, F. Rahman, M. Tehranipoor, and Y. Jin, “Device Attestation: Past, Present, and Future,” Design Automation, and Test in Europe (DATE), 2018.
- E. Principe, N. Asadi, D. Forte, M. Tehranipoor, R. Chivas, M. DiBattista, S. Silverman, M. Marsh, N. Piche, J. Mastovich, “Steps Toward Computational Guided Deprocessing of Integrated Circuits,” GomacTech, 2018.
- D. Capecci, D. Forte, M. Tehranipoor, and S. Bhunia, “Automated SoC Security from Design to Fabrication,” GomacTech, 2018.
- S. Beireddy, N. Asadi, M. Tehranipoor, D. Woodard, and D. Forte, “Automated Detection of Counterfeit IC Defects Using Image Processing,” GomacTech, 2018.
- J. He, X. Guo, M. Tehranipoor, and Y. Jin, “Golden Chip Free Electromagnetic Simulation and Statistical Analysis for Hardware Security,” GomacTech, 2018.
- U. Botero, M. Tehranipoor, and D. Forte, “Downgrade: A Framework for Obsolescence Handling through Backwards Compatibility,” GomacTech, 2018.
- F. Rahman, M. Farmani, M.Tehranipoor, and Y. Jin, “Hardware-assisted Cybersecurity for IoT Devices,” IEEE Microprocessor Test, Security, and Verification Conference (MTV), 2017.
- X. Wang, L. Yu, F. Rahman, and M. Tehranipoor, “IV-PUF: Interconnect Variations PUF with Self-Masking Circuit for Performance Enhancement,” IEEE Microprocessor Test, Security, and Verification Conference (MTV), 2017.
- S. Choudhury, X. Xu, M. Tehranipoor, and D. Forte, “Aging-Resistant RO PUF with Increased Reliability in FPGA,” Int. Conference on Reconfigurable Computing and FPGAs (Reconfig), 2017.
- A. Chhotaray, A. Nahiyan, T. Shrimpton, D. Forte, and Mark Tehranipoor, “Standardizing Bad Cryptographic Practice – A teardown of the IEEE standard for protecting electronic-design intellectual property,” ACM Conference on Computer and Communication Security (CCS), 2017.
- X. Wang, Y. Guo, T. Rahman, D. Zhang, and M. Tehranipoor, “DOST: Dynamically Obfuscated Wrapper for Split Test against IC Piracy,” IEEE Asian Hardware-Oriented Security and Trust Symposium (AsianHOST), 2017. Received Best Paper Award
- Z. Guo, X. Xu, M. Tehranipoor, and D. Forte, “MPA: Model-assisted PCB Attestation via Board-level RO and Temperature Compensation,” IEEE Asian Hardware-Oriented Security and Trust Symposium (AsianHOST), 2017.
- K. Yang, H. Shen, D. Forte, and M. Tehranipoor, “A Split Manufacturing Approach for Unclonable Chipless RFIDs for Pharmaceutical Supply Chain Security,” IEEE Asian Hardware-Oriented Security and Trust Symposium (AsianHOST), 2017.
- E.L. Principe, N. Asadizanjani, D. Forte, M. Tehranipoor, R. Chivas, M. DiBattista, S. Silverman, M. Marsh, J. Mastovich, J. Odum, “Steps Towards Automated Deprocessing of Integrated Circuits,” International Symposium on Test and Failure Analysis (ISTFA), 2017. Received Outstanding Paper Award
- A. Nahiyan, M. Sadi, R. Vittal, G. Contreras, D. Forte, and M. Tehranipoor, “Hardware Trojan Detection Through Information Flow Security Verification,” International Test Conference (ITC), 2017.
- X. Xu, B. Shakiya, M. Tehranipoor, and D. Forte, “Novel Bypass Attack and BDD-based Tradeoff Analysis Against all Known Logic Locking Attacks,” Conference on Cryptographic Hardware and Embedded Systems (CHES), 2017.
- Z. Guo, M. Tehranipoor, and D. Forte, “Memory-based Counterfeit IC Detection Framework,” SRC TECHCON, 2017.
- A. Nahiyan, D. Forte, and M. Tehranipoor, “Framework for Automated and Systematic Security Assessment of Modern SoCs,” SRC TECHCON, 2017.
- J. Park, M. Corba, A. E. de la Serna, R. Vigeant, M. Tehranipoor, and S. Bhunia, “ATAVE: A Framework for Automatic Timing Attack Vulnerability Evaluation,” IEEE Mid-West Symposium on Circuits and Systems (MWSCAS), 2017.
- S. Amir, B. Shakya, D. Forte, M. Tehranipoor, and S. Bhunia, “Comparative Analysis of Hardware Obfuscation for IP Protection,” ACM Great Lake Symposium on VLSI (GLS-VLSI), 2017.
- Q. Shi, K. Xiao, D. Forte, and M. Tehranipoor, “Securing Split Manufactured ICs with Wire Lifting Obfuscated Built-In Self-Authentication,” ACM Great Lake Symposium on VLSI (GLS-VLSI), 2017.
- M. Sadi, S. Kannan, and M. Tehranipoor, “Design of a Digital IP for 3D-IC Die-to-Die Clock Synchronization,” IEEE International Symposium on Circuits & Systems (ISCAS), 2017.
- Z. Guo, M. Tehranipoor, and D. Forte, “FFD: A Framework for Fake Flash Detection,” Design Automation Conference (DAC), 2017.
- T. Bryant, S. Chowdhury, D. Forte, M. Tehranipoor and N. Maghari, “A Stochastic All-Digital Weak Physically Unclonable Function for Analog/Mixed-Signal Applications,” IEEE Int. Symposium on Hardware-Oriented Security and Trust (HOST), 2017.
- N. Karimian, M. Tehranipoor, and D. Forte, “Non-Fiducial PPG-based Authentication for Healthcare Application,” Engineering in Medicine and Biology Conference (EMBC), 2017.
- N. Karimian, M. Tehranipoor, and D. Forte, “Noise Assessment Framework for Optimizing ECG Key Generation,” International Conference on Technologies for Homeland Security, 2017.
- D. Zhang, X. Wang, T. He, and M. Tehranipoor, “A Novel Dynamic Obfuscation Scan Design for Protecting IPs against Scan-Based Attack,” IEEE VLSI Test Symposium (VTS), 2017.
- Q. Shi, N. Asadi, D. Forte, and M. Tehranipoor, “Layout-based Microprobing Vulnerability Assessment for Security Critical Applications,” GOMACTech, 2017.
- N. Kariminan, Z. Guo, M. Tehranipoor, and D. Forte, “Human Recognition from Photoplethysmography (PPG) Based on Non-fiducial Features,” IEEE International Conference on Acoustics, Speech, and Signal Processing (ICASSP), 2017.
- G. K. Contreras, A. Nahiyan, S. Bhunia, D. Forte, M. Tehranipoor, “Security Vulnerability Analysis of Design-for-Test Exploits for Asset Protection in SoCs,” Asia and South Pacific Design Automation Conference (ASP-DAC), 2017.
- R. Karam, T. Hoque, S. Ray, M. Tehranipoor, S. Bhunia, “MUTARCH: Architectural Diversity for FPGA Device and IP Security,” Asia and South Pacific Design Automation Conference (ASP-DAC), 2017.
- Z. Guo, M. Tehranipoor, and D. Forte, “Aging Attacks for Key Extraction on Permutation-Based Obfuscation,” IEEEE Asian Hardware-Oriented Security and Trust (AsianHOST), 2016.
- T. Rahman, D. Forte, X. Wang, and M. Tehranipoor, “Enhancing Noise Sensitivity of Embedded SRAMs for Robust True Random Number Generation in SoCs,” IEEEE Asian Hardware-Oriented Security and Trust (AsianHOST), 2016.
- R. Karam, T. Hoque, S. Ray, M. Tehranipoor and S. Bhunia, “Robust Bitstream Protection in FPGA-based Systems through Low-Overhead Obfuscation,” ReConFig, 2016.
- M. Sadi, G. Contreras, D. Tran, J. Chen, L. Winemberg, and M. Tehranipoor, “BIST-RM: BIST-Assisted Reliability Management of SoCs Using On-Chip Clock Sweeping and Machine Learning,” International Test Conference (ITC), 2016.
- M. Alam, M. Tehranipoor, and D. Forte, “Recycled FPGA Detection using Exclusive LUT Path Delay Characterization,” International Test Conference (ITC), 2016.
- T. Bryant, S. Chowdhury, D. Forte, M. Tehranipoor, and N. Maghari, “A Stochastic Approach to Analog Physical Unclonable Function,” IEEE Midwest Symposium on Circuits and Systems (MWSCAS), 2016.
- B. Shakya, N. Asadi, D. Forte, and M. Tehranipoor, “Chip Editor: leveraging Circuit Edit for Logic Obfuscation and Trusted Fabrication,” IEEE International Conference on Computer-Aided Design (ICCAD), 2016.
- N. Karimian, D. Woodard, M. Tehranipoor, and D. Forte, “Biometrics for Authentication in Resource-Constrained Systems,” Annual International Conference of the IEEE Engineering in Medicine and Biology Society (EMBC), 2016.
- G. Contreras and M. Tehranipoor, “Fault Deterministic Vector Analysis and Seed Extraction for LBIST,” SRC TECHCON, 2016. Received Best in Session Award
- M. He and M. Tehranipoor, “Test-Point Insertion Efficiency Analysis for LBIST Applications,” SRC TECHCON, 2016.
- M. Sadi and M. Tehranipoor, “BIST-Assisted In-field Aging Reliability Management of SoCs Using On-Chip Clock Sweeping and Machine Learning,” SRC TECHCON, 2016. Received Best in Session Award
- T. Rahman, D. Forte, and M. Tehranipoor, “SRAM Inspired Design and Optimization for Developing Robust Security Primitives,” SRC TECHCON, 2016. Received Best in Session Award
- N. Asadizanjani, D. Forte, and M. Tehranipoor, “Non-destructive Bond Pull and Ball Shear Failure Analysis Based on Real Structural Properties,” Int. Symposium on Testing and Failure Analysis (ISTFA), 2016.
- N. Asadizanjani, H. Chen, B. Shakya, D. Forte, S. Bhunia, and M. Tehranipoor, “A New Methodology to Protect PCBs from Non-destructive Reverse Engineering,” Int. Symposium on Testing and Failure Analysis (ISTFA), 2016.
- N. Asadizanjani, S. Gattigowda, N. Dunn, D. Forte, and M. Tehranipoor, “A Database for Counterfeit Electronics and Automatic Defect Detection Based on Image processing and Machine Learning,” Int. Symposium on Testing and Failure Analysis (ISTFA), 2016.
- S. Ray, S. Bhunia, Y. Jin, and M. Tehranipoor, “[Extended Abstract] Security Validation in IoT Space,” IEEE VLSI Test Symposium (VTS), 2016.
- H. Shen, F. Rahman, B. Shakya, M. Tehranipoor, and D. Forte, “Selective Enhancement of Randomness at the Materials Level: Poly-Si Based Physical Unclonable Functions (PUFs),” IEEE Computer Society Annual Symposium on VLSI (ISVLSI), 2016.
- T. Li, J. Di, M. Tehranipoor, D. Forte, and L. Wang, “Tracking Data Flow at Gate-Level through Structural Checking,” ACM Great Lake Symposium on VLSI (GLSVLSI), 2016.
- A. Zaghi and Mark Tehranipoor, “Major Observations from a Specialized REU Program for Engineering Students with ADHD,” American Society for Engineering Education (ASEE), 2016.
- F. Rahman, D. Forte, and Mark Tehranipoor, “Reliability vs. Security: Challenges and Opportunities for Developing Reliable and Secure Integrated Circuits,” International Reliability Physics Symposium (IRPS), 2016.
- M. Sadi and M. Tehranipoor, “BIST-Assisted Reliability Management of SoC Using On-chip Clock Sweeping and Machine Learning,” IEEE Reliability Innovations Conference (IRIC), 2016 (extended abstract).
- K. Yang, D. Forte, and M. Tehranipoor, “UCR: An Unclonable Chipless RFID Tag,” IEEE Symposium on Hardware-Oriented Security and Trust (HOST), 2016. Received Best Paper Candidate
- Q. Shi, N. Asadi, D. Forte, and M. Tehranipoor, “A Layout-driven Framework to Assess Vulnerability of ICs to Microprobing Attacks,” IEEE Symposium on Hardware-Oriented Security and Trust (HOST), 2016. Received Best Paper Award
- Z. Guo, T. Rahman, M. Tehranipoor, and D. Forte, “A Zero-cost Approach to Detect Recycled SoC Chips Using Embedded SRAM,” IEEE Symposium on Hardware-Oriented Security and Trust (HOST), 2016.
- A. Nahiyan, K. Xiao, D. Forte, Y. Jin, and M. Tehranipoor, “AVFSM: A Framework for Identifying and Mitigating Vulnerabilities in FSMs,” Design Automation Conference (DAC), 2016.
- Z. Guo, N. Karimian, M. Tehranipoor, and D. Forte, “Hardware Security Meets Biometrics for the Age of IoT,” Int. Symposium on Circuits and Systems (ISCAS), 2016.
- T. Meade, Y. Jin, M. Tehranipoor, S. Zhang, “Gate-Level Netlist Reverse Engineering for Hardware Security: Control Logic Register Identification,” Int. Symposium on Circuits and Systems (ISCAS), 2016.
- L. Yu, X. Wang, P. Jiao, A. Chen, D. Su, L. Winemberg, M. Sadi, and M. Tehranipoor, “An Efficient All-Digital Alarmer for DVFS-based SOC,” Int. Symposium on Circuits and Systems (ISCAS), 2016.
- L. Wu, X. Wang, D. Su, A. Chen, Q. Shi, and M. Tehranipoor, “AES Design Improvement Toward Information Safety,” Int. Symposium on Circuits and Systems (ISCAS), 2016.
- M. He, G. Contreras, M. Tehranipoor, D. Tran, and L. Winemberg, “Test Point Insertion Efficiency Analysis for LBIST Applications,” IEEE VLSI Test Symposium (VTS), 2016.
- T. Meade, S. Zhang, M. Tehranipoor, and Y. Jin, “A Comprehensive Netlist Reverse Engineering Toolset for IC Trust,” GomacTech, 2016.
- N. Asadi, S. Shahbazi, D. Forte, and M. Tehranipoor, “Nondestructive X-ray Tomography Based Bond Pull and Ball Shear Analysis,” GomacTech, 2016.
- Z. Guo, N. Karimian, M. Tehranipoor, and D. Forte, “Biometric Based Human-to-Device (H2D) Authentication,” GomacTech, 2016.
- M. Alam, N. Asadi, S. Shahbazi, D. Forte, and M. Tehranipoor, “The Impact of X-ray Tomography on the Reliability of FPGAs,” GomacTech, 2016.
- B. Shakya, F. Rahman, M. Tehranipoor, and D. Forte, “Security in Nanoscale Regime – A Perspective Paper,”IEEE Microprocessor Test and Verification (MTV), 2015.
- K. Ahi, N. Asadi, M. Tehranipoor, and M. Anwar, “Authentication of electronic components by time domain THz Techniques,”Connecticut Microelectronic Symposium (CMOC), 2015 (extended abstract).
- K. Yang, D. Forte, and M. Tehranipoor, “Protecting Endpoint Devices in IoT Supply Chain,”International Conference on Computer-Aided Design (ICCAD), 2015.
- . Shi, R. Tekumalla, and M. Tehranipoor, “Concurrent Testing of Logic and Memory, and Detection of Memory Functional Paths in SOCs,”International Test Conference, 2015 (inivted), 2015.
- B. Shakya, U. Guin, M. Tehranipoor, and D. Forte, “Performance Optimization for On-Chip Sensors to Detect Recycled ICs,”IEEE Int. Conference on Computer Design (ICCD), 2015.
- T. Rahman, F. Rahman, D. Forte, and M. Tehranipoor, “A Pair Selection Algorithm for Robust RO-PUF Against Environmental Variations and Aging,”IEEE Int. Conference on Computer Design (ICCD), 2015.
- G. Contreras, L. Winemberg, M. Tehranipoor, and N. Ahmed, “Predictive LBIST Model and partial ATPG for Seed Extraction,”IEEE Defect and Fault Tolerant Systems (DFTS), 2015.
- S. Chen, J. Chen, D. Forte, J. Di, M. Tehranipoor, and L. Wang, “Chip Level Anti-reverse Engineering using Transformable Interconnects,”IEEE Defect and Fault Tolerant Systems (DFTS), 2015.
- N. Asadi, S. Shahbaz, M. Tehranipoor, and D. Forte, “Non-destructive PCB Reverse Engineering Using X-ray Micro Computed Tomography,”Int. Symposium for Testing and Failure Analysis (ISTFA), 2015.
- H. Dogan, M. Mahbub, N. Asadi, S. Shahbaz, D. Forte, and M. Tehranipoor, “Analyzing the Impact of X-ray Tomography for Non-destructive Counterfeit Detection,”Int. Symposium for Testing and Failure Analysis (ISTFA), 2015.
- K. Ahi, N. Asadi, S. Shahbaz, M. Tehranipoor, and M. Anwar, “Terahertz Characterization of Electronic Components and Comparison of Terahertz Imaging with X-ray Imaging Techniques,”Terahertz Physics, Devices, and Systems, 2015.
- K. Yang, D. Forte, and M. Tehranipoor, “ReSC: RFID-enabled Supply Chain Management and Traceability for Network Devices,”RFID Security, 2015.
- T. Rahman, D. Forte, and M. Tehranipoor, “Robust SRAM-PUF: Cell Stability Analysis and Novel Bit-Selection Algorithm,”TECHCON, 2015.
- M. Sadi and M. Tehranipoor, “An Efficient Speed Binning Methodology for SoC Using On-chip Slack Sensors and Machine Learning,”TECHCON, 2015.
- J. Chandy, et. al, “Hardware Hacking: An Approach to Trustable Computing Systems Security Education,”The Colloquium for Information Systems Security Education (CISSE), Las Vegas, June 2015.
- Z. Guo, J. Di, M. Tehranipoor, and D. Forte, “Investigation of Obfuscation-based Anti-Reverse Engineering for Printed Circuit Boards,”Design Automation Conference (DAC), 2015.
- M. Sadi, X. Wang, L. Winemberg, and M. Tehranipoor, “Speed Binning using Machine Learning and On-chip Slack Sensors,”ACM Great Lake Symposium on VLSI (GLSVLSI), 2015.
- M. Sadi and M. Tehranipoor, “Timing Slack Extraction for SoC Reliability Monitoring with Robust Digital Sensor IP and Sensor Insertion Flow,”IEEE Reliability Innovations Conference (IRIC), 2015 (extended abstract).
- T. Rahman, A. Hosey, K. Xiao, D. Forte, and M. Tehranipoor, “Cell Stability Analysis and Novel Bit-Selection Algorithm for Robust SRAM-PUF,”Connecticut Microelectronic Symposium (CMOC), 2015.
- M. Sadi and M. Tehranipoor, “A Robust Multipurpose Digital Sensor IP for In-situ Path Timing Slack Monitoring in SOCs,”IEEE VLSI Test Symposium (VTS), 2015.
- K. Xiao, D. Forte, and M. Tehranipoor, “Efficient and Secure Split Manufacturing via Obfuscated Built-In Self-Authentication,”IEEE Hardware-Oriented Security and Trust (HOST), 2015. Received Best Paper Award
- K. Yang, D. Forte, and M. Tehranipoor, “An RFID-based Technology for Electronic Component and System Counterfeit Detection and Traceability,”IEEE International Conference on Technologies for Homeland Security (HST), 2015.
- G. Contreras, M. Tehranipoor, N. Ahmed, L. Winemberg, and Y. Zhao, “LBIST Pattern Reduction by Learning ATPG Test Cube Properties,”International Symposium on Quality Electronic Design (ISQED), 2015.
- S. Quadir, N. Asadi, D. Forte, and M. Tehranipoor, “Rapid Non-destructive Reverse Engineering of Printed Circuit Boards by High Resolution X-ray Tomography,”GOMACTech, 2015.
- T. Rahman, A. Hosey, F. Rahman, D. Forte, and M. Tehranipoor, “RePa: A Pair Selection Algorithm for Reliable KeMys from RO-based PUF,”GOMACTech, 2015.
- H. Dogan, D. Forte, and M. Tehranipoor, “Aging Analysis for Recycled FPGA Detection,”GOMACTech, 2015.
- X. Wang, L. Winemberg, A. Haggag, J. Chayachinda, A. Saluja and M. Tehranipoor, “Fast Aging Degradation Rate Prediction During Production Test,”International Reliability Physics Symposium (IRPS), 2014.
- M. Sadi, Z. Conroy, B. Eklow, M. Kamm, N. Bidokhti, and M. Tehranipoor, “An All-Digital Distributed Sensor Network Based Framework for Continuous Noise Monitoring and Timing Failure Analysis in SOCs,”IEEE Asian Test Symposium (ATS), 2014.
- A. Hosey, T. Rahman, K. Xiao, D. Forte, and M. Tehranipoor, “Advanced Analysis of Cell Stability for Reliable SRAM PUFs,”IEEE Asian Test Symposium (ATS), 2014.
- H. Dogan, D. Forte, and M. Tehranipoor, “Aging Analysis for Recycled FPGA Detection,”IEEE Int. Symposium on Defect and Fault Tolerance Symposium (DFTS), Oct. 2014.
- M. He and M. Tehranipoor, “SAM: A Comprehensive Mechanism for Accessing Embedded Sensors in Modern SoCs,”IEEE Int. Symposium on Defect and Fault Tolerance Symposium (DFTS), Oct. 2014.
- T. Rahman, D. Forte, Q. Shi, G. Contreras, and M. Tehranipoor, “CSST: Preventing Distribution of Unlicensed and Rejected ICs by Untrusted Foundry and Assembly,”IEEE Int. Symposium on Defect and Fault Tolerance Symposium (DFTS), Oct. 2014.
- M. Sadi and M. Tehranipoor, “A SOC Noise Monitoring and Diagnosis with Fully Digital On-Chip Distributed Sensor Network,”SRC TECHCON, 2014.
- G. Contreras and M. Tehranipoor, “Improving LBIST Pattern Quality and Test Point Reduction,”SRC TECHCON, 2014.
- Q. Shi, X. Wang, L. Winemberg, and M. Tehranipoor, “On-Chip Sensor Selection for Effective Speed-Binning,”IEEE Mid-West Symposium on Circuits and Systems (MWSCAS), Oct. 2014.
- S. Shahbaz, D. Forte, and M. Tehranipoor, “Advanced Physical Inspection Methods for Counterfeit Detection,”Int. Symposium for Testing and Failure Analysis (ISTFA), 2014.
- S. Shahbaz, D. Forte, and M. Tehranipoor, “Advanced Physical Inspection Techniques for Counterfeit IC Detection,”Calce Symposium on Counterfeit Electronics and Supply Chain, June 2014.
- T. Rahman, D. Forte, Q. Shi, G. Contreras, and M. Tehranipoor, “CSST: An Efficient Secure Split-Test for Preventing IC Piracy,” IEEE North Atlantic Test Workshop (NATW), 2014.
- G. Contreras, N. Ahmed, L. Winemberg, and M. Tehranipoor, “TAME-TPI: A Timing-Aware Metric for Efficient Test Point Insertion and Area Overhead Reduction,” IEEE North Atlantic Test Workshop (NATW), 2014.
- M. Sadi and M. Tehranipoor, “On-Chip Sensors for Chip Timing Failure Analysis,” Connecticut Symposium on Microelectronics and Optoelectronics (CMOC), 2014.
- M. Sadi, Z. Conroy, M. Kamm, B. Eklow, N. Bidokhti and M. Tehranipoor, “System on Chip Noise Reliability Testing and Monitoring with Light-Weight Fully Digital Embedded Sensor Network,” IEEE International Reliability Innovation Conference (IRIC), 2014.
- K. Xiao, T. Rahman, D. Forte, M. Tehranipoor, M. Su, and Y. Huang, “Bit Selection Algorithm Suitable for High Volume Production of SRAM PUF,” IEEE International Symposium on Hardware-Oriented Security and Trust (HOST), 2014.
- U. Guin, D. Forte, and M. Tehranipoor, “Low-Cost On-Chip Structures for Combating Die and IC Recycling,” Design Automation Conference (DAC), 2014.
- T. Rahman, K. Xiao, D. Forte, X. Zhang, Z. Shi, and M. Tehranipoor, “TI-TRNG: Technology Independent True Random Number Generator,” Design Automation Conference (DAC), 2014.
- J. Chen, L. Winemberg, and M. Tehranipoor, “Identification of Testable Representative Paths for Low-Cost Verification of Circuit Performance During Manufacturing Tests and in the Field,” IEEE VLSI Test Symposium (VTS), 2014.
- S. Hamdiui, G. Di Natalie, G. van Battum, J. Danger, F. Smailbegovic, and M. Tehranipoor, “Hacking and Protecting IC Hardware,” Design, Automation, and Test in Europe (DATE), 2014.
- T. Rahman, D. Forte, M. Tehranipoor, and J. Fahrny, “ARO-PUF: An Aging-Resistant Ring-Oscillator PUF Design,” Design, Automation, and Test in Europe (DATE), 2014.
- K. Xiao, T. Rahman, D. Forte, M. Tehranipoor, Y. Huang, and M. Su, “Low-cost Analysis of SRAM PUFs for Identification of Mass-Produced Electronic Devices,” GOMACTech, 2014.
- U. Guin, D. Forte, D. DiMase, and M. Tehranipoor, “Counterfeit IC Detection: Test Method Selection Considering Test Time, Cost, and Tiel Level Risk,” GOMACTech, 2014.
- U. Guin, D. Forte, and M. Tehranipoor, “Low-cost On-Chip Structures for Combating Die and IC Recycling,” GOMACTech, 2014.
- N. Bidokhti, M. Tehranipoor, J. Chen, and J. Lee, “Life After Failure,” Reliability and Maintainability Symposium (RAMS), 2014.
- U. Guin, D. Forte, and M. Tehranipoor, “Anti-Counterfeit Techniques: From Design to Resign,” IEEE Microprocessor Test Verification (MTV), 2013.
- J. Chen and M. Tehranipoor, “Critical Paths Selection and Test Cost Reduction Considering Process Variations,” IEEE Asian Test Symposium (ATS), 2013.
- F. Bao, H. Chen, and M. Tehranipoor, “Worst-case Critical-Path Delay Analysis Considering Power-Supply Noise,” IEEE Asian Test Symposium (ATS), 2013.
- A. Tomita, X. Wen, Y. Sato, S. Kajihara, P. Girard, M. Tehranipoor, and L.T. Wang, “On Achieving Capture Power Safety in At-speed Scan-based Logic BIST,” IEEE Asian Test Symposium (ATS), 2013.
- U. Guin and M. Tehranipoor, “CDIR: Low-Cost Combating Die/IC Recycling Structures,” DMSMS, 2013 (Extended Abstract).
- U. Guin, D. DiMase, and M. Tehranipoor, “CDIR: Low-Cost Combating Die/IC Recycling Structures,” DMSMS, 2013 (Extended Abstract).
- A. Mazady, H. Chi Chou, M. Tehranipoor and M. Anwar, “Terahertz Spectroscopy: A Technology Platform for the Detection of Counterfeit Electronics,” DMSMS, 2013 (Extended Abstract).
- U. Guin, T. Chakraborty, and M. Tehranipoor, “Novel DFTs for Circuit Initialization to Reduce Functional Fmax Test Time,” IEEE Int. Conference on Computer Design (ICCD), 2013.
- H. Salmani, M. Tehranipoor, and R. Karri, “Trust Benchmarks and Design Vulnerability Analysis,” IEEE Int. Conference on Computer Design (ICCD), 2013.
- G. Contreras, T. Rahman, and M. Tehranipoor, “Secure Split-Test for Preventing IC Piracy by Untrusted Foundry and Assembly,” Int. Symposium on Defect and Fault Tolerance in VLSI Systems (DFT), 2013.
- H. Salmani and M. Tehranipoor, “Analyzing Circuit Vulnerability to Hardware Trojan Insertion at the Behavioral Level,” Int. Symposium on Defect and Fault Tolerance in VLSI Systems (DFT), 2013.
- Q. Shi, J. Chen, and M. Tehranipoor, “Silicon Data Based Delay Analysis and PDF Pattern Generation for Advanced Technology Node,” SRC TECHCON, September 2013.
- M. Tehranipoor, “An All-in-One Anti-Counterfeiting Technology for Integrated Circuits,” Symposium on Counterfeit Electronic Parts and Electronic Supply Chain, June 2013.
- Q. Shi, X. Wang, L. Winemberg, and M. Tehranipoor, “Experimental Analysis of Variations’ Impact on Integrated Circuits Performance in Advanced Technology Nodes,” IEEE North Atlantic Test Workshop (NATW), 2013.
- U. Guin, T. Chakraborty, and M. Tehranipoor, “Novel DFTs for Circuit Initialization to Reduce Functional Fmax Test Time,” IEEE North Atlantic Test Workshop (NATW), 2013.
- U. Guin and M. Tehranipoor, “On Selection of Counterfeit IC Detection Methods,” IEEE North Atlantic Test Workshop (NATW), 2013. Received Best Paper Award
- K. X. Zhang, K. Xiao, M. Tehranipoor, J. Rajendran, and R. Karri, “A Study on the Effectiveness of Trojan Detection Techniques using a Red Team Blue Team Approach,” IEEE VLSI Test Symposium (VTS), 2013.
- K. Xiao and M. Tehranipoor, “Built-In Self-Authentication for Preventing Hardware Trojan Insertion,” Int. IEEE Symposium on Hardware-Oriented Security and Trust (HOST), 2013.
- G. Contreras and M. Tehranipoor, “ATPG Learning BIST for Increasing Pattern Effectiveness,” IEEE International Reliability Innovation Conference (IRIC), 2013.
- J. Chen and M. Tehranipoor, “Efficient Skew Reduction for Clock Tree Design Considering NBTI and Process Variation,” IEEE International Reliability Innovation Conference (IRIC), 2013.
- M. Tehranipoor and U. Guin, “Counterfeit Detection Technology Assessment,” GOMACTech-2013.
- M. Tehranipoor and K. Xiao, “BISA: Built-In Self-Authentication to Prevent Insertion of Trojans by Untrusted Foundry,” GOMACTech-2013.
- J. Chen and M. Tehranipoor, “A Novel Flow for Reducing Clock Skew Considering NBTI Effect and Process Variations,” Int. Symposium on Quality Electronics Design (ISQED), 2013.
- W. Zhao and M. Tehranipoor, “PowerMAX: Fast Power Analysis During Test,” IEEE Asian Test Symposium (ATS), 2012 (invited).
- X. Wang, D. Tran, S. George, L. Winemberg, N. Ahmed, S. Palosh, A. Dobin, and M. Tehranipoor, “Radic: A standard-cell Based Sensor for On-Chip Aging and Flip-Flop Metastability Measurements” Int. Test Conference (ITC), 2012.
- X. Wen, Y. Nishida, K. Miyase, S. Kajihara, P. Girard, M. Tehranipoor, and L.T. Wang, “On Pinpoint Capture Power Management in At-Speed Scan Test Generation,” Int. Test Conference (ITC), 2012.
- S. Wang, J. Chen, and M. Tehranipoor, “Representative Critical Reliability Paths for Low-Cost and Accurate On-Chip Aging Evaluation,” Int. Conf. on Computer-Aided Design (ICCAD), 2012.
- A. Ferraiuolo, X. Zhang, and M. Tehranipoor, “Experimental Analysis of a Ring Oscillator Network for Hardware Trojan Detection in a 90nm ASIC” Int. Conf. on Computer-Aided Design (ICCAD), 2012
- X. Zhang, K. Xiao, and M. Tehranipoor, “Path-Delay Fingerprinting for Identification of Recovered ICs” in Proc. IEEE International Symposium on Defect and Fault Tolerance in VLSI and Nanotechnology Systems (DFTS), 2012. Received Best Student Paper Award
- M. Tehranipoor, “SST: Secure Split-Test for Preventing IC Piracy and Easy Detection,” DMSMS & Standardization, 2012.
- N. Murphy, U. Guin, and M. Tehranipoor, “Counterfeit Detection Technology Assessment,” DMSMS & Standardization, 2012.
- X. Zhang, N. Tuzzio, and M. Tehranipoor, “Identification of Recovered ICs using Fingerprints from a Light-Weight On-Chip Sensor,” IEEE/ACM Design Automation Conference (DAC), 2012.
- S. Wang, Q. Shi, J. Chen, and M. Tehranipoor, “On-Chip Structures and Test Methodologies for Analyzing Performance Degradation in Modern Designs,” SRC TECHCON, 2012.
- N. Tuzzio, K. Xiao, X. Zhang, and M. Tehranipoor, “A Zero-Overhead IC Identification Technique using Clock Sweeping and Path Delay Analysis” IEEE GLSVLSI, 2012.
- S. Wang and M. Tehranipoor, “TSUNAMI: “A Light-Weight On-Chip Structure for Measuring Timing Uncertainty Induced by Noise during Functional and Test Operations,” IEEE GLSVLSI, 2012.
- J. Chen, S. Wang, and M. Tehranipoor, “Efficient Selection and Analysis of Critical Reliability Paths and Gates,” IEEE GLS-VLSI, 2012.
- M. Tehranipooor, “Combating IC Recovery for Improving Reliability and Security of Digital Integrated Circuits,” IEEE Int. Reliability Innovations Conference (IRIC), 2012 (Extended Abstract).
- M. Tehranipoor, L. Winemberg, and N. Bidokhti, “Timing Analysis and On-Chip Measurement Considering Aging,” IEEE Int. Reliability Innovations Conference (IRIC), 2012 (Extended Abstract).
- W. Zhao, S. Chakravarty, J. Ma, N. Devta-Prasanna, F. Yang, M. Tehranipoor, “A Novel Method for Fast Identification of Peak Current during Test,” IEEE VLSI Test Symposium (VTS), 2012.
- X. Zhang, N. Tuzzio, and M. Tehranipoor, “CDR: Combating Die Recovery,” GOMACTech, Las Vegas, 2012.
- M. Li, A. Davoodi, and M. Tehranipoor, “A sensor-assisted self-authentication framework for hardware Trojan detection“, in Proc. Design, Automation, and Test in Europe (DATE), 2012.
- X. Zhang, N. Tuzzio, and M. Tehranipoor, “Red Team: Design of Intelligent Hardware Trojans with Known Defense Schemes,” Int. Conference on Computer Design (ICCD), 2011.
- F. Bao, K. Peng, K. Chakrabarty, and M. Tehranipoor, “On Generation of 1-Detect TDF Pattern Set with Significantly Increased SDD Coverage,” IEEE Asian Test Symposium (ATS), 2011.
- H. Slamani, M. Tehranipoor, S. Chakravarty, X. Wen, and P. Girard, “Layout-Aware Pattern Evaluation and Analysis for Power-Safe Application of TDF Patterns,” IEEE LPonTR, 2011.
- F. Wu, L. Dilillo, A. Bosio, P. Girard, M. Tehranipoor, K. Miyase, X. Wen, N. Ahmed, “Mapping Test Power to Functional Power Through Smart X-Filling for LOS Scheme,” IEEE LPonTR, 2011.
- J. Chen and M. Tehranipoor, “On-Chip Structures and Methodologies for Reliable Circuit Design,” Psoter, SRC TECHCON, 2011.
- S. Wang, L. Winemberg, and M. Tehranipoor, “In-Field Aging Measurement and Calibration for Power-Performance Optimization,” in Proc. Design Automation Conference (DAC), 2011.
- W. Zhao and M. Tehranipoor, “Peak Power Identification on Power Bumps During Test Application,” Low Power SOC Workshop (LPSOC), 2011 (Invited).
- X. Zhang and M. Tehranipoor, “Case Study: Detecting Hardware Trojans in Third-Party Digital IP Cores,” in Int. IEEE Hardware-Oriented Security and Trust (HOST), 2011.
- F. Bao, K. Peng, M. Yilmaz, K. Chakrabarty, and M. Tehranipoor, “Critical Fault-Based Pattern Generation for Screening Small Delay Defects,” in proc. European Test Symposium (ETS), 2011.
- S. Wang and M. Tehranipoor, “Aging Measurement and Calibration for Nanoscale VLSI Circuit,” Connecticut Symposium on Microelectronics and Optoelectronics (CMOC), 2011 (Invited).
- J. Chen and M. Tehranipoor, “Timing Analysis for Nanometer VLSI Designs Considering Aging Effects,” Connecticut Symposium on Microelectronics and Optoelectronics (CMOC), 2011 (Poster).
- X. Zhang and M. Tehranipoor, “RON: An On-chip Ring Oscillator Network for Hardware Trojan Detection,” Design, Automation, and Test in Europe (DATE), 2011.
- F. Wu, L. Dilillo, A. Bosio, P. Girard, S. Pravossoudovitch, A. Virazel, M. Tehranipoor, K. Miyase, X. Wen, and N. Ahmed, “Power Reduction Through X-filling of Transition Fault Test Vectors for LOS Testing,” in Design & Technology of Integrated Systems (DTIS), 2011.
- W. Zhao, S. Chakravarty, and M. Tehranipoor, “Power-Safe Test Application Using An Effective Gating Approach Considering Current Limits,” IEEE VLSI Test Symposium (VTS), 2011.
- K. Peng, F. Bao, G. Shofner, L. Winemberg, and M. Tehranipoor, “Case Study: Efficient SDD Test Generation for Very Large Integrated Circuits,” IEEE VLSI Test Symposium (VTS), 2011
- J. Ma, N. Ahmed, and M. Tehranipoor, “Low-Cost Diagnostic Pattern Generation and Evaluation Procedures for Noise-Related Failures,” IEEE VLSI Test Symposium (VTS), 2011.
- X. Wen, K. Enokimoto, K. Miyase, Y. Yamato, M. Kochte, S. Kajihara, P. Girard, M. Tehranipoor, “Power-Aware Test Generation with Guaranteed Launch Safety for At-Speed Scan Testing,” IEEE VLSI Test Symposium (VTS), 2011.
- X. Zhang and M. Tehranipoor, “Verifying Trustworthiness of Integrated Circuits,” GOMACTech, 2011 (Invited).
- J. Chen, S. Wang, N. Bidokhti, and M. Tehranipoor, “A Framework for Fast and Accurate Critical-Reliability Paths Identification,” IEEE North Atlantic Test Workshop (NATW), 2011.
- F. Bao, K. Peng, K. Chakrabarty, L. Winemberg, and M. Tehranipoor, “Increasing SDD Coverage without Increasing Pattern Count,” IEEE North Atlantic Test Workshop (NATW), 2011.
- N. Reddy, S. Wang, L. Winemberg, and M. Tehranipoor, “Experimental Analysis for Aging in Integrated Circuits,” IEEE North Atlantic Test Workshop (NATW), 2011.
- J. Ma, M. Tehranipoor, O. Sinanoglu, and S. Almukhaizim, “Identification of IR-drop Hot-spots in Defective Power Distribution Network Using TDF ATPG,” IEEE International Workshop on Design and Test (IDT), Abu Dhabi, 2010.
- M. Tehranipoor, “Dealing with Reliability and Variability Issues in Nanometer Technology Designs,” Connecticut Symposium on Microelectronics and Optoelectronics (CMOC), 2010 (Invited).
- H. Salmani, M. Tehranipoor, and J. Plusquellic, “A Layout-Aware Approach for Improving Localized Switching to Detect Hardware Trojans in Integrated Circuits,” IEEE International Workshop on Information Forensics and Security (WIFS), 2010.
- W. Zhao, J. Ma, M. Tehranipoor, and S. Chakravarty, “Power-Safe Application of Transition Delay Fault Patterns Considering Current Limit during Wafer Test,” IEEE Asian Test Symposium (ATS), 2010.
- K. Peng, M. Yilmaz, K. Chakrabarty, and M. Tehranipoor, “A Noise-Aware Hybrid Method for SDD Pattern Grading and Selection,” IEEE Asian Test Symposium (ATS), 2010.
- S. Goel, K. Chakrabarty, M. Yilmaz, K. Peng, and M. Tehranipoor, “Circuit Topology-Based Test Pattern Generation for Small-Delay Defects,” IEEE Asian Test Symposium (ATS), 2010.
- F. Wu, L. Dilillo, A. Bosio, P. Girard, S. Pravossoudovitch, A. Virazel, M. Tehranipoor, K. Miyase, X. Wen, and N. Ahmed, “Power reduction Through X-filling of Transition Fault Vectors for LOS Testing,” International Workshop on the Impact of Low Power design on Test and Reliability (LPonTR), 2010.
- K. Peng, Y. Huang, W. T. Cheng, and M. Tehranipoor, “Full-Circuit SPICE Simulation Based Validation of Dynamic Delay Estimation,” European Test Symposium (ETS), 2010.
- F. Wu, L. Dilillo, A. Bosio, P. Girard, S. Pravossoudovitch, A. Virazel, M. Tehranipoor, J. Ma, W. Zhao, X. Wen, “Analysis of Power Consumption and Transition Fault Coverage for LOS and LOC Testing Schemes,” DDECS, 2010.
- X. Wang and M. Tehranipoor, “Low-Cost On-Chip Structures for Measuring NBTI Effects, Variations, Path Delay, and Noise,” SRC TECHCON, Poster Presentation, 2010. Received Best in Session Award
- J. Ma and M. Tehranipoor, “A Low-Cost Diagnostic Procedure for Parametric Failures Caused by Pattern-Induced Noises,” SRC TECHCON, Poster Presentation, 2010.
- J. Ma, J. Lee, N. Ahmed, P. Girard, and M. Tehranipoor, “Pattern Grading for Testing Critical Paths Considering Power Supply Noise and Crosstalk Using a Layout-Aware Quality Metric,” in ACM Great-Lake Symposium on VLSI (GLS-VLSI), 2010.
- K. Peng, J. Thibodeau, M. Yilmaz, K. Chakrabarty, and M. Tehranipoor, “A Novel Hybrid Method for SDD Pattern Grading and Selection,” in IEEE VLSI Test Symposium (VTS), 2010.
- X. Wang and M. Tehranipoor, “Novel Physical Unclonable Function Based on Process and Environmental Variations,” in Design, Automation, and Test in Europe (DATE), 2010.
- K. Peng, M. Yilmaz, K. Chakrabarty, and M. Tehranipoor, “High-Quality Pattern Selection for Screening Small-Delay Defects Considering Process Variations and Crosstalk,” in Design, Automation, and Test in Europe (DATE), 2010.
- K. Peng, Y. Huan, R. Guo, W. T. Cheng, and M. Tehranipoor, “Emulating and Diagnosing IR-Drop by Using Dynamic SDF,” in ASP-DAC, 2010.
- K. Peng, Y. Huang, W. T. Cheng, and M. Tehranipoor, “Efficient Modeling of IR-Drop Using Dynamic SDF for Test and Diagnosis,” in IEEE Workshop on RTL and High Level Testing (WRTLT), 2009.
- X. Wang, M. Tehranipoor, and R. Datta, “A Novel Architecture for On-Chip Path Delay Measurement,” in International Test Conference (ITC), 2009.
- J. Ma, J. Lee, and M. Tehranipoor, “Extended Abstract: Developing a Novel Quality Metric for Path-Delay Fault Pattern Evaluation,” in IEEE Int. Workshop on Defect and Data Driven Testing (D3T), 2009.
- K. Peng, M. Yilamaz, K. Chakrabarty, and M. Tehranipoor, “Efficient Pattern Grading for Small Delay Defects in Digital Integrated Circuits,” IEEE North Atlantic Test Workshop (NATW), May 2009. Received Best Paper Award
- H. Salmani, M. Tehranipoor, and J. Plusquellic, “New Design Strategy for Improving Hardware Trojan Detection and Reducing Trojan Activation Time,” in IEEE Workshop on Hardware-Oriented Security and Trust (HOST), 2009.
- J. Ma, J. Lee, and M. Tehranipoor, “Layout-Aware Pattern Generation for Maximizing Supply Noise Effects on Critical Paths,” in Proc. IEEE VLSI Test Symposium (VTS), 2009.
- J. Ma, J. Lee, and M. Tehranipoor, “Layout-Aware Pattern Generation for Critical Paths Considering Supply Voltage Noise,” Poster Presentation, SRC TECHCON, Austin, TX, 2009. Received Best in session Award
- H. Furukawa, X. Wen, K. Miyase, Y. Yamoto, S. Kajihara, P. Girard, L.T. Wang, M. Tehranipoor, “CTX: A Clock-Gating-Based Test Relaxation and X-Filling Scheme for Reducing Yield Loss Risk in At-Speed Testing,” in Proc. IEEE Asian Test Symposium (ATS), 2008.
- J. Ma, J. Lee, M. Tehranipoor, X. Wen, A. Crouch, “Identification of IR-drop Hot-spots in Defective Power Distribution Network Using TDF ATPG,” in Proc. Int. Workshop on Defect and Data Driven Testing (D3T), 2008.
- M. tehranipoor, “ATPG for Increased Test Quality and In-Field Reliability,” DRV Workshop, 2008 (Invited).
- X. Wang, M. Tehranipoor, and R. Datta, “Path-RO: A Novel On-Chip Critical Path Delay Measurement Under Process Variations,” in Proc. International Conference on Computer-Aided Design (ICCAD), Nov. 2008.
- R. Rad, X. Wang, J. Plusquellic, and M. Tehranipoor, “Taxonomy of Trojans and Methods of Detection for IC Trust,” in Proc. International Conference on Computer-Aided Design (ICCAD), Nov. 2008.
- X. Wang, H. Salmani, M. Tehranipoor, and J. Plusquellic, “Hardware Trojan Detection and Isolation Using Current Integration and Localized Current Analysis,” in Proc. International Symposium on Fault and Defect Tolerance in VLSI Systems (DFT), Oct. 2008.
- X. Wang, M. Tehranipoor, and R. Datta “Accurate On-Chip Path Delay Measurement,” Texas Instruments Symposium on Test (TIST), Aug. 2008
- J. Lee and M. Tehranipoor, “A Novel Test Pattern Generation Framework for Inducing Maximum Crosstalk Effects on Delay-Sensitive Paths,” in Proc. IEEE International Test Conference (ITC), Oct. 2008.
- M. Yilmaz, K. Chakrabarty and M. Tehranipoor, “Interconnect-Aware and Layout-Oriented Test-Pattern Selection for Small-Delay Defects,” in Proc. IEEE International Test Conference (ITC), Oct. 2008.
- J. Ma, J. Lee, and M. Tehranipoor, “Power Distribution Failure Analysis Using Transition-Delay Fault Pattern Generation,” Poster presentation at IEEE International Test Conference (ITC), Oct. 2008.
- X. Wang, M. Tehranipoor, and R. Datta “Path-RO: On-Chip Critical Path Delay Measurement Under Process Variations,” IEEE North Atlantic Test Workshop (NATW), May 2008. Received Best Paper Award
- J. Ma, J. Lee, M. Tehranipoor, and A. Crouch “Test Pattern Generation for Open Defects in Power Distribution Networks,” IEEE North Atlantic Test Workshop (NATW), May 2008.
- J. Lee, S. Narayan, and M. Tehranipoor, “Low-Power Transition-Delay Fault Pattern Generation,” IEEE North Atlantic Test Workshop (NATW), May 2008. Received Honorable Mention for Best Paper Award
- X. Wang, M. Tehranipoor, and J. Plusquellic, “Detecting Malicious Inclusions in Secure Hardware: Challenges and Solutions,” IEEE Int. Hardware-Oriented Security and Trust (HOST), 2008.
- R. Rad, J. Plusquellic, and M. Tehranipoor, “Sensitivity Analysis to Hardware Trojans using Power Supply Transient Signals,” IEEE Int. Hardware-Oriented Security and Trust (HOST), 2008.
- J. Lee and M. Tehranipoor, “LS-TDF: Low Switching Transition Delay Fault Test Pattern Generation,” in Proc. IEEE VLSI Test Symposium (VTS), 2008.
- M. Yilmaz, K. Chakrabarty, and M. Tehranipoor, “Test Grading and Pattern Selection for Small Delay Defects,” in Proc. IEEE VLSI Test Symposium (VTS), 2008.
- J. Lee, S. Narayan, M. Kapralos, and M. Tehranipoor, “Layout-aware, IR-drop Tolerant Transition Fault Pattern Generation,” in Proc. Design, Automation, and Test in Europe (DATE), 2008.
- J. Lee, K. Peng, and M. Tehranipoor, “Inducing Maximum Crosstalk Effects on Delay-Sensitive Paths,” Poster presentation, SRC TECHCON, Austin, TX, 2008.
- M. Yilmaz, K. Chakrabarty and M. Tehranipoor, “Test Pattern Grading for Small Delay Defects,” Int. Workshop on Defect-Based Testing (DBT’07), 2007.
- R. Helinski, J. Plusquellic and M. Tehranipoor, “Small Delay Defect Detection Using Self-Relative Timing Bounds,” Int. Workshop on Defect-Based Testing (DBT’07), 2007.
- J. Lee and M. Tehranipoor, “Delay Fault Testing in Presence of Maximum Crosstalk,” 16th IEEE North Atlantic Test Workshop (NATW’07), Boxborough, MA, 2007.
- N. Ahmed, M. Tehranipoor and V. Jayaram, “IR-drop Tolerant Transition Delay Fault Testing,” 16th IEEE North Atlantic Test Workshop (NATW’07), Boxborough, MA, 2007.
- N. Ahmed, M. Tehranipoor and V. Jayaram, “Transition Delay Fault Test Pattern Generation Considering Supply Voltage Noise in a SOC Design,” in Proc. Design Automation Conference (DAC’07), 2007.
- N. Ahmed, M. Tehranipoor and V. Jayaram, “Supply Voltage Noise Aware ATPG for Transition Delay Faults,” in Proc. IEEE VLSI Test Symposium (VTS’07), 2007.
- N. Ahmed and M. Tehranipoor, “Supply Voltage Noise Aware ATPG for Transition Delay Faults,” TECHCON, Austin, TX 2007.
- N. Ahmed, M. Tehranipoor and V. Jayaram, “Improving ATPG and Pattern Selection for Screening Small Delay Defects,” IEEE Int. Workshop on Current and Defect Based Testing (DBT’06), 2006.
- J. Plusquellic, D. Acharyya, A. Singh, M. Tehranipoor and C. Patel, “Multiple Supply Pad IDDQ_based Defect Detection Techniques Applied to Hardware Test Chips,” IEEE Int. Workshop on Current and Defect Based Testing (DBT’06), 2006.
- J. Plusquellic, D. Acharyya, A. Singh, M. Tehranipoor and C. Patel, “Triangulating to a Defect’s Physical Coordinates Using Multiple Supply Pad IDDQs: Test Chip Results,” in Proc. International Symposium for Testing and Failure Analysis Conference (ISTFA’06), 2006.
- N. Ahmed, M. Tehranipoor and V. Jayaram, “A Novel Framework for Faster-than-at-Speed Delay Test Considering IR-Drop Effects,” in Proc. Int. Conf. on Computer-Aided Design (ICCAD’06), 2006.
- R. M. Rad and M. Tehranipoor, “A New Hybrid FPGA Using Nanoscale Cluster and CMOS Scale Routing,” in Proc. Design Automation Conference (DAC’06), 2006.
- N. Ahmed, M. Tehranipoor and V. Jayaram, “Timing-Based Delay Test for Screening Small Delay Defects,” in Proc. Design Automation Conference (DAC’06), 2006. Best Paper Candidate
- R. M. Rad and M. Tehranipoor, “A Reconfiguration-based Defect Tolerance Method for Nanosclae Devices,” in Proc. Int. Symposium on Defect and Fault Tolerance of VLSI Systems (DFT’06), 2006.
- R. M. Rad and M. Tehranipoor, “SCT: An Approach for Testing and Configuring Nanoscale Devices,” in Proc. IEEE VLSI Test Symposium (VTS’06), 2006.
- J. Lee, M. Tehranipoorand J. Plusquellic, “A Low-Cost Solution for Protecting IPs Against Side-Channel Scan-Based Attacks,” In Proc. IEEE VLSI Test Symposium (VTS’06), 2006.
- R. M. Rad and M. Tehranipoor, “Test Time and Defect Map Analysis of PLA and LUT-Based Nano-Architectures,” IEEE North Atlantic Test Workshop (NATW’06), 2006.
- N. Ahmed, M. Tehranipoor and V. Jayaram, “A Case Study of IR-Drop Effects During Faster-than-at-Speed Delay Test,” IEEE North Atlantic Test Workshop (NATW’06), 2006.
- J. Plusquellic, D. Acharyya, A. Singh, M. Tehranipoor and C. Patel, “Triangulating to a Defect’s Physical Coordinates Using Multiple Supply Pad IDDQs: Test Chip Results,” IEEE North Atlantic Test Workshop (NATW’06), 2006.
- J. Lee, N. Ahmed, M. Tehranipoor, V. Jayaram and J. Plusquellic, “A Novel Framework for Functionally Untestable Transition Fault Avoidance during ATPG,” IEEE North Atlantic Test Workshop (NATW’06), 2006.
- R. M. P. Rad and M. Tehranipoor, “Fine-Grained Island Style Architecture for Molecular Electronic Devices,” International Symposium on Field-Programmable Gate Arrays (FPGA’06) (Poster), 2006.
- M. Tehranipoor and R. M. P. Rad, “Test and Recovery for Fine-Grained Nanoscale Architectures,” International Symposium on Field-Programmable Gate Arrays (FPGA’06) (Poster), 2006.
- M. ElShoukry, C.P. Ravikumar and M. Tehranipoor, “Partial Gating Optimization for Power Reduction During Test Application,” in Proc. IEEE 14th Asian Test Symposium (ATS’05), 2005.
- M. Tehranipoor, M. Nourani and N. Ahmed, “Low Transition LFSR for BIST-Based Applications,” in Proc. IEEE 14th Asian Test Symposium (ATS’05), 2005.
- C.P. Ravikumar, N. Ahmed and M. Tehranipoor, “Practicing Transition-Fault Testing with Physical-Design-Friendly Flows,” Texas Instruments India Technical Conference (TIITC’05), 2005.
- J. Lee, M. Tehranipoor, C. Patel and J. Plusquellic, “Securing Scan Design Using Lock & Key Technique,” in Proc. International Symposium on Defect and Fault Tolerance in VLSI Systems (DFT’05), 2005.
- N. Ahmed and M. Tehranipoor, “Improving Transition Delay Fault Coverage Using Hybrid Scan-Based Technique,” in Proc. International Symposium on Defect and Fault Tolerance in VLSI Systems (DFT’05), 2005.
- M. Tehranipoor, “Defect Tolerance for Molecular Electronics-Based NanoFabrics Using Built-In Self-Test Procedure,” in Proc. International Symposium on Defect and Fault Tolerance in VLSI Systems (DFT’05), 2005.
- M. Alisafaee, S. M. Fakhraie and M. Tehranipoor, “Architecture of an Embedded Queue Management Engine for High-Speed Network Devices,” in Proc. IEEE MidWest Symposium on Circuits and Systems (MWSCAS’05), Cincinnati, 2005.
- H. Esmaeilzadeh, F. Farzan, N. Shahidi, S. M. Fakhraie, C. Lucas and M. Tehranipoor, “NnSP: Embedded Neural Networks Stream Processor,” in Proc. IEEE MidWest Symposium on Circuits and Systems (MWSCAS’05), 2005.
- N. Ahmed, M. Tehranipoor and C.P. Ravikumar, “Addressing At-speed Fault Coverage and Test Cost Issues Using Enhanced Launch-off-Capture,” Texas Instruments Symposium on Test (TIST’05), 2005.
- N. Ahmed, M. Tehranipoor and C.P. Ravikumar, “At-Speed Local Scan Enable Generation for Transition Fault Testing Using Low-Cost Testers,” Texas Instruments Symposium on Test (TIST’05), 2005 (Ranked 5th Among 89 Presentations).
- N. Ahmed, M. Tehranipoor and C.P. Ravikumar, “Enhanced Launch-off-Capture Transition Fault Testing,” in Proc. IEEE International Test Conf. (ITC’05), 2005 (Received Top Ten Paper Recognition).
- N. Ahmed, M. Tehranipoor, C.P. Ravikumar and J. Plusquellic, “At-Speed Transition Fault Testing Using Low Speed Testers With Application to Reduced Scan Enable Routing Area,” IEEE North Atlantic Test Workshop (NATW’05), pp. 112-119, 2005.
- D. Acharyya, A. singh, M. Tehranipoor, C. Patel and J. Plusquellic, “Sensitivity Analysis of Quiescent Signal Analysis for Defect Detection,” IEEE. Int. Workshop on Defect Based Testing (DBT’05), pp. 3-10, 2005.
- M. Nourani, M. Tehranipoor and N. Ahmed, “Pattern Generation and Estimation for Power Supply Noise Analysis,” in proc. IEEE VLSI Test Symposium (VTS’05), pp. 439-444, 2005.
- N. Ahmed, C.P. Ravikumar, M. Tehranipoor and J. Plusquellic, “At-Speed Transition Fault Testing With Low Speed Scan Enable,” in proc. IEEE VLSI Test Symposium (VTS’05), pp. 42-47, 2005. Received Best Paper Award
- M. H. Tehranipour, M. Nourani and K. Chakrabarty, “Nine-Coded Compression Technique with Application to Reduced Pin-Count Testing and Flexible On-Chip Decompression,” in proc. IEEE/ACM Design, Automation and Test in Europe (DATE’04), Paris, France, vol. 2, pp. 1284-1289, 2004.
- M. H. Tehranipour, M. Nourani, K. Arabi and A. Afzali-Kusha, “Mixed RL-Huffman Encoding for Power Reduction and Data Compression in Scan Test,” in proc. IEEE International Symposium on Circuits And Systems (ISCAS’04), Vancouver, Canada, vol. 2, pp. 681-684, 2004.
- N. Ahmed, M. H. Tehranipour and M. Nourani, “Low-Power Pattern Generation for BIST Architecture,” in proc. IEEE International Symposium on Circuits And Systems (ISCAS’04), Vancouver, Canada, vol. 2, pp. 689-692, 2004.
- N. Ahmed, M. H. Tehranipour, D. Zhou and M. Nourani,, “Frequency Driven Repeater Insertion for Deep Submicron,” in proc. IEEE International Symposium on Circuits And Systems (ISCAS’04), Vancouver, Canada, vol. 5, 181-184, 2004.
- M. H. Tehranipour, N. Ahmed and M. Nourani, “Testing SoC Interconnects for Signal Integrity Using Boundary Scan,” in proc. IEEE VLSI Test Symposium (VTS’03), Napa, CA, pp. 158-163, 2003.
- N. Ahmed, M. H. Tehranipour and M. Nourani, “Extending JTAG for Testing Signal Integrity in SoCs,” in proc. IEEE/ACM Design, Automation and Test in Europe (DATE’03), Messe Munich, Germany, pp. 218-223, 2003.
- M. H. Tehranipour, N. Ahmed and M. Nourani, “Multiple Transition Model and Enhanced Boundary Scan Architecure to Test Interconnects for Signal Integrity,” in proc. IEEE International Conference on Computer Design (ICCD’03), San-Jose, pp. 554-559, CA, 2003.
- M. H. Tehranipour, M. Nourani and S. M. Fakhraie, “Systematic Test Program Generation for SoC Testing Using Embedded Processor,” in proc. IEEE International Symposium on Circuits And Systems (ISCAS’03), Bangkok, Thailand, vol. 5, pp. 541-544, 2003.
- G. R. Chaji, R. M. Pourrrad, S. M. Fakhraie and M. H. Tehranipour, “eUTDSP: A Design Study of a New VLIW-Based DSP Architecture,” in proc. IEEE International Symposium on Circuits And Systems (ISCAS’03), Bangkok, Thailand, vol. 4, pp. 137-140, 2003.
- M. H. Tehranipour and M. Nourani, “Signal Integrity Loss in SoC’s Interconnects: A Diagnostic Approach Using Embedded Microprocessor,” in proc. IEEE International Test Conference (ITC’02), Baltimore, MD, pp.1093-1102, 2002.
- S. M. Fakhraie, M. H. Tehranipour, M. R. Movahedin and M. Nourani, “Fast Prototyping of a DSP Core,” in proc. IEEE MidWest Symposium on Circuits and Systems (MWSCAS’02), Tulsa, Oklahoma, vol. 2, pp. 215-218, 2002.
- M. H. Tehranipour, M. Nourani, S. M. Fakhraie and C. A. Papachristou, “Test Optimization of Bus-Structured SoCs Using Embedded Microprocessor,” in proc. IEEE MidWest Symposium on Circuits and Systems (MWSCAS’02), Tulsa, Oklahoma, vol. 1, pp. 168-171, 2002.
- M. H. Tehranipour, Z. Navabi and S. M. Fakhraie, “An Efficient BIST for Embedded SRAM Testing,” in proc. IEEE International Symposium on Circuits And Systems (ISCAS’01), Sydney, Australia, Vol 5, pp. 73-76, 2001.
- M. H. Tehranipour, Z. Navabi and S. M. Fakhraie, “A Low-Cost BIST Architecture for Processor Cores,” in proc. IEEE Electronic Circuits and Systems Conference (ECS’01), Bratislava, Slovakia, pp. 11-14, 2001.
- M. H. Tehranipour and Z. Navabi, “Zero-Overhead BIST for Internal SRAM Testing,” in proc. IEEE International Conference on Microelectronics (ICM’00), Tehran, Iran, pp. 109-112, 2000.
Technical Reports and Invited Poster Presentations
- U. Guin, M. Tehranipoor, D. DiMase, and M. Megrdician, “Counterfeit IC Detection and Challenges Ahead,” ACM SIGDA, March 2013.
- N. Reddy and M. Tehranioor, “Reliability Analysis for 90nm Test Chips,” Technical Reports, CADT-20110110, 2011.
- F. Wu1, L. Dilillo, A. Bosio, P. Girard, S. Pravossoudovitch, A. Virazel, M. Tehranipoor, K. Miyase, X. Wen, N. Ahmed, “Is Test Power Reduction Through X-Filling Good Enough?,” Poster presentation, Int. Test Conference (ITC), 2010.
- J. Lee and M. Tehranipoor, “Low-power Transition Delay Fault Test Pattern Generation,” IEEE VLSI Test Symposium (VTS), 2008, PhD Thesis Poster Presentation.
- M. Tehranipoor, “Trojan Detection and Isolation in Integrated Circuits,” NSF Cyber Trust meeting, New Haven, March 2008
- N. Ahmed, M. Tehranipoor, and V. Jayaram, “Considering IR-Drop Effects During Faster-than-at-Speed Delay Test,” presented in Special Session (Elevator Talk), IEEE VLSI Test Symposium (VTS), 2006.
- N. Ahmed and M. Tehranipoor, “On-chip Scan Enable Generation for Transition Fault Testing,” Poster Presentation, University Booth, ITC 2005.
- J. Plusquellic, D. Acharyya, C. Patel, A. Singh and M. Tehranipoor, “Hardware Investigation of Defect Sensitivity of a Multiple Supply Pad IDDQ Method,” Poster Presentation, University Booth, ITC 2005.
- N. Ahmed and M. Tehranipoor, “Enhanced Launch-off-Capture with Improved Fault Coverage and Reduced Pattern Count,” Presented in UT-Austin Poster Session, ITC 2005.
- M. H. Tehranipour and M. Nourani, “Low-Power Test pattern generation for BIST Architecture,” University of Texas at Dallas, 2003.
- M. H. Tehranipour and M. Nourani, “Test Compression and Power Reduction in Scan Using RL-Huffman Encoding,” University of Texas at Dallas, 2002.