[{"@context":"http:\/\/schema.org\/","@type":"BlogPosting","@id":"https:\/\/wiki.edu.vn\/en\/wiki19\/mark-tehranipoor-wikipedia\/#BlogPosting","mainEntityOfPage":"https:\/\/wiki.edu.vn\/en\/wiki19\/mark-tehranipoor-wikipedia\/","headline":"Mark Tehranipoor – Wikipedia","name":"Mark Tehranipoor – Wikipedia","description":"before-content-x4 From Wikipedia, the free encyclopedia after-content-x4 Mark M. Tehranipoor is an Iranian American academic researcher specializing in hardware security","datePublished":"2017-12-17","dateModified":"2017-12-17","author":{"@type":"Person","@id":"https:\/\/wiki.edu.vn\/en\/wiki19\/author\/lordneo\/#Person","name":"lordneo","url":"https:\/\/wiki.edu.vn\/en\/wiki19\/author\/lordneo\/","image":{"@type":"ImageObject","@id":"https:\/\/secure.gravatar.com\/avatar\/c9645c498c9701c88b89b8537773dd7c?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/c9645c498c9701c88b89b8537773dd7c?s=96&d=mm&r=g","height":96,"width":96}},"publisher":{"@type":"Organization","name":"Enzyklop\u00e4die","logo":{"@type":"ImageObject","@id":"https:\/\/wiki.edu.vn\/wiki4\/wp-content\/uploads\/2023\/08\/download.jpg","url":"https:\/\/wiki.edu.vn\/wiki4\/wp-content\/uploads\/2023\/08\/download.jpg","width":600,"height":60}},"image":{"@type":"ImageObject","@id":"https:\/\/en.wikipedia.org\/wiki\/Special:CentralAutoLogin\/start?type=1x1","url":"https:\/\/en.wikipedia.org\/wiki\/Special:CentralAutoLogin\/start?type=1x1","height":"1","width":"1"},"url":"https:\/\/wiki.edu.vn\/en\/wiki19\/mark-tehranipoor-wikipedia\/","about":["Wiki"],"wordCount":7869,"articleBody":" (adsbygoogle = window.adsbygoogle || []).push({});before-content-x4From Wikipedia, the free encyclopedia (adsbygoogle = window.adsbygoogle || []).push({});after-content-x4Mark M. Tehranipoor is an Iranian American academic researcher specializing in hardware security and trust, electronics supply chain security, IoT security, and reliable and testable VLSI design. He is the Intel Charles E. Young Preeminence Endowed Professor in Cybersecurity at the University of Florida and serves as the Director of the Florida Institute for Cybersecurity Research.[2] Since June 2022, he has served as the chair of the Department of Electrical and Computer Engineering at the University of Florida.[3] He is an IEEE fellow and a co-founder of the International Symposium on Hardware Oriented Security and Trust (HOST).[1] Tehranipoor also serves as a co-director of the Air Force Office of Scientific Research CYAN and MEST Centers of Excellence.[4][5] (adsbygoogle = window.adsbygoogle || []).push({});after-content-x4Tehranipoor earned a Bachelor of Science (B.S.) in Electrical Engineering from Tehran Polytechnic University in 1997. After completing his Masters of Science (M.S.) in Electrical Engineering from the University of Tehran in 2000, he received the Texas Public Educational Grant and moved to the United States to pursue his Ph.D. in Electrical and Computer Engineering at the University of Texas at Dallas, completing the doctorate in two years and eight months.He spent two years at the University of Maryland Baltimore County as an assistant professor before moving to the University of Connecticut.At UConn, he started to publish a series of books on Hardware Security, with the first being the Introduction to Hardware Security and Trust.He initiated and established three centers of excellence in the area of hardware and cyber security; the Center for Hardware Assurance and Engineering (CHASE),[6] Comcast Center of Excellence on Security Innovation (CSI),[7] and the Connecticut Cybersecurity Center (C3).[8] (adsbygoogle = window.adsbygoogle || []).push({});after-content-x4He received the National Science Foundation (NSF) CAREER Award in 2008 and AFOSR MURI Award in 2014.Later in 2015, Tehranipoor moved to the University of Florida, acquiring the title of Intel Charles E. Young Preeminence Endowed Professor in Cybersecurity. He serves as the Director of the Florida Institute for Cybersecurity Research.[2] He is an IEEE fellow, ACM fellow and a co-founder of the International Symposium on Hardware Oriented Security and Trust.[1] Tehranipoor also serves as a co-director of the Air Force Office of Scientific Research CYAN and MEST Centers of Excellence.[4] In June 2022, Tehranipoor became the chair of the Department of Electrical and Computer Engineering at the University of Florida, succeeding John Harris who served as department chair for 13 years.[3]Table of ContentsPublications and patents[edit]Books[edit]Select articles[edit]Patents[edit]References[edit]Publications and patents[edit]Tehranipoor has published over 500 papers and holds 8 patents, with at least 20 more pending.[2][9]Books[edit]Mark Tehranipoor, Emerging Topics in Hardware Security, Springer, 2020.[10]Navid Asadi, Md. Tanjid Rahman and Mark M. Tehranipoor, Physical Assurance: For Electronic Devices and Systems, Springer, 2020.[11]Swarup Bhunia and Mark M. Tehranipoor, Hardware Security: A Hands-on Learning Approach, Elsevier, Morgan Kaufmann imprint, 2018.[12]M. Tehranipoor, D. Forte, G, Rose, and S. Bhunia, Security Opportunities in Nano Devices and Emerging Technologies, CRC Press, 2017.[13]S. Bhunia and M. Tehranipoor, The Hardware Trojan War: Attacks, Myths, and Defenses, Springer, 2017.[14]D. Forte, S. Bhunia, and M. Tehranipoor, Hardware Protection through Obfuscation, Springer, 2017.[15]P. Mishra, S. Bhunia, and M. Tehranipoor, Hardware IP Security and Trust, Springer, 2017.[16]M. Tehranipoor, U. Guin, and D. Forte, Counterfeit Integrated Circuits: Detection and Avoidance, Springer, 2015.[17]M. Tehranipoor, H. Salmani, and X. Zhang, Integrated Circuit Authentication: Hardware Trojans and Counterfeit Detection, Springer, July 2013.[18]M. Tehranipoor and C. Wang, Introduction to Hardware Security and Trust, Springer, August 2011.[19]M. Tehranipoor, K. Peng, and K. Chakrabarty, Test and Diagnosis for Small-Delay Defects, Springer, September 2011.[20]M. Tehranipoor, Emerging Nanotechnologies: Test, Defect Tolerance, and Reliability, Springer, November 2007.[21]M. Tehranipoor and N. Ahmed, Nanometer Technology Designs: High-Quality Delay Tests, Springer, December 2007.[22]Select articles[edit]M. Tehranipoor and F. Koushanfar, “A Survey of Hardware Trojan Taxonomy and Detection,” IEEE Design and Test of Computers, 2010.[23]U. Guin, K. Huang, D. DiMase, J. Carulli, M. Tehranipoor, Y. Makris, “Counterfeit Integrated Circuits: A Rising Threat in the Global Semiconductor Supply Chain,” Proceedings of IEEE, 2014.[24]H. Salmani, M. Tehranipoor, and J. Plusquellic, “A Novel Technique for Improving Hardware Trojan Detection and Reducing Trojan Activation Time,” IEEE Transactions on VLSI (TVLSI), 2012.[25]X. Xu, B. Shakiya, M. Tehranipoor, and D. Forte, “Novel Bypass Attack and BDD-based Tradeoff Analysis Against all Known Logic Locking Attacks,” Conference on Cryptographic Hardware and Embedded Systems (CHES), 2017.[26]K. Xiao and M. Tehranipoor, “BISA: Built-In Self-Authentication for Preventing Hardware Trojan Insertion,” Int. IEEE Symposium on Hardware-Oriented Security and Trust (HOST), 2013.[27]A. Nahiyan, K. Xiao, D. Forte, Y. Jin, and M. Tehranipoor, “AVFSM: A Framework for Identifying and Mitigating Vulnerabilities in FSMs,” Design Automation Conference (DAC), 2016.[28]U. Guin, Q. Shi, D. Forte, and M. Tehranipoor, “FORTIS: A Comprehensive Solution for Establishing Forward Trust for Protecting IPs and ICs,” ACM Transactions on Design Automation of Electronic Systems (TODAES), 2016.[29]M. T. Rahman, M. S. Rahman, H. Wang, S. Tajik, W. Khalil, F. Farahmandi, D. Forte, N. Asadi, and M. Tehranipoor, “Defense-in-Depth: A Recipe for Logic Locking to Prevail,” Integration, the VLSI Journal, 2020.[30]Patents[edit]Embedded ring oscillator network for integrated circuit security and threat detection, 2014, M. Tehranipoor, X. Wang, X. Zhang, US 8850608 B2, WO 2012122309 A3 (Grant) [31]Methods and Systems for Hardware Piracy Prevention, 2014, M. Tehranipoor and N. Tuzzio, US9071428 B2 (Grant) [32]Methods and Systems for Preventing Hardware Trojan Insertion, M. Tehranipoor and K. Xiao, US20140283147 A1 (Grant)[33]Photon-Counting Security Tagging and Verification Using Optically Encoded QR Codes, B. Javidi, A. Markman, and M. Tehranipoor, US20150295711 A1 (Grant)[34]UCR: An Unclonable Environmentally-Sensitive Chipless RFID Tag, Jan. 15, 2019, M. Tehranipoor, D. Forte, K. Yang, and H. Shen, 10181065 (Grant)[35]Vanishing Via for Hardware IP Protection Against Reverse Engineering, 2017, S. Bhunia, M. Tehranipoor, D. Forte, N. Asadi, and H. Shen, 10283459 (Grant)[36]Unclonable environmentally-sensitive chipless RFID tag with a plurality of slot resonators, 10181065, Mark Tehranipoor, Kun Yang, Haoting Shen, and Domenic Forte (Grant)[37]Layout-Driven Method to Assess Vulnerability of ICs to Microprobing Attacks, M. Tehranipoor, D. Forte, N. Asadi, and Q. Shi, U.S. Patent No. 10,573,605 (Grant)[38]References[edit]^ a b c HOST Symposium Hall of Fame^ a b c Mark Tehranipoor, University of Florida^ a b “ECE Florida Welcomes Mark Tehranipoor as Department Chair \u2013 ECE FLORIDA”. 6 June 2022.^ a b Hardware Security Research and Education Centers of Excellence open at University of Florida and Ohio State^ National Micro Electronics Security Training Center – Our Team^ Center for Hardware Assurance and Engineering^ Comcast Center of Excellence on Security Innovation^ Connecticut Cybersecurity Center^ Mark M. Tehranipoor – Google Scholar^ Tehranipoor, Mark (20 February 2021). Emerging Topics in Hardware Security. Springer. ISBN\u00a0978-3-030-64447-5.^ Asadizanjani , Rahman, Tehranipoor, Navid, Mir Tanjidur, Mark (16 February 2021). Physical Assurance For Electronic Devices and Systems. Springer. ISBN\u00a0978-3-030-62608-2.{{cite book}}: CS1 maint: multiple names: authors list (link)^ Bhunia, Tehranipoor, Swarup, Mark (October 30, 2018). Hardware Security: A Hands-on Learning Approach. Morgan Kaufmann. ISBN\u00a09780128124772.^ Forte, Bhunia, Tehranipoor, Domenic, Swarup, Mark (30 June 2020). Security Opportunities in Nano Devices and Emerging Technologies. CRC Press. ISBN\u00a09780367572624.{{cite book}}: CS1 maint: multiple names: authors list (link)^ Bhunia, Tehranipoor, Swarup, Mark (29 November 2017). The Hardware Trojan War: Attacks, Myths, and Defenses. Springer. ISBN\u00a0978-3-319-68511-3.^ Forte, Bhunia, Tehranipoor, Domenic, Swarup, Mark (2 January 2017). Hardware Protection through Obfuscation. Springer. ISBN\u00a0978-3-319-49019-9.{{cite book}}: CS1 maint: multiple names: authors list (link)^ Mishra, Bhunia, Tehranipoor, Prabhat, Swarup, Mark (2 January 2017). Hardware IP Security and Trust. Springer. ISBN\u00a0978-3-319-49025-0.{{cite book}}: CS1 maint: multiple names: authors list (link)^ Tehranipoor, Guin, Forte, Mark, Ujjwal, Domenic (12 February 2015). Counterfeit Integrated Circuits: Detection and Avoidance. Springer. ISBN\u00a0978-3-319-11824-6.{{cite book}}: CS1 maint: multiple names: authors list (link)^ Tehranipoor, Salmani, Zhang, Mark, Hassan, Xuehui (4 October 2013). Integrated Circuit Authentication: Hardware Trojans and Counterfeit Detection. Springer. ISBN\u00a0978-3-319-00816-5.{{cite book}}: CS1 maint: multiple names: authors list (link)^ Tehranipoor, Wang, Mark, Cliff (22 September 2011). Introduction to Hardware Security and Trust. Springer. ISBN\u00a0978-1-4419-8080-9.^ Tehranipoor, Peng, Chakrabarty, Mark, Ke, Krishnendu (8 September 2011). Test and Diagnosis for Small-Delay Defects. Springer. ISBN\u00a0978-1-4419-8297-1.{{cite book}}: CS1 maint: multiple names: authors list (link)^ Tehranipoor, Mark (8 December 2007). Emerging Nanotechnologies: Test, Defect Tolerance, and Reliability. Springer. ISBN\u00a0978-0-387-74747-7.^ Ahmed, Tehranipoor, Nisar, Mark (2008). Nanometer Technology Designs: High-Quality Delay Tests. Springer. doi:10.1007\/978-0-387-75728-5. ISBN\u00a0978-0-387-76486-3.^ Tehranipoor, Mohammad; Koushanfar, Farinaz (January 2010). “A Survey of Hardware Trojan Taxonomy and Detection”. IEEE Design & Test of Computers. 27 (1): 10\u201325. doi:10.1109\/MDT.2010.7. S2CID\u00a0206459491.^ Guin, Huang, DiMase, Carulli, Tehranipoor, Makris, Ujjwal, Ke, Daniel, John M., Mark, Yiorgos (July 15, 2014). “Counterfeit Integrated Circuits: A Rising Threat in the Global Semiconductor Supply Chain”. Proceedings of the IEEE. 102 (8): 1207\u20131228. doi:10.1109\/JPROC.2014.2332291. S2CID\u00a015766845.{{cite journal}}: CS1 maint: multiple names: authors list (link)^ Salmani, Tehranipoor, Plusquellic, Hassan, Mark, Jim (January 2, 2011). “A Novel Technique for Improving Hardware Trojan Detection and Reducing Trojan Activation Time”. IEEE Transactions on Very Large Scale Integration (VLSI) Systems. 20 (1): 112\u2013125. doi:10.1109\/TVLSI.2010.2093547. S2CID\u00a05242798.{{cite journal}}: CS1 maint: multiple names: authors list (link)^ Xu, Shakya, Tehranipoor, Forte, Xiaolin, Bicky, Mark, Domenic (August 25, 2017). “Novel Bypass Attack and BDD-based Tradeoff Analysis Against all Known Logic Locking Attacks” (PDF). Cham Conference. Lecture Notes in Computer Science. 10529: 189\u2013210. doi:10.1007\/978-3-319-66787-4_10. ISBN\u00a0978-3-319-66786-7.{{cite journal}}: CS1 maint: multiple names: authors list (link)^ Xiao, Tehranipoor, Kan, Mark (August 16, 2013). “BISA: Built-In Self-Authentication for Preventing Hardware Trojan Insertion”. 2013 IEEE International Symposium on Hardware-Oriented Security and Trust (HOST): 45\u201350. doi:10.1109\/HST.2013.6581564. ISBN\u00a0978-1-4799-0601-7. S2CID\u00a013915850.^ Nahiyan, Xiao, Yang, Jin, Forte, Tehranipoor, Adib, Kan, Kun, Yier, Domenic, Mark (August 18, 2016). “AVFSM: A Framework for Identifying and Mitigating Vulnerabilities in FSMs”. 2016 53nd ACM\/EDAC\/IEEE Design Automation Conference (DAC): 1\u20136. doi:10.1145\/2897937.2897992. S2CID\u00a011378273.{{cite journal}}: CS1 maint: multiple names: authors list (link)^ Guin, Shi, Forte, Tehranipoor, Ujjwal, Qihang, Domenic, Mark (May 27, 2016). “FORTIS: A Comprehensive Solution for Establishing Forward Trust for Protecting IPs and ICs”. ACM Transactions on Design Automation of Electronic Systems. 21 (4). doi:10.1145\/2893183. S2CID\u00a017234477.{{cite journal}}: CS1 maint: multiple names: authors list (link)^ Rahman, Rahman, Wang, Tajik, Khalil, Farahmandi, Forte, Asadizanjania, Tehranipoor, M. Tanjidur, M. Sazadur, Huanyu, Shahin, Waleed, Farimah, Domenic, Navid, Mark (July 20, 2019). “Defense-in-Depth: A Recipe for Logic Locking to Prevail”. Integration. 72: 39\u201357. arXiv:1907.08863. doi:10.1016\/j.vlsi.2019.12.007. S2CID\u00a0198147689.{{cite journal}}: CS1 maint: multiple names: authors list (link)^ United States Active 8,850,608, Mark Tehranipoor, Xiaoxiao Wang, Xuehui Zhang, “Embedded ring oscillator network for integrated circuit security and threat detection”, published September 30, 2014, issued September 30, 2014, assigned to University of Connecticut\u00a0^ United States Active 9,071,428, Mark Tehranipoor, Nicholas Tuzzio, “Methods and systems for hardware piracy prevention”, published June 30, 2015, issued June 30, 2015, assigned to University of Connecticut\u00a0^ United States Active 9,218,506, Mark Tehranipoor, Kan Xiao, “Methods and Systems for Preventing Hardware Trojan Insertion”, published December 22, 2015, issued December 22, 2015, assigned to University of Connecticut\u00a0^ United States Active 9,785,789, Bahram Javidi, Adam Markman, Mark Tehranipoor, “Method and System for Verification and Authentication Using Optically Encoded QR Codes”, published October 10, 2017, issued October 10, 2017, assigned to University of Connecticut\u00a0^ United States Active 10,181,065, Mark Tehranipoor, Haoting Shen, Kun Yang, Domenic Forte, “UCR: An Unclonable Environmentally-Sensitive Chipless RFID Tag”, published January 15, 2019, issued January 15, 2019, assigned to University of Florida Research Foundation Inc\u00a0^ United States Active 10,283,459, Swarup Bhunia, Haoting Shen, Mark Tehranipoor, Domenic Forte, Navid Asadizanjani, “Vanishing Via for Hardware IP Protection Against Reverse Engineering”, published May 7, 2019, issued May 7, 2019, assigned to University of Florida Research Foundation Inc\u00a0^ United States Active 10,181,065, Mark Tehranipoor, Haoting Shen, Kun Yang, Domenic Forte, “Unclonable environmentally-sensitive chipless RFID tag with a plurality of slot resonators”, published January 15, 2019, issued January 15, 2019, assigned to University of Florida Research Foundation Inc\u00a0^ United States Active 10,573,605, Mark Tehranipoor, Domenic Forte, Navid Asadizanjani, Qihang Shi, “Layout-Driven Method to Assess Vulnerability of ICs to Microprobing Attacks”, published February 25, 2020, issued February 25, 2020, assigned to University of Connecticut and University of Florida Research Foundation Inc\u00a0 (adsbygoogle = window.adsbygoogle || []).push({});after-content-x4"},{"@context":"http:\/\/schema.org\/","@type":"BreadcrumbList","itemListElement":[{"@type":"ListItem","position":1,"item":{"@id":"https:\/\/wiki.edu.vn\/en\/wiki19\/#breadcrumbitem","name":"Enzyklop\u00e4die"}},{"@type":"ListItem","position":2,"item":{"@id":"https:\/\/wiki.edu.vn\/en\/wiki19\/mark-tehranipoor-wikipedia\/#breadcrumbitem","name":"Mark Tehranipoor – Wikipedia"}}]}]