Skip to main content

Tehranipoor, Sara

Biography

I am an Assistant Professor of the Department of Electrical and Computer Engineering at the Santa Clara University (SCU), joined Fall 2019. Previously, I was an Assistant Professor of Engineering at the San Francisco State University for two years from 2017 to 2019, and awarded my Ph.D. in Electrical and Computer Engineering from the University of Connecticut, in July 2017. My research interests include Hardware Security, Internet-of-Things (IoT) Security, and Embedded Systems. I received the “Best Technical Paper Award” in the 30th International Conference on VLSI Design (VLSID) & 16th International Conference on Embedded Systems. I am currently serving as an associate editor for IEEE Access and IEEE Consumer Electronics Magazine.

Education

  • Ph.D., University of Connecticut, USA, 2017
  • M.S., Shahid Beheshti University, Tehran, Iran, 2013
  • B.S., University of Mazandaran, Iran, 2011

Publications

Book Chapter(s):
  1. Tehranipoor, F., Karimian, N., Wortman, P., Haque, A., Fahrny, J., and Chandy, J., “Exploring Methods of Authentication for the Internet of Things,” Taylor & Francis, 2017. Link
Journal Articles:
  1. Yan, W., Tehranipoor, F., Zhang, X., and Chandy, J., “PUF Initialization Table based Floating Thresholding Key Generation Solution” IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems (TCAD), 2020 (under review).
  2. Yue, M., Karimian, F., Yan, W., Anagnostopoulos, N., and Tehranipoor, F., “DRAM-based Authentication using Deep Convolutional Neural Networks,” IEEE Consumer Electronics Magazine, 2020 (under review).
  3. Zolfaghari, B., Srivastava, G., Afghan F., Mago V., Tehranipoor, F., Nemati, H., Bibak, Kh., Mitra, P., and Roy S., “Quo Vadis, PUF? A Systematic Statistical Answer Based on Text Mining,” IEEE Access, 2020 (under review).
  4. Wortman, P., Tehranipoor, F., Yan, W., and Chandy, J.,  ” P2M-Sec: Security Enhancement using Combined PUF and PRNG Model for Authenticating Consumer Electronic Devices,” IET Computers & Digital Techniques, 2018. Link
  5. Anagnostopoulos, N.A., Katzenbeisser, S., Chandy, J., and Tehranipoor, F., ” An Overview of DRAM-based Security Primitives,” Journal of Cryptography, DoI: 10.3390/cryptography2020007 Vol. 2, ISSN = 2410-387X, 2018. Link
  6. Tehranipoor, F., Wortman, P., Karimian, N., Yan, W., and Chandy, J., “DVFT: A Lightweight Solution for Power Supply Noise based TRNG using a Dynamic Voltage Feedback Tuning System,” IEEE Transactions on Very Large-Scale Integration (VLSI) Systems, ”  DOI: 10.1109/TVLSI.2018.2804258, pp.1-14, Mar. 2018. Link
  7. Tehranipoor, F., Karimian, N., Yan, W. and Chandy, J.A., “DRAM-Based Intrinsic Physically Unclonable Functions for System-Level Security and Authentication,” IEEE Transactions on Very Large-Scale Integration (VLSI) Systems, DOI: 10.1109/TVLSI.2016.2606658, vol. 25, no. 3, pp.1085-1097, Mar. 2017. (Among most popular articles – IEEE). Link
  8. Yan, W., Tehranipoor, F., and Chandy, J.A., “PUF-Based Fuzzy Authentication Without Error-Correcting Codes,” IEEE Transactions on Computer-Aided Design of Integrated Circuits and SystemsDOI: 10.1109/TCAD.2016.2638445, vol. 36, no. 9, pp. 1445-1457, Dec. 2017. Link
Conference Papers:
  1. Yan, W., Tehranipoor, F., Zhang, X., and Chandy, J., “FLASH: FPGA Locality Associated Secure Hash for Nearest Neighbor Search and Clustering Application”, Under Anonymous Review, March 2020.
  2. Yan, W., Zhu, H., Yu, Z., Tehranipoor, F., Chandy, J., Zhang, N., and Zhang, X., “Bit2RNG: Leveraging Bad-page Initialized Table with Bit-error Insertion for True Random Number Generation in Commodity Flash Memory”, IEEE International Symposium on Hardware-Oriented Security and Trust (HOST), February 2020 (accepted).
  3. Tehranipoor, F., and Karimian N., “How to Generate Robust Keys from Noisy DRAMs?” In Proceedings of the 25th edition on Great Lakes Symposium on VLSI (GLSVLSI), 2019. Link
  4. Tehranipoor, F., Karimian, N., Mozaffari-Kermani, M., and Mahmoodi, M., “Deep RNN-Oriented Paradigm Shift through BOCANet: Broken Obfuscated Circuit Attack” In Proceedings of the 25th edition on Great Lakes Symposium on VLSI (GLSVLSI), 2019. Link
  5. Karimian, N., and Tehranipoor, F., “HeartID-based Authentication for Autonomous Vehicles using Deep Learning and Random Number Generators” SPIE Defense and Commercial Sensing, April 2019. Link
  6. Tehranipoor, F., Karimian, N.,  and Pugazhenthi, A., “DLA-PUF: Deep Learning Attacks on Hardware Security Primitives”, SPIE Defense and Commercial Sensing, April 2019. Link
  7. Anagnostopoulos, N.A., Arul, T., Fan, Y., Sharma, R., Tehranipoor, F., Hatzfeld, C., and Katzenbeisser, S., “Securing IoT Devices Using Robust DRAM PUFs”, Global Information Infrastructure and Networking Symposium (GIIS), Greece, 2018. Link
  8. Anagnostopoulos, N.A., Schaller,  Arul, T., Fan, Y., Hatzfeld C., Tehranipoor, F., and Katzenbeisser, S., “Addressing the Effects of Temperature Variations on Intrinsic Memory-Based Physical Unclonable Functions”, 28th Krypto-tag, Kirchheim bei München, Germany, 2018. Link
  9. Wortman, P., Tehranipoor, F., and Chandy, J., “An Adversarial Risk-based Approach for Network Architecture Security Modeling and Design,” IEEE International Conference on Cyber Security and Protection of Digital Services, 2018. Link
  10. Tehranipoor, F., Karimian, N., Wortman, P., and Chandy, J.,” Low-cost Authentication Paradigm for Consumer Electronics within the Internet of Wearable Fitness Tracking Applications,” IEEE Conference on Consumer Electronics (ICCE), Jan. 2018. Link
  11. Yan, W., Jin, C., Tehranipoor, F., and Chandy, J., “Phase Calibration PUF Design and Implementation on FPGA,” 27th International Conference on Field-Programmable Logic and Applications (FPL), Sep. 2017. Link
  12. Eckert, C., Tehranipoor, F., and Chandy, J., “DRNG: DRAM-based Random Number Generation using its Startup Value Behavior,” 60th IEEE International Midwest Symposium on Circuits and Systems (MWSCAS), Aug. 2017. Link
  13. Anagnostopoulos, N.A., Schaller, A., Fan, Y., Xiong, W., Tehranipoor, F., Arul, T., Gabmeyer, S., Szefer, J., Chandy, J., and Katzenbeisser, S., “Insights into the Potential Usage of the Initial Values of DRAM Arrays of Commercial Of-the-Shelf Devices for Security Applications,” 26th Crypto-Day, Nuremberg, Germany, Jun 2017.
  14. Tehranipoor, F., Karimian, N., Yan, W., and Chandy, J., “DRAM PUFs Reliability Analysis due to Device Accelerated Aging,” IEEE International Symposium on Circuits and Systems (ISCAS), May 2017. Link
  15. Karimian, N., Tehranipoor, F., Guo, Z., Tehranipoor, M., and Forte, D., “Noise Assessment Framework for Optimizing ECG-based Key Generation,” IEEE International Symposium on Technologies for Homeland Security (HST), Apr. 2017. Link
  16. Tehranipoor, F., Karimian, N., Wortman, P., and Chandy, J., “Investigation of the IoT in its Application to Low-Cost Authentication within Healthcare,” IEEE-EMBS International Conference on Biomedical and Health Informatics (BHI), Feb. 2017.
  17. Wortman, P., Tehranipoor, F., Karimian, N., and Chandy, J., ” Proposing a modeling framework for minimizing security vulnerabilities in IoT systems in the healthcare domain,” IEEE-EMBS International Conference on Biomedical and Health Informatics (BHI), Feb. 2017. Link
  18. Tehranipoor, F., Karimian, N., Yan, W., and Chandy, J., “A study of Power Supply Variation as a Source of Random Noise,” 30th International Conference on VLSI Design & 16th International Conference on Embedded Systems (VLSID), Jan. 2017. (Received Best Paper Award). Link
  19. Okwuosah, S., Funes, A., Guo, C., Tehranipoor, F., and Chandy, J., “Multi-Communication Type Debugging Probe,” IEEE MIT Undergraduate Research Technology Conference (MIT-URTC), Nov. 2016. Link
  20. Karimian, N., Wortman, P., and Tehranipoor, F., “Evolving Authentication Design Considerations of the Internet of Biometric Things (IoBT),” Proceedings of the Eleventh IEEE/ACM International Conference on Hardware/Software Codesign and System Synthesis (CODES), Oct. 2016. Link
  21. Tehranipoor, F., Yan, W., and Chandy, J., “Robust Hardware True Random Number Generators using DRAM Remanence Effects,” IEEE International Symposium on Hardware-Oriented Security and Trust (HOST), May 2016. Link
  22. Yan, W., Tehranipoor, F., and Chandy, J., “A Novel Way to Authenticate Untrusted Integrated Circuits,” IEEE International Conference on Computer-Aided Design (ICCAD), Nov. 2015. Link
  23. Karimian, N., Tehranipoor, F., Rahman, M. T., Kelly, S., and Forte, D., “Genetic Algorithm for Hardware Trojan Detection with Ring Oscillator Network (RON),” IEEE International Conference on Technologies for Homeland Security (HST), Apr. 2015. Link
  24. Tehranipoor, F., Karimian, N., Xiao, K., and Chandy, J., “DRAM based Intrinsic Physical Unclonable Functions for System Level Security,” In Proceedings of the 25th edition on Great Lakes Symposium on VLSI (GLSVLSI), May 2015. Link
Preprints:
  1. Karimian, N., Tehranipoor, F., Anagnostopoulos, N., and Yan, W., “DRAMNet: Authentication based on Physical Unique Features of DRAM Using Deep Convolutional Neural Networks,” arXiv preprint arXiv:1902.09094, 2019. Link
  2. Tehranipoor, F., Karimian, N., Mozaffari-Kermani, M., and Mahmoodi, H., “Deep RNN-Oriented Paradigm Shift through BOCANet: Broken Obfuscated Circuit Attack”, arXiv preprint arXiv:1803.03332, 2018. Link
  3. Karimian, N., Guo, Z., Tehranipoor, F., Woodard, D., Tehranipoor, M., and Forte D., “Secure and Reliable Biometric Access Control for Resource-Constrained Systems and IoT,” 2018. Link
Posters:
  1. Pugazhenthi, A., Tehranipoor, F., “Machine Learning Attacks on Physical Unclonable Functions”, 9th international GREEN and sustainable Computing Conference (IGSC), October 2018.
  2. Anagnostopoulos, N.A., Arul, T., Fan Y., Sarangdhar, R., Sharma, R, Rosenstihl, M., Hatzfeld, C., Tehranipoor, F., Katzenbeisser, S., “On the Effects of Environmental Factors on the Functionality of Modern Dynamic Random Access Memory Modules,” 7th International Conference “Micro&Nano 2018”.
  3. Tehranipoor, F., Yan, W., and Chandy, J., “DRAM Remanence Effects based Hardware TRNG,” HOST Conference,  May 2016.
  4. Tehranipoor, F., and Chandy, J., “Investigation of DRAM Physical Unclonable Function, CHASE Workshop, March 2015.
Dissertation:
  1. Tehranipoor, F., “Design and Architecture of Hardware-based Random Function Security Primitives,” Ph.D. Dissertation, Department of Electrical and Computer Engineering, University of Connecticut, August 2017. Link

Assistant Professor, Department of Electrical and Computer Engineering