Patents by Inventor Mark M. Tehranipoor
Mark M. Tehranipoor has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 11056448Abstract: Integrated circuit (IC) camouflaging has emerged as a promising solution for protecting semiconductor intellectual property (IP) against reverse engineering. The cell camouflaging covert gate leverages doping and dummy contacts to create camouflaged cells that are indistinguishable from regular standard cells under modern imaging techniques. A comprehensive security analysis of the covert gate shows that it achieves high resiliency against SAT and test-based attacks at very low overheads. Models are derived to characterize the covert cells, and metrics are developed to incorporate them into a gate-level design. Simulation results of overheads and attacks are presented on benchmark circuits.Type: GrantFiled: February 21, 2020Date of Patent: July 6, 2021Assignee: University of Florida Research Foundation, IncorporatedInventors: Domenic J. Forte, Bicky Shakya, Haoting Shen, Mark M. Tehranipoor
-
Patent number: 11030348Abstract: Circuits and methods for protecting against intellectual property piracy and integrated circuit piracy from an untrusted third party are provided. A circuit can include an original circuit and an obfuscated circuit incorporated into the original circuit and changing the output of the original circuit, wherein the obfuscated circuit is configured to recover the output of the original circuit by modifying the obfuscated circuit. In addition, a method of manufacturing a semiconductor device can include designing a circuit including an original circuit and an obfuscated circuit, and fabricating the circuit, wherein the obfuscated circuit is configured to change an output of the original circuit and to recover the output of the original circuit by modifying the obfuscated circuit.Type: GrantFiled: June 15, 2017Date of Patent: June 8, 2021Assignee: UNIVERSITY OF FLORIDA RESEARCH FOUNDATION, INCORPORATEDInventors: Mark M. Tehranipoor, Domenic J. Forte, Bicky Shakya, Navid Asadizanjani
-
Patent number: 11030737Abstract: A method of detecting hardware Trojans in an IC includes providing a golden IC layout data set or SEM image data taken at long dwelling time on an active area of the golden IC after polishing it from the backside. Next, the IC under authentication (IUA) sample is prepared for fast SEM imagining (shorter dwelling time) after backside thinning. Next step is to perform image processing on the IUA's SEM image, which includes histogram equalization with noise filtering using Gaussian and Median filters. In the last step, the IUA sample data with the shorter dwelling time is compared with the golden IC layout data or the golden image data from high quality (longer dwelling time) SEM scanning process. At the end the result of the comparison is used to identify hardware Trojans.Type: GrantFiled: September 17, 2019Date of Patent: June 8, 2021Assignee: UNIVERSITY OF FLORIDA RESEARCH FOUNDATION, INCORPORATEDInventors: Mark M. Tehranipoor, Haoting Shen, Nidish Vashistha, Navid Asadizanjani, Mir Tanjidur Rahman, Damon Woodard
-
Patent number: 10929741Abstract: An unclonable chipless radio frequency identification (RFID) tag and corresponding cross-registration methods of determining an identity and/or tag signature of an RFID tag are described. In an example embodiment, an unclonable chipless RFID tag comprises a first tag portion comprising one or more first conductive members unremovably secured to a dielectric item; and a second tag portion comprising packaging conductive pattern. The first tag portion and the second tag portion are in a static or fixed physical relationship with respect to one another.Type: GrantFiled: June 7, 2019Date of Patent: February 23, 2021Assignee: University of Florida Research Foundation, IncorporatedInventors: Mark M. Tehranipoor, Kun Yang, Domenic J. Forte, Ulbert Botero, Haoting Shen
-
Publication number: 20210026994Abstract: Various examples are provided related to power side-channel vulnerability assessment. In one example, a method includes identifying target registers in an IC design; generating input patterns associated with a target function that can generate a power difference in the target registers when processing the target function; determining a side-channel vulnerability (SCV) metric using the power difference produced by the input patterns; and identifying a vulnerability in the IC design using the SCV metric. Identification of the vulnerability allows for modification of the IC design at an early stage, which can avoid power side-channel attacks (e.g., DPA and CPA) in the fabricated IC design. The method can be used for pre-silicon power side-channel leakage assessment of IC designs such as, e.g., cryptographic and non-cryptographic circuits.Type: ApplicationFiled: July 23, 2019Publication date: January 28, 2021Inventors: Mark M. Tehranipoor, Adib Nahiyan, Domenic J. Forte, Jungmin Park
-
METHOD, APPARATUS AND COMPUTER PROGRAM PRODUCT FOR PROTECTING CONFIDENTIAL INTEGRATED CIRCUIT DESIGN
Publication number: 20210012016Abstract: Methods, apparatus and computer program product for protecting a confidential integrated circuit design process.Type: ApplicationFiled: July 9, 2020Publication date: January 14, 2021Applicant: University of Florida Research Foundation, IncorporatedInventors: Mark M. Tehranipoor, Andrew C. Stern, Adib Nahiyan, Farimah Farahmandi, Fahim Rahman -
Publication number: 20200273818Abstract: Integrated circuit (IC) camouflaging has emerged as a promising solution for protecting semiconductor intellectual property (IP) against reverse engineering. The cell camouflaging covert gate leverages doping and dummy contacts to create camouflaged cells that are indistinguishable from regular standard cells under modern imaging techniques. A comprehensive security analysis of the covert gate shows that it achieves high resiliency against SAT and test-based attacks at very low overheads. Models are derived to characterize the covert cells, and metrics are developed to incorporate them into a gate-level design. Simulation results of overheads and attacks are presented on benchmark circuits.Type: ApplicationFiled: February 21, 2020Publication date: August 27, 2020Inventors: Domenic J. Forte, Bicky Shakya, Haoting Shen, Mark M. Tehranipoor
-
Publication number: 20200251602Abstract: A pyramid structure to mitigate optical probing attacks in ICs by scrambling the measurements reflected by a laser pulse is disclosed. The pyramid structure is applied to selected areas at the bottom surface of the metal traces in metal layer to circumvent the extra silicon layer and thus minimize the changes to the conventional device structures. The pyramid structure includes randomized pyramids at nanometer scale. Optical simulation results show the pyramidized metal surface is able to prevent optical probing attacks. The fabrication of pyramids is CMOS compatible as well. Optical simulations are performed to analyze the impact these nano-scaled pyramids in a laser voltage probing attacking model. The nanopyramid can disturb the optical measurements enough to make the attacks practically infeasible. In addition, the nanopyramid structure countermeasure works in a passive mode without consuming any energy.Type: ApplicationFiled: January 28, 2020Publication date: August 6, 2020Inventors: Haoting Shen, Navid Asadizanjani, Domenic J. Forte, Mark M. Tehranipoor
-
Publication number: 20200090325Abstract: A method of detecting hardware Trojans in an IC includes providing a golden IC layout data set or SEM image data taken at long dwelling time on an active area of the golden IC after polishing it from the backside. Next, the IC under authentication (IUA) sample is prepared for fast SEM imagining (shorter dwelling time) after backside thinning. Next step is to perform image processing on the IUA's SEM image, which includes histogram equalization with noise filtering using Gaussian and Median filters. In the last step, the IUA sample data with the shorter dwelling time is compared with the golden IC layout data or the golden image data from high quality (longer dwelling time) SEM scanning process. At the end the result of the comparison is used to identify hardware Trojans.Type: ApplicationFiled: September 17, 2019Publication date: March 19, 2020Inventors: Mark M. Tehranipoor, Haoting Shen, Nidish Vashistha, Navid Asadizanjani, Mir Tanjidur Rahman, Damon Woodard
-
Publication number: 20200065456Abstract: A dynamically obfuscated scan chain (DOSC) includes a control module designed to control memory loading, a linear feedback shift register (LFSR), a dynamic Obfuscation Key generator configured to use LFSR to generate a ?-bit protected Obfuscation Key, in order to confuse and change the test data into an output scan vectors when the Obfuscation Key update is triggered. The DOSC also includes a shadow chain, configured to input the ?-bit protected Obfuscation Key generated by the LFSR, and output k ??×??-bit protected Obfuscation Keys, and obfuscated scan chains. The DOSC operating method includes: loading control vectors to LFSR from control module during initialization; generating the Obfuscation Key at an output of the LFSR; generating the Obfuscation Key bit by bit based at least in part on the shadow chain and the Obfuscation Key during a first scan clock after reset in order to confuse test patterns.Type: ApplicationFiled: August 8, 2019Publication date: February 27, 2020Inventors: Mark M. Tehranipoor, Domenic J. Forte, Farimah Farahmandi, Adib Nahiyan, Fahim Rahman, Mohammad Sazadur Rahman
-
Patent number: 10573605Abstract: A method of assessing vulnerability of Integrated Circuit (IC) can include: preparing a list of logic nets of the IC; obtaining rectangular segments from the logic nets; finding a milling exclusion area based on a covering wire; and superimposing the found milling exclusion area onto the rectangular segments of the logic nets. The milling exclusion area is an area that microprobing attack does not succeed without cutting off at least one of the rectangular segments.Type: GrantFiled: December 12, 2017Date of Patent: February 25, 2020Assignees: University of Florida Research Foundation, Incorporated, The University of ConnecticutInventors: Mark M. Tehranipoor, Domenic J. Forte, Navid Asadizanjani, Qihang Shi
-
Publication number: 20190385038Abstract: An unclonable chipless radio frequency identification (RFID) tag and corresponding cross-registration methods of determining an identity and/or tag signature of an RFID tag are described. In an example embodiment, an unclonable chipless RFID tag comprises a first tag portion comprising one or more first conductive members unremovably secured to a dielectric item; and a second tag portion comprising packaging conductive pattern. The first tag portion and the second tag portion are in a static or fixed physical relationship with respect to one another.Type: ApplicationFiled: June 7, 2019Publication date: December 19, 2019Inventors: Mark M. Tehranipoor, Kun Yang, Domenic J. Forte, Ulbert Botero, Haoting Shen
-
Publication number: 20190347417Abstract: Disclosed are various embodiments for detecting hardware Trojans through information flow security verification. A file comprising register transfer level (HDL) code for an intellectual property core is loaded from memory. An asset within the intellectual property core is identified. An integrity verification or confidentiality verification of the HDL code that represents the asset is performed. An integrity violation or confidentiality violation within the HDL code as a result of performance of the integrity verification or confidentiality violation on the HDL code that represents the asset is detected. A malicious control point or a malicious observation point linked to the asset is identified. Finally, a trigger circuit for a hardware Trojan is identified in response to identification of the malicious control point or malicious observation point.Type: ApplicationFiled: May 14, 2018Publication date: November 14, 2019Inventors: Mark M. Tehranipoor, Adib Nahiyan, Domenic J. Forte
-
Publication number: 20190311156Abstract: Circuits and methods for protecting against intellectual property piracy and integrated circuit piracy from an untrusted third party are provided. A circuit can include an original circuit and an obfuscated circuit incorporated into the original circuit and changing the output of the original circuit, wherein the obfuscated circuit is configured to recover the output of the original circuit by modifying the obfuscated circuit. In addition, a method of manufacturing a semiconductor device can include designing a circuit including an original circuit and an obfuscated circuit, and fabricating the circuit, wherein the obfuscated circuit is configured to change an output of the original circuit and to recover the output of the original circuit by modifying the obfuscated circuit.Type: ApplicationFiled: June 15, 2017Publication date: October 10, 2019Inventors: Mark M. Tehranipoor, Domenic J. Forte, Bicky Shakya, Navid Asadizanjani
-
Publication number: 20190165935Abstract: Methods and integrated circuit architectures for assuring the protection of intellectual property between third party IP providers, system designers (e.g., SoC designers), fabrication entities, and assembly entities are provided. Novel design flows for the prevention of IP overuse, IP piracy, and IC overproduction are also provided. A comprehensive framework for forward trust between 3PIP vendors, SoC design houses, fabrication entities, and assembly entities can be achieved, and the unwanted modification of IP can be prevented.Type: ApplicationFiled: June 14, 2017Publication date: May 30, 2019Inventors: Mark M. Tehranipoor, Domenic J. Forte, Ujjwal Guin
-
Patent number: 10283459Abstract: A semiconductor device can include a first metal trace, a first via disposed on the first metal trace, a second metal trace disposed on the first via, and an insulator interposed between the first metal trace and the first via. The insulator can be configured to lower an energy barrier or redistribute structure defects or charge carriers, such that the first metal trace and the first via are electrically connected to each other when power is applied. The semiconductor device can further include a dummy via disposed on the first metal trace.Type: GrantFiled: January 5, 2018Date of Patent: May 7, 2019Assignee: University of Florida Research Foundation, IncorporatedInventors: Swarup Bhunia, Haoting Shen, Mark M. Tehranipoor, Domenic J. Forte, Navid Asadizanjani
-
Patent number: 10181065Abstract: Chipless RFID tags and methods of using the same are provided. Each RFID tag provided herein can generate a unique and unclonable (unclonable chipless RFID, or UCR) identifier from its intrinsically random manufacturing process. The UCR device can monitor increase in storage temperature beyond that which is appropriate for a specific commodity to which the device is attached.Type: GrantFiled: October 27, 2017Date of Patent: January 15, 2019Assignee: University of Florida Research Foundation, IncorporatedInventors: Mark M. Tehranipoor, Haoting Shen, Kun Yang, Domenic J. Forte
-
Publication number: 20180197828Abstract: A semiconductor device can include a first metal trace, a first via disposed on the first metal trace, a second metal trace disposed on the first via, and an insulator interposed between the first metal trace and the first via. The insulator can be configured to lower an energy barrier or redistribute structure defects or charge carriers, such that the first metal trace and the first via are electrically connected to each other when power is applied. The semiconductor device can further include a dummy via disposed on the first metal trace.Type: ApplicationFiled: January 5, 2018Publication date: July 12, 2018Inventors: Swarup Bhunia, Haoting Shen, Mark M. Tehranipoor, Domenic J. Forte, Navid Asadizanjani
-
Publication number: 20180166399Abstract: A method of assessing vulnerability of Integrated Circuit (IC) can include: preparing a list of logic nets of the IC; obtaining rectangular segments from the logic nets; finding a milling exclusion area based on a covering wire; and superimposing the found milling exclusion area onto the rectangular segments of the logic nets.Type: ApplicationFiled: December 12, 2017Publication date: June 14, 2018Inventors: Mark M. Tehranipoor, Domenic J. Forte, Navid Asadizanjani, Qihang Shi
-
Publication number: 20180121689Abstract: Chipless RFID tags and methods of using the same are provided. Each RFID tag provided herein can generate a unique and unclonable (unclonable chipless RFID, or UCR) identifier from its intrinsically random manufacturing process. The UCR device can monitor increase in storage temperature beyond that which is appropriate for a specific commodity to which the device is attached.Type: ApplicationFiled: October 27, 2017Publication date: May 3, 2018Inventors: Mark M. Tehranipoor, Haoting Shen, Kun Yang, Domenic J. Forte