Patents by Inventor Mark M. Tehranipoor

Mark M. Tehranipoor has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 11056448
    Abstract: Integrated circuit (IC) camouflaging has emerged as a promising solution for protecting semiconductor intellectual property (IP) against reverse engineering. The cell camouflaging covert gate leverages doping and dummy contacts to create camouflaged cells that are indistinguishable from regular standard cells under modern imaging techniques. A comprehensive security analysis of the covert gate shows that it achieves high resiliency against SAT and test-based attacks at very low overheads. Models are derived to characterize the covert cells, and metrics are developed to incorporate them into a gate-level design. Simulation results of overheads and attacks are presented on benchmark circuits.
    Type: Grant
    Filed: February 21, 2020
    Date of Patent: July 6, 2021
    Assignee: University of Florida Research Foundation, Incorporated
    Inventors: Domenic J. Forte, Bicky Shakya, Haoting Shen, Mark M. Tehranipoor
  • Patent number: 11030348
    Abstract: Circuits and methods for protecting against intellectual property piracy and integrated circuit piracy from an untrusted third party are provided. A circuit can include an original circuit and an obfuscated circuit incorporated into the original circuit and changing the output of the original circuit, wherein the obfuscated circuit is configured to recover the output of the original circuit by modifying the obfuscated circuit. In addition, a method of manufacturing a semiconductor device can include designing a circuit including an original circuit and an obfuscated circuit, and fabricating the circuit, wherein the obfuscated circuit is configured to change an output of the original circuit and to recover the output of the original circuit by modifying the obfuscated circuit.
    Type: Grant
    Filed: June 15, 2017
    Date of Patent: June 8, 2021
    Assignee: UNIVERSITY OF FLORIDA RESEARCH FOUNDATION, INCORPORATED
    Inventors: Mark M. Tehranipoor, Domenic J. Forte, Bicky Shakya, Navid Asadizanjani
  • Patent number: 11030737
    Abstract: A method of detecting hardware Trojans in an IC includes providing a golden IC layout data set or SEM image data taken at long dwelling time on an active area of the golden IC after polishing it from the backside. Next, the IC under authentication (IUA) sample is prepared for fast SEM imagining (shorter dwelling time) after backside thinning. Next step is to perform image processing on the IUA's SEM image, which includes histogram equalization with noise filtering using Gaussian and Median filters. In the last step, the IUA sample data with the shorter dwelling time is compared with the golden IC layout data or the golden image data from high quality (longer dwelling time) SEM scanning process. At the end the result of the comparison is used to identify hardware Trojans.
    Type: Grant
    Filed: September 17, 2019
    Date of Patent: June 8, 2021
    Assignee: UNIVERSITY OF FLORIDA RESEARCH FOUNDATION, INCORPORATED
    Inventors: Mark M. Tehranipoor, Haoting Shen, Nidish Vashistha, Navid Asadizanjani, Mir Tanjidur Rahman, Damon Woodard
  • Patent number: 10929741
    Abstract: An unclonable chipless radio frequency identification (RFID) tag and corresponding cross-registration methods of determining an identity and/or tag signature of an RFID tag are described. In an example embodiment, an unclonable chipless RFID tag comprises a first tag portion comprising one or more first conductive members unremovably secured to a dielectric item; and a second tag portion comprising packaging conductive pattern. The first tag portion and the second tag portion are in a static or fixed physical relationship with respect to one another.
    Type: Grant
    Filed: June 7, 2019
    Date of Patent: February 23, 2021
    Assignee: University of Florida Research Foundation, Incorporated
    Inventors: Mark M. Tehranipoor, Kun Yang, Domenic J. Forte, Ulbert Botero, Haoting Shen
  • Publication number: 20210026994
    Abstract: Various examples are provided related to power side-channel vulnerability assessment. In one example, a method includes identifying target registers in an IC design; generating input patterns associated with a target function that can generate a power difference in the target registers when processing the target function; determining a side-channel vulnerability (SCV) metric using the power difference produced by the input patterns; and identifying a vulnerability in the IC design using the SCV metric. Identification of the vulnerability allows for modification of the IC design at an early stage, which can avoid power side-channel attacks (e.g., DPA and CPA) in the fabricated IC design. The method can be used for pre-silicon power side-channel leakage assessment of IC designs such as, e.g., cryptographic and non-cryptographic circuits.
    Type: Application
    Filed: July 23, 2019
    Publication date: January 28, 2021
    Inventors: Mark M. Tehranipoor, Adib Nahiyan, Domenic J. Forte, Jungmin Park
  • Publication number: 20210012016
    Abstract: Methods, apparatus and computer program product for protecting a confidential integrated circuit design process.
    Type: Application
    Filed: July 9, 2020
    Publication date: January 14, 2021
    Applicant: University of Florida Research Foundation, Incorporated
    Inventors: Mark M. Tehranipoor, Andrew C. Stern, Adib Nahiyan, Farimah Farahmandi, Fahim Rahman
  • Publication number: 20200273818
    Abstract: Integrated circuit (IC) camouflaging has emerged as a promising solution for protecting semiconductor intellectual property (IP) against reverse engineering. The cell camouflaging covert gate leverages doping and dummy contacts to create camouflaged cells that are indistinguishable from regular standard cells under modern imaging techniques. A comprehensive security analysis of the covert gate shows that it achieves high resiliency against SAT and test-based attacks at very low overheads. Models are derived to characterize the covert cells, and metrics are developed to incorporate them into a gate-level design. Simulation results of overheads and attacks are presented on benchmark circuits.
    Type: Application
    Filed: February 21, 2020
    Publication date: August 27, 2020
    Inventors: Domenic J. Forte, Bicky Shakya, Haoting Shen, Mark M. Tehranipoor
  • Publication number: 20200251602
    Abstract: A pyramid structure to mitigate optical probing attacks in ICs by scrambling the measurements reflected by a laser pulse is disclosed. The pyramid structure is applied to selected areas at the bottom surface of the metal traces in metal layer to circumvent the extra silicon layer and thus minimize the changes to the conventional device structures. The pyramid structure includes randomized pyramids at nanometer scale. Optical simulation results show the pyramidized metal surface is able to prevent optical probing attacks. The fabrication of pyramids is CMOS compatible as well. Optical simulations are performed to analyze the impact these nano-scaled pyramids in a laser voltage probing attacking model. The nanopyramid can disturb the optical measurements enough to make the attacks practically infeasible. In addition, the nanopyramid structure countermeasure works in a passive mode without consuming any energy.
    Type: Application
    Filed: January 28, 2020
    Publication date: August 6, 2020
    Inventors: Haoting Shen, Navid Asadizanjani, Domenic J. Forte, Mark M. Tehranipoor
  • Publication number: 20200090325
    Abstract: A method of detecting hardware Trojans in an IC includes providing a golden IC layout data set or SEM image data taken at long dwelling time on an active area of the golden IC after polishing it from the backside. Next, the IC under authentication (IUA) sample is prepared for fast SEM imagining (shorter dwelling time) after backside thinning. Next step is to perform image processing on the IUA's SEM image, which includes histogram equalization with noise filtering using Gaussian and Median filters. In the last step, the IUA sample data with the shorter dwelling time is compared with the golden IC layout data or the golden image data from high quality (longer dwelling time) SEM scanning process. At the end the result of the comparison is used to identify hardware Trojans.
    Type: Application
    Filed: September 17, 2019
    Publication date: March 19, 2020
    Inventors: Mark M. Tehranipoor, Haoting Shen, Nidish Vashistha, Navid Asadizanjani, Mir Tanjidur Rahman, Damon Woodard
  • Publication number: 20200065456
    Abstract: A dynamically obfuscated scan chain (DOSC) includes a control module designed to control memory loading, a linear feedback shift register (LFSR), a dynamic Obfuscation Key generator configured to use LFSR to generate a ?-bit protected Obfuscation Key, in order to confuse and change the test data into an output scan vectors when the Obfuscation Key update is triggered. The DOSC also includes a shadow chain, configured to input the ?-bit protected Obfuscation Key generated by the LFSR, and output k ??×??-bit protected Obfuscation Keys, and obfuscated scan chains. The DOSC operating method includes: loading control vectors to LFSR from control module during initialization; generating the Obfuscation Key at an output of the LFSR; generating the Obfuscation Key bit by bit based at least in part on the shadow chain and the Obfuscation Key during a first scan clock after reset in order to confuse test patterns.
    Type: Application
    Filed: August 8, 2019
    Publication date: February 27, 2020
    Inventors: Mark M. Tehranipoor, Domenic J. Forte, Farimah Farahmandi, Adib Nahiyan, Fahim Rahman, Mohammad Sazadur Rahman
  • Patent number: 10573605
    Abstract: A method of assessing vulnerability of Integrated Circuit (IC) can include: preparing a list of logic nets of the IC; obtaining rectangular segments from the logic nets; finding a milling exclusion area based on a covering wire; and superimposing the found milling exclusion area onto the rectangular segments of the logic nets. The milling exclusion area is an area that microprobing attack does not succeed without cutting off at least one of the rectangular segments.
    Type: Grant
    Filed: December 12, 2017
    Date of Patent: February 25, 2020
    Assignees: University of Florida Research Foundation, Incorporated, The University of Connecticut
    Inventors: Mark M. Tehranipoor, Domenic J. Forte, Navid Asadizanjani, Qihang Shi
  • Publication number: 20190385038
    Abstract: An unclonable chipless radio frequency identification (RFID) tag and corresponding cross-registration methods of determining an identity and/or tag signature of an RFID tag are described. In an example embodiment, an unclonable chipless RFID tag comprises a first tag portion comprising one or more first conductive members unremovably secured to a dielectric item; and a second tag portion comprising packaging conductive pattern. The first tag portion and the second tag portion are in a static or fixed physical relationship with respect to one another.
    Type: Application
    Filed: June 7, 2019
    Publication date: December 19, 2019
    Inventors: Mark M. Tehranipoor, Kun Yang, Domenic J. Forte, Ulbert Botero, Haoting Shen
  • Publication number: 20190347417
    Abstract: Disclosed are various embodiments for detecting hardware Trojans through information flow security verification. A file comprising register transfer level (HDL) code for an intellectual property core is loaded from memory. An asset within the intellectual property core is identified. An integrity verification or confidentiality verification of the HDL code that represents the asset is performed. An integrity violation or confidentiality violation within the HDL code as a result of performance of the integrity verification or confidentiality violation on the HDL code that represents the asset is detected. A malicious control point or a malicious observation point linked to the asset is identified. Finally, a trigger circuit for a hardware Trojan is identified in response to identification of the malicious control point or malicious observation point.
    Type: Application
    Filed: May 14, 2018
    Publication date: November 14, 2019
    Inventors: Mark M. Tehranipoor, Adib Nahiyan, Domenic J. Forte
  • Publication number: 20190311156
    Abstract: Circuits and methods for protecting against intellectual property piracy and integrated circuit piracy from an untrusted third party are provided. A circuit can include an original circuit and an obfuscated circuit incorporated into the original circuit and changing the output of the original circuit, wherein the obfuscated circuit is configured to recover the output of the original circuit by modifying the obfuscated circuit. In addition, a method of manufacturing a semiconductor device can include designing a circuit including an original circuit and an obfuscated circuit, and fabricating the circuit, wherein the obfuscated circuit is configured to change an output of the original circuit and to recover the output of the original circuit by modifying the obfuscated circuit.
    Type: Application
    Filed: June 15, 2017
    Publication date: October 10, 2019
    Inventors: Mark M. Tehranipoor, Domenic J. Forte, Bicky Shakya, Navid Asadizanjani
  • Publication number: 20190165935
    Abstract: Methods and integrated circuit architectures for assuring the protection of intellectual property between third party IP providers, system designers (e.g., SoC designers), fabrication entities, and assembly entities are provided. Novel design flows for the prevention of IP overuse, IP piracy, and IC overproduction are also provided. A comprehensive framework for forward trust between 3PIP vendors, SoC design houses, fabrication entities, and assembly entities can be achieved, and the unwanted modification of IP can be prevented.
    Type: Application
    Filed: June 14, 2017
    Publication date: May 30, 2019
    Inventors: Mark M. Tehranipoor, Domenic J. Forte, Ujjwal Guin
  • Patent number: 10283459
    Abstract: A semiconductor device can include a first metal trace, a first via disposed on the first metal trace, a second metal trace disposed on the first via, and an insulator interposed between the first metal trace and the first via. The insulator can be configured to lower an energy barrier or redistribute structure defects or charge carriers, such that the first metal trace and the first via are electrically connected to each other when power is applied. The semiconductor device can further include a dummy via disposed on the first metal trace.
    Type: Grant
    Filed: January 5, 2018
    Date of Patent: May 7, 2019
    Assignee: University of Florida Research Foundation, Incorporated
    Inventors: Swarup Bhunia, Haoting Shen, Mark M. Tehranipoor, Domenic J. Forte, Navid Asadizanjani
  • Patent number: 10181065
    Abstract: Chipless RFID tags and methods of using the same are provided. Each RFID tag provided herein can generate a unique and unclonable (unclonable chipless RFID, or UCR) identifier from its intrinsically random manufacturing process. The UCR device can monitor increase in storage temperature beyond that which is appropriate for a specific commodity to which the device is attached.
    Type: Grant
    Filed: October 27, 2017
    Date of Patent: January 15, 2019
    Assignee: University of Florida Research Foundation, Incorporated
    Inventors: Mark M. Tehranipoor, Haoting Shen, Kun Yang, Domenic J. Forte
  • Publication number: 20180197828
    Abstract: A semiconductor device can include a first metal trace, a first via disposed on the first metal trace, a second metal trace disposed on the first via, and an insulator interposed between the first metal trace and the first via. The insulator can be configured to lower an energy barrier or redistribute structure defects or charge carriers, such that the first metal trace and the first via are electrically connected to each other when power is applied. The semiconductor device can further include a dummy via disposed on the first metal trace.
    Type: Application
    Filed: January 5, 2018
    Publication date: July 12, 2018
    Inventors: Swarup Bhunia, Haoting Shen, Mark M. Tehranipoor, Domenic J. Forte, Navid Asadizanjani
  • Publication number: 20180166399
    Abstract: A method of assessing vulnerability of Integrated Circuit (IC) can include: preparing a list of logic nets of the IC; obtaining rectangular segments from the logic nets; finding a milling exclusion area based on a covering wire; and superimposing the found milling exclusion area onto the rectangular segments of the logic nets.
    Type: Application
    Filed: December 12, 2017
    Publication date: June 14, 2018
    Inventors: Mark M. Tehranipoor, Domenic J. Forte, Navid Asadizanjani, Qihang Shi
  • Publication number: 20180121689
    Abstract: Chipless RFID tags and methods of using the same are provided. Each RFID tag provided herein can generate a unique and unclonable (unclonable chipless RFID, or UCR) identifier from its intrinsically random manufacturing process. The UCR device can monitor increase in storage temperature beyond that which is appropriate for a specific commodity to which the device is attached.
    Type: Application
    Filed: October 27, 2017
    Publication date: May 3, 2018
    Inventors: Mark M. Tehranipoor, Haoting Shen, Kun Yang, Domenic J. Forte