Patents by Inventor Mohammad Tehranipoor

Mohammad Tehranipoor has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 9218506
    Abstract: Provided are methods and systems for preventing hardware Trojan insertion. An example method can comprise determining unused space in an integrated circuit (IC), selecting a plurality of built-in self-authentication (BISA) filler cells based on the determined unused space, and placing the selected plurality of BISA filler cells onto the unused space. The plurality of BISA filler cells can be connected to form a plurality of BISA blocks. The plurality of BISA blocks can correspond to a plurality of signatures. A modification of one or more BISA filler cell can lead to an alteration of one or more signatures.
    Type: Grant
    Filed: March 11, 2014
    Date of Patent: December 22, 2015
    Assignee: University of Connecticut
    Inventors: Mohammad Tehranipoor, Kan Xiao
  • Patent number: 9071428
    Abstract: Provided are methods, systems, and devices for preventing hardware piracy.
    Type: Grant
    Filed: March 17, 2014
    Date of Patent: June 30, 2015
    Assignee: University of Connecticut
    Inventors: Mohammad Tehranipoor, Nicholas Tuzzio
  • Publication number: 20140365148
    Abstract: Provided are methods and systems for test power analysis. An example method can comprise creating a test pattern from topology data of an integrated circuit and creating a map from the topology data of the integrated circuit. A test power analysis of the integrated circuit can be performed using the created test pattern and the map. In an aspect, an example method can comprise obtaining transition information via monitoring transitions of a plurality of test cycles in a test session of an integrated circuit. Simulation data can be obtained via simulating a plurality of functions of the plurality of test cycles in the test session of the integrated circuit using the transition information. A test power analysis of the plurality of test cycles in the test session of the integrated circuit can be performed using the obtained simulation data.
    Type: Application
    Filed: April 1, 2014
    Publication date: December 11, 2014
    Inventors: Mohammad Tehranipoor, Wei Zhao
  • Publication number: 20140340112
    Abstract: Provided are methods, systems, and devices for preventing hardware piracy.
    Type: Application
    Filed: March 17, 2014
    Publication date: November 20, 2014
    Inventors: Mohammad Tehranipoor, Nicholas Tuzzio
  • Patent number: 8850608
    Abstract: Aspects of the disclosure relate to combining on-chip structure with external current measurements for threat detection in an integrated circuit. This method considers Trojans' impact on neighboring cells and on the entire IC's power consumption, and effectively localizes the measurement of dynamic power. An on-chip structure can permit threat detections. In one aspect, the on-chip structure can comprise a plurality of sensors distributed across the entirety of the IC, with each sensor of the plurality of sensors being placed in different rows of a standard-cell design. In another aspect, data analysis can permit separating effect of process variations on transient power usage of the IC from effects of a hardware threat such power usage. The on-chip structure also can be employed for implementation of a PE-PUF.
    Type: Grant
    Filed: March 7, 2012
    Date of Patent: September 30, 2014
    Assignee: University of Connecticut
    Inventors: Mohammad Tehranipoor, Xiaoxiao Wang, Xuehui Zhang
  • Publication number: 20140283147
    Abstract: Provided are methods and systems for preventing hardware Trojan insertion. An example method can comprise determining unused space in an integrated circuit (IC), selecting a plurality of built-in self-authentication (BISA) filler cells based on the determined unused space, and placing the selected plurality of BISA filler cells onto the unused space. The plurality of BISA filler cells can be connected to form a plurality of BISA blocks. The plurality of BISA blocks can correspond to a plurality of signatures. A modification of one or more BISA filler cell can lead to an alteration of one or more signatures.
    Type: Application
    Filed: March 11, 2014
    Publication date: September 18, 2014
    Inventors: Mohammad Tehranipoor, Kan Xiao
  • Publication number: 20140103344
    Abstract: An apparatus for detection of integrated circuit recovery is disclosed. An example apparatus can comprise a first sensor embedded in an integrated circuit. The example apparatus can comprise a second sensor embedded in the integrated circuit. The example apparatus can comprise a selector unit configured to select one of the first sensor or the second sensor. The example apparatus can also comprise a monitor unit configured to receive output signal from the first sensor and the second sensor and to supply the output signal to an analysis unit.
    Type: Application
    Filed: March 7, 2013
    Publication date: April 17, 2014
    Inventors: MOHAMMAD TEHRANIPOOR, Nicholas Tuzzio, Xuehui Zhang
  • Publication number: 20130019324
    Abstract: Aspects of the disclosure relate to combining on-chip structure with external current measurements for threat detection in an integrated circuit. This method considers Trojans' impact on neighboring cells and on the entire IC's power consumption, and effectively localizes the measurement of dynamic power. An on-chip structure can permit threat detections. In one aspect, the on-chip structure can comprise a plurality of sensors distributed across the entirety of the IC, with each sensor of the plurality of sensors being placed in different rows of a standard-cell design. In another aspect, data analysis can permit separating effect of process variations on transient power usage of the IC from effects of a hardware threat such power usage. The on-chip structure also can be employed for implementation of a PE-PUF.
    Type: Application
    Filed: March 7, 2012
    Publication date: January 17, 2013
    Applicant: University of Connecticut
    Inventors: Mohammad Tehranipoor, Xiaoxiao Wang, Xuehui Zhang