Fatemeh Tehranipoor
YOU?
Author Swipe
View article: A Universal Anti-Spoofing Approach for Contactless Fingerprint Biometric Systems
A Universal Anti-Spoofing Approach for Contactless Fingerprint Biometric Systems Open
With the increasing integration of smartphones into our daily lives, fingerphotos are becoming a potential contactless authentication method. While it offers convenience, it is also more vulnerable to spoofing using various presentation at…
View article: A Novel Probability-Based Logic-Locking Technique: ProbLock
A Novel Probability-Based Logic-Locking Technique: ProbLock Open
Integrated circuit (IC) piracy and overproduction are serious issues that threaten the security and integrity of a system. Logic locking is a type of hardware obfuscation technique where additional key gates are inserted into the circuit. …
View article: Intrinsic PUF Instance on Non-Volatile NAND Flash Memory
Intrinsic PUF Instance on Non-Volatile NAND Flash Memory Open
Embedded systems or micro controller based modules have become increasingly prevalent in our daily lives. However, the security of embedded devices as well as the authenticity of hardware has become an increasing concern within the growing…
View article: A novel IoT sensor authentication using HaLo extraction method and memory chip variability
A novel IoT sensor authentication using HaLo extraction method and memory chip variability Open
View article: A Novel IoT Sensor Authentication Using HaLo Extraction Method and\n Memory Chip Variability
A Novel IoT Sensor Authentication Using HaLo Extraction Method and\n Memory Chip Variability Open
In this paper, we propose flash-based hardware security primitives as a\nviable solution to meet the security challenges of the IoT and specifically\ntelehealth markets. We have created a novel solution, called the High and Low\n(HaLo) met…
View article: Flash-Based Security Primitives: Evolution, Challenges and Future Directions
Flash-Based Security Primitives: Evolution, Challenges and Future Directions Open
Over the last two decades, hardware security has gained increasing attention in academia and industry. Flash memory has been given a spotlight in recent years, with the question of whether or not it can prove useful in a security role. Bec…
View article: ProbLock: Probability-based Logic Locking
ProbLock: Probability-based Logic Locking Open
Integrated circuit (IC) piracy and overproduction are serious issues that threaten the security and integrity of a system. Logic locking is a type of hardware obfuscation technique where additional key gates are inserted into the circuit. …
View article: Deep K-TSVM: A Novel Profiled Power Side-Channel Attack on AES-128
Deep K-TSVM: A Novel Profiled Power Side-Channel Attack on AES-128 Open
The appearance of deep neural networks for Side-Channel leads to strong power analysis techniques for detecting secret information of physical cryptography implementations. Generally, deep learning techniques do not suffer the difficulties…
View article: Attacks on Lightweight Hardware-Based Security Primitives
Attacks on Lightweight Hardware-Based Security Primitives Open
In today's digital age, the ease of data collection, transfer, and storage continue to shape modern society and the ways we interact with our world. The advantages are numerous, but there is also an increased risk of information unintentio…
View article: DRAMNet: Authentication based on Physical Unique Features of DRAM Using Deep Convolutional Neural Networks
DRAMNet: Authentication based on Physical Unique Features of DRAM Using Deep Convolutional Neural Networks Open
Nowadays, there is an increasing interest in the development of Autonomous Vehicles (AV). However, there are two types of attack challenges that can affect AVs and are yet to be resolved, i.e., sensor attacks and vehicle access attacks. Th…
View article: Towards Implementation of Robust and Low-Cost Security Primitives for Resource-Constrained IoT Devices
Towards Implementation of Robust and Low-Cost Security Primitives for Resource-Constrained IoT Devices Open
In recent years, due to the trend in globalization, system integrators have had to deal with integrated circuit (IC)/intellectual property (IP) counterfeiting more than ever. These counterfeit hardware issues counterfeit hardware that have…
View article: An Overview of DRAM-Based Security Primitives
An Overview of DRAM-Based Security Primitives Open
Recent developments have increased the demand for adequate security solutions, based on primitives that cannot be easily manipulated or altered, such as hardware-based primitives. Security primitives based on Dynamic Random Access Memory (…
View article: Deep RNN-Oriented Paradigm Shift through BOCANet: Broken Obfuscated Circuit Attack
Deep RNN-Oriented Paradigm Shift through BOCANet: Broken Obfuscated Circuit Attack Open
This is the first work augmenting hardware attacks mounted on obfuscated circuits by incorporating deep recurrent neural network (D-RNN). Logic encryption obfuscation has been used for thwarting counterfeiting, overproduction, and reverse …
View article: Addressing the Effects of Temperature Variations on Intrinsic Memory-Based Physical Unclonable Functions
Addressing the Effects of Temperature Variations on Intrinsic Memory-Based Physical Unclonable Functions Open
View article: Insights into the Potential Usage of the Initial Values of DRAM Arrays of Commercial Off-the-Shelf Devices for Security Applications
Insights into the Potential Usage of the Initial Values of DRAM Arrays of Commercial Off-the-Shelf Devices for Security Applications Open
View article: Design and Architecture of Hardware-based Random Function Security Primitives
Design and Architecture of Hardware-based Random Function Security Primitives Open
In recent years, security has grown into a critical issue in modern information systems. Electronic hardware security, in particular, has emerged as one of the most serious challenges due to electronic devices penetrating every aspect of o…