Md Tauhidur Rahman

Md Tauhidur Rahman
Florida International University | FIU · Department of Electrical and Computer Engineering

PhD, University of Florida

About

56
Publications
16,959
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
961
Citations
Citations since 2017
38 Research Items
817 Citations
2017201820192020202120222023050100150
2017201820192020202120222023050100150
2017201820192020202120222023050100150
2017201820192020202120222023050100150
Additional affiliations
August 2012 - August 2015
University of Connecticut
Position
  • Research Assistant
August 2012 - August 2015
University of Connecticut
Position
  • Research Assistant
August 2011 - July 2012
University of Alabama at Birmingham
Position
  • Research Assistant

Publications

Publications (56)
Preprint
Full-text available
The massive trend toward embedded systems introduces new security threats to prevent. Malicious firmware makes it easier to launch cyberattacks against embedded systems. Systems infected with malicious firmware maintain the appearance of normal firmware operation but execute undesirable activities, which is usually a security risk. Traditionally, c...
Conference Paper
The massive trend toward embedded systems introduces new security threats to prevent. Malicious firmware makes it easier to launch cyberattacks against embedded systems. Systems infected with malicious firmware maintain the appearance of normal firmware operation but execute undesirable activities, which is usually a security risk. Traditionally, c...
Article
Full-text available
The cells in dynamic random access memory (DRAM) degrade over time as a result of aging, leading to poor performance and potential security vulnerabilities. With a globalized horizontal supply chain, aged counterfeit DRAMs could end up on the market, posing a significant threat if employed in critical infrastructure. In this work, we look at the re...
Preprint
Full-text available
Electronic counterfeiting is a longstanding problem with adverse long-term effects for many sectors, remaining on the rise. This article presents a novel low-cost technique to embed watermarking in devices with resistive-RAM (ReRAM) by manipulating its analog physical characteristics through switching (set/reset) operation to prevent counterfeiting...
Article
Full-text available
Approximate computing (AC) leverages the inherent error resilience and is used in many big-data applications from various domains such as multimedia, computer vision, signal processing, and machine learning to improve systems performance and power consumption. Like many other approximate circuits and algorithms, the memory subsystem can also be use...
Article
Full-text available
As digital assets grow in value tremendously, the electronic cybersystems must become more secure. Physical attacks on electronic systems have been widely used to hack, then steal or modify assets in a criminal manner. These attacks are possible if adversaries gain physical access to the secure cybersystem. Therefore, a solution to protect the syst...
Preprint
Universal Adversarial Perturbations are image-agnostic and model-independent noise that when added with any image can mislead the trained Deep Convolutional Neural Networks into the wrong prediction. Since these Universal Adversarial Perturbations can seriously jeopardize the security and integrity of practical Deep Learning applications, existing...
Article
Memory-based physical unclonable functions (mPUFs) are widely accepted as highly secure because of the unclonable and immutable nature of manufacturer process variations. Although numerous successful attacks have been proposed against PUFs, mPUFs are resistant to non-invasive attacks as the mPUF does not support the open-access protocol. Hence, exi...
Preprint
Full-text available
Many commercially available memory chips are fabricated worldwide in untrusted facilities. Therefore, a counterfeit memory chip can easily enter into the supply chain in different formats. Deploying these counterfeit memory chips into an electronic system can severely affect security and reliability domains because of their sub-standard quality, po...
Preprint
Approximate computing (AC) leverages the inherent error resilience and is used in many big-data applications from various domains such as multimedia, computer vision, signal processing, and machine learning to improve systems performance and power consumption. Like many other approximate circuits and algorithms, the memory subsystem can also be use...
Chapter
Memory chips play a critical role in performance and energy because they are the fundamental bottlenecks in computing systems. Several emerging memory chips such as Magneto-resistive Random-Access Memory (MRAM), Resistive RAM (ReRAM), Phase Change Memory (PCM), and Ferroelectric RAM (FRAM) have been proposed to replace mainstream memory chips to ov...
Preprint
The emerging magneto-resistive RAM (MRAM) has considerable potential to become a universal memory technology because of its several advantages: unlimited endurance, lower read/write latency, ultralow-power operation, high-density, and CMOS compatibility, etc. This paper will demonstrate an effective technique to generate random numbers from energy-...
Poster
Full-text available
In a modern computing system, memories play an essential role in performance and energy. Emerging memories possess several advantageous features that endorse them appropriate for Hardware-based security primitives. These solutions can guarantee performance enhancement by ensuring enough protection.
Chapter
Memory chips play a critical role in performance and energy because they are the fundamental bottlenecks in computing systems. Several emerging memory chips such as Magneto-resistive Random-Access Memory (MRAM), Resistive RAM (ReRAM), Phase-Change Memory (PCM), and Ferroelectric RAM (FRAM) have been proposed to replace mainstream memory chips to ov...
Article
Full-text available
True random number generation (TRNG) plays an important role in security applications and protocols. In this article, we propose an effective technique to generate a robust true random number using emerging, energy-efficient, nonvolatile, consumer-off-the-shelf (COTS) ferroelectric random access memory (FRAM) chips. In the proposed method, we extra...
Article
This article demonstrates a novel technique for generating aging-resistant, physical unclonable function (PUF) using commercial off-the-shelf NAND flash memory chips. The technique utilizes a novel "program-disturb" method using a single memory page to extract the inherent process variations unique to each chip. In addition, it employs an adaptivel...
Preprint
Full-text available
Due to the globalization in the semiconductor supply chain, counterfeit dynamic random-access memory (DRAM) chips/modules have been spreading worldwide at an alarming rate. Deploying counterfeit DRAM modules into an electronic system can have severe consequences on security and reliability domains because of their sub-standard quality, poor perform...
Article
Full-text available
Physically Unclonable Functions (PUFs) are potential security blocks to generate unique and more secure keys in low-cost cryptographic applications. Dynamic random-access memory (DRAM) has been proposed as one of the promising candidates for generating robust keys. Unfortunately, the existing techniques of generating device signatures from DRAM is...
Poster
Full-text available
Due to the globalization of semiconductor, a counterfeit static random-access memory (SRAM) chip can enter into the market in different formats at different levels: recycled, remarked, cloned, and tampered are few examples. A counterfeit SRAM chip has been a major threat for their inferior quality or poor reliability; especially when they are used...
Conference Paper
Full-text available
With the globalization of the semiconductor manufacturing process, electronic devices are powerless against malicious modification of hardware in the supply chain. The ever-increasing threat of hardware Trojan attacks against integrated circuits has spurred a need for accurate and efficient detection methods. Ring oscillator network (RON) is used t...
Conference Paper
Full-text available
With the horizontal model for the modern IC supply chain, IC piracy may take place at untrusted foundry and assembly, by overproducing, shipping out-of-spec/defective devices, or reverse engineering. To protect IC design house from revenue loss, in this paper, a novel dynamically obfuscated wrapper for the secure split test (DOST) is presented, whi...
Article
Full-text available
Counterfeiting electronic components is a serious problem for the security and reliability of any electronic systems. Unfortunately, the number of counterfeit components has increased considerably after the introduction of horizontal semiconductor supply chain. In this paper, we propose and experimentally demonstrate an approach for detecting recyc...
Preprint
Physically Unclonable Functions (PUFs) are potential security blocks to generate unique and more secure keys in low-cost cryptographic applications. Memories have been popular candidates for PUFs because of their prevalence in the modern electronic systems. However, the existing techniques of generating device signatures from DRAM is very slow, des...
Preprint
Full-text available
True random number generator (TRNG) plays a vital role in cryptography to ensure confidentiality, integrity, and safety in modern electronic systems because their failure can endanger privacy and undermine the viability of cyber-physical systems. However, the security of such systems depends on the quality of the TRNG. Unfortunately, existing Dynam...
Article
With the modern semiconductor supply chain, the ownership of both intellectual property (IP) and integrated circuit (IC) cannot be guaranteed. The IP piracy may take place at the untrusted IC designer or untrusted foundry without the knowledge of the original IP owner. The untrusted foundry can also perform IC piracy with reverse engineering of GDS...
Preprint
Full-text available
Counterfeiting electronic components is a serious problem for the security and reliability of any electronic systems. Unfortunately, the number of counterfeit components has increased considerably after the introduction of horizontal semiconductor supply chain. In this paper, we propose a new method for detecting recycled Flash memory, a major targ...
Article
With the rapid growth of the electronics market, counterfeiting of integrated circuits (ICs), in particular IC recycling, has become a serious issue in recent years. Recycled ICs are those harvested from old systems and resold in the supply chain as new. Such ICs exhibit lower performance and shorter lifetime and, as a result, pose threats to the s...
Article
Full-text available
A physical unclonable function (PUF) is a structure that produces a unique response, with an issued challenge (input), which can be used as an identifier or a cryptographic key. SRAM PUFs create unique responses upon power up as certain SRAM cells output a “1” or “0” with high probability due to uncontrollable process variations. A current challeng...
Chapter
High-test coverage is essential during integrated circuit (IC) testing in order to avoid production flaws. In order to test ICs, scan-based testing has been commonly used due to high coverage and simple infrastructures. However, IC testing has opened a gateway to new kinds of vulnerabilities that could potentially be used to breach the assets of a...
Article
Physical unclonable functions (PUFs) have emerged as a promising security primitive for low-cost authentication and cryptographic key generation. However, PUF stability with respect to temporal variations still limits its utility and widespread acceptance. Previous techniques in the literature have focused on improving PUF robustness against voltag...
Article
Full-text available
Physical unclonable functions (PUFs) have emerged as a promising hardware security primitive, but existing CMOS PUFs suffer from issues related to reliability and susceptibility to modeling attacks. Memristors, leveraging nanotechnology fabrication process and highly nonlinear behavior, pose as an interesting alternative. In this paper, we report t...
Conference Paper
Full-text available
Securing integrated circuits against malicious modifications (i.e., hardware Trojans) is of utmost importance, as hardware Trojans may leak information and reduce reliability of electronic systems in critical applications. In this paper, we use ring oscillators (ROs) to gather measurements of ICs that may contain hardware Trojans. To distinguish be...
Conference Paper
Full-text available
Memory-based physical unclonable functions (PUFs) are potential security blocks to generate unique key in low-cost cryptographic applications. PUFs have been proposed as a more secure alternative to secret key storage because of their unclonability and built-in tamper evidence. PUFs consist of inherently unclonable physical systems. PUFs are physic...
Conference Paper
The globalization of the semiconductor design and fabrication industry (also known as the horizontal business model) has led to many well-documented issues associated with untrusted foundries and assemblies, including IC overproduction, cloning, and the shipping of improperly or insufficiently tested chips. Besides the loss in profits to Intellectu...
Article
True random number generators (TRNGs) are needed for a variety of security applications and protocols. The quality (randomness) of TRNGs depends on sensitivity to random noise, environmental conditions, and aging. Random sources of noise improve TRNG quality. In older or more mature technologies, the random sources are limited resulting in low TRNG...
Conference Paper
Physically Unclonable Functions (PUFs) are impacted by environmental variations and aging which can reduce their acceptance in identification and authentication applications. Prior approaches to improve PUF reliability include bit analysis across environmental conditions, better design, and post-processing error correction, but these are of high co...
Conference Paper
With the high costs associated with modern IC fabrication, most semiconductor companies have gone fabless, i.e., they outsource manufacturing of their designs to contract foundries. This horizontal business model has led to many well documented issues associated with untrusted foundries including IC overproduction and shipping improperly or insuffi...
Conference Paper
Physically Unclonable Functions (PUFs) have emerged as a security block with the potential to generate chip-specific identifiers and cryptographic keys. However it has been shown that the stability of these identifiers and keys is heavily impacted by aging and environmental variations. Previous techniques have mostly focused on improving PUF robust...
Conference Paper
Counterfeit ICs can have a major impact on the security and reliability of critical applications. This paper presents a method called Secure Split-Test (SST) for securing the manufacturing process to prevent counterfeits, allowing intellectual property (IP) owners to protect and meter their IPs. This is done by requiring test results to be verified...
Conference Paper
Full-text available
Content-addressable memory (CAM) is an essential component for high-speed lookup intensive applications. This paper presents a match-line charging technique to increase performance while reducing power. Simulations in TSMC 0.18µm technology with 64 × 72 ternary CAM show the match-line power reduction of over 51% compared to the conventional current...

Network

Cited By