Publications


Security

Translation of AADL Model to Security Attack Tree (TAMSAT) to SMART Evaluation of Monetary Security Risk
P. A. Wortman and J. Chandy
Information Security Journal: A Global Perspective, August 2022

Cache Locking and Encryption to Prevent Memory Snooping in Embedded Systems
J. Dejesus and J. Chandy
Proceedings of IEEE Conference on Dependable and Secure Computing Workshop on Privacy, Data Assurance, Security Solutions for Internet of Things, June 2022.

Extracting Vulnerabilities from GitHub Commits
N. Chan and J. Chandy
Proceedings of IEEE International Conference on Software Analysis, Evolution and Reengineering, March 2022.

Bit2RNG: Leveraging Bad-page Initialized Table with Bit-error Insertion for True Random Number Generation in Commodity Flash Memory
W. Yan H. Zhu, Z. Yu, Fatemeh Tehranipoor, J. Chandy, N. Zhang, and X. Zhang
Proceedings of IEEE International Symposium on Hardware Oriented Security and Trust, December 2020.

Exploring the Coverage of Existing Hardware Vulnerabilities in Community Standards
P. A. Wortman, Fatemeh Tehranipoor, and J. Chandy
Proceedings of Silicon Valley Cybersecurity Conference, pp. 87-97, December 2020.

FLASH: FPGA Locality Associated Secure Hash for Nearest Neighbor Search and Clustering Application
W. Yan, Fatemeh Tehranipoor, X. Zhang, and J. Chandy
Proceedings of International Conference on Field-Programmable Logic and Applications, pp. 249-253, September 2020.

A Holistic Approach to Cyber Physical Systems Security and Resilience
D. DiMase, Z.A. Collier, John Chandy, B.S. Cohen, G. D’Anna, H. Dunlap, J. Hallman, J. Mandelbaum, J. Ritchie, and L. Vessels
IEEE Systems Security Symposium, pp. 1-8, July 2020.

Physical Unclonable Functions for Authenticating and Preventing Reverse Engineering of Integrated Circuits and Electronics Hardware
S. Enamul Quadir
Ph.D. Dissertation, Electrical and Computer Engineering, University of Connecticut. May 2020.

SMART: security model adversarial risk-based tool for systems security design evaluation
P. A. Wortman and J. Chandy
Journal of Cybersecurity, vol. 6, no. 1, February 2020.

Embedded Systems Authentication and Encryption using Strong PUF Modeling
S. Enamul Quadir and John.A. Chandy
International Conference on Consumer Electronics, Jan. 2020.

Engineering for Vehicle Cybersecurity
D. DiMase, Z.A. Collier, J. A. Chandy, P. Bronn, K. Heffner and S. Walters.
in Cybersecurity for Commercial Vehicles SAE. 2019.

Practicality and Application of the Algebraic Side-Channel Attack
Chujiao Ma
Ph.D. Dissertation, Computer Science and Engineering, University of Connecticut. Dec. 2018.

P2M-based security model: security enhancement using combined PUF and PRNG models for authenticating consumer electronic devices
Paul Wortman, Wei Yan, John A. Chandy, and Fatemeh Tehranipoor in IET Computers and Digital Techniques, vol. 12, no. 66, pp. 289-296, November 2018.

Low Pass Filter PUF: Authentication of Printed Circuit Boards Based on Resistor and Capacitor Variations
S. Enamul Quadir and John A. Chandy.
International Journal of High Speed Electronics and Systems, vol 27. Sept./Dec. 2018.

Reliable Physical Unclonable Function Design and Algorithms for Authentication and Key Generation
Wei Yan
Ph.D. Dissertation, Electrical Engineering, University of Connecticut. Aug. 2018.

Phase Calibrated Ring Oscillator PUF Design and Application
Wei Yan and John Chandy
Computers, vol 7. July 2018.

DVFT: A Lightweight Solution for Power Supply Noise-based TRNG using Dynamic Voltage Feedback Tuning System
F. Tehranipoor, P. Wortman, N. Karimian, W. Yan, and J. A. Chandy
in IEEE Transactions on VLSI Systems, vol. 26, no. 6, pp. 1084-1097, June 2018

An Adversarial Risk-based Approach for Network Architecture Security Modeling and Design
P. A. Wortman and John A. Chandy
in Proceedings of Cyber Security 2018. Jun 2018.

Framework for Design Exploration of Secure Embedded System Development
Paul A. Wortman, Fatemeh Tehranipoor and John A. Chandy.
in Proceedings of Conference on Systems Engineering Research. May 2018.

An Overview of DRAM-Based Security Primitives
N.A. Anagnostopoulos, S. Katzenbeisser, J. Chandy, and F. Tehranipoor
in Cryptography , vol. 2(2), no. 7, March 2018

Low-cost Authentication Paradigm for Consumer Electronics Within the Internet of Wearable Fitness Tracking Applications
Fatemeh Tehranipoor, Nima Karimian, Paul A. Wortman, and John A. Chandy
in Proceedings of IEEE International Conference on Consumer Electronics, January 2018.

Exploring Methods of Authentication for the Internet of Things
F. Tehranipoor, N. Karimian, P.A. Wortman, A. Haque, J. Fahrny, and J. A. Chandy
in Internet of Things: Challenges, Advances, and Applications, ed. By Q.F. Hassan, A.u.R. Khan, and S.A. Madani, 2018.

Influence of Error and Hamming Weights on ASCA
C. Ma, J. Chandy, L. Michel, F. Liu and W. Cruz.
in Proceedings of International Conference on Information Security and Cryptology. November 2017.

Phase calibrated ring oscillator PUF design and implementation on FPGAs
Wei Yan, Chenglu Jin, Fatemeh Tehranipoor, and John A. Chandy
in Proceedings of International Conference on Field-Programmable Logic and Applications, Ghent, Belgium, Sept. 2017.

PUF-based Fuzzy Authentication without Error Correcting Codes
Wei Yan, Fatemeh Tehranipoor, and John A. Chandy
in IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems, vol. 36, no. 9, pp. 1445-1457, Sept. 2017.

Design and Architecture of Hardware-based Random Function Security Primitives
Fatemeh Tehranipoor
Ph.D. Dissertation, Electrical Engineering, University of Connecticut. Aug. 2017.

DRNG: DRAM-based random number generation using its startup value behavior
Charles Eckert, Fatemeh Tehranipoor, and John A. Chandy
in Proceedings of IEEE International Midwest Symposium on Circuits and Systems, Boston, MA, August 2017.

Insights into the Potential Usage of the Initial Values of DRAM Arrays of Commercial Off-the-Shelf Devices for Security Applications
N. A. Anagnostopoulos, Andre Schaller, Yufan Fan, Wenjie Xiong, Fatemeh Tehranipoor, Tolga Arul, Sebastian Gabmeyer, Jakub Szefer, John A. Chandy and Stefan Katzenbeisser.
in 2017 Crypto-Day Proceedings. Jun 2017.

Algebraic Side-Channel Attack on Twofish
Chujiao Ma, John A. Chandy, and Zhijie Shi
in Journal of Internet Services and Information Security, vol. 7, no. 2, pp. 32-43, May 2017.

Investigation of DRAM PUFs reliability under device accelerated aging effects
Fatemeh Tehranipoor, Nima Karimian, Wei Yan, and John A. Chandy
in Proceedings of IEEE International Symposium on Circuits and Systems, May 2017.

CHASE Survey of Technology Needs
S. Enamul Quadir, Daniel DiMase and John A. Chandy
in GOMACTech. March 2017.

DRAM-Based Intrinsic Physically Unclonable Functions for System-Level Security and Authentication
Fatemeh Tehranipoor, Nima Karimian, Wei Yan, and John A. Chandy
in IEEE Transactions on VLSI Systems, vol. 25, no. 3, pp. 1085-1097, March 2017.

Proposing a modeling framework for minimizing security vulnerabilities in IoT systems in the healthcare domain
Paul A. Wortman, Fatemeh Tehranipoor, Nima Karimian and John A. Chandy
in Proceedings of IEEE EMBS International Conference on Biomedical and Health Informatics, February 2017.

A Study of Power Supply Variation as a Source of Random Noise
Fatemeh Tehranipoor, Nima Karimian, Wei Yan, and John A. Chandy
in Proceedings of IEEE International Conference on VLSI Design, January 2017.

A Survey on Chip to System Reverse Engineering
S.E. Quadir, J. Chen, D. Forte, N. Asadizanjani, S. Shahbazmohamadi, L. Wang, John Chandy, and M. Tehranipoor in ACM Journal on Emerging Technologies in Computing Systems, vol. 13, no. 1, article 6, May 2016

Robust hardware true random number generators using DRAM remanence effects
Fatemeh Tehranipoor, Wei Yan, and John A. Chandy
in Proceedings of IEEE International Symposium on Hardware Oriented Security and Trust, McLean, VA, pp. 79-84, May 2016.

A Novel Way to Authenticate Untrusted Integrated Circuits
Wei Yan, Fatemeh Tehranipoor, and John A. Chandy
in Proceedings of International Conference on Computer-Aided Design, Austin, TX, pp. 132-138, November 2015.

Hardware Hacking: An Approach to Trustable Computing Systems Security Education
John A. Chandy, Zhijie Shi, Mohammad Tehranipoor, Megan Welsh, Chujiao Ma, Qihang Shi, and Ujjwal Guin
in Colloquium for Information Systems Security Education, Las Vegas, NV, June 2015.

DRAM based Intrinsic Physical Unclonable Functions for System Level Security
Fatemeh Tehranipoor, Nima Karimian, Kan Xiao, and John A. Chandy
in Proceedings of ACM Great Lakes Symposium on VLSI,Pittsburgh, PA,pp. 15-20, May 2015.


Storage Systems

A Trace-Based Study of SMB Network File System Workloads in an Academic Enterprise Environment
Paul A. Wortman.
M.S. Thesis, Electrical Engineering, University of Connecticut. Aug. 2020.

A Trace-Based Study of SMB Network File System Workloads in an Academic Enterprise
Paul A. Wortman and John.A. Chandy
Proceedings of International Symposium on Performance Evaluation of Computer and Telecommunication Systems, July 2020.

Adding Data Analytics Capabilities to Scaled-out Object Store
Cengiz Karakoyunlu, John A. Chandy, and Alma Riska in Journal of Systems and Software, vol. 121, pp. 16-27, November 2016.

Optimizations for Energy-Aware, High-Performance and Reliable Distributed Storage Systems
Cengiz Karakoyunlu.
Ph.D. Dissertation, Electrical Engineering, University of Connecticut. May 2016.

Exploiting User Metadata for Energy-Aware Node Allocation in a Cloud Storage System
Cengiz Karakoyunlu and John A. Chandy
in Journal of Computer and System Sciences, vol. 82, no. 2, pp. 282-309, March 2016.

Leveraging Checkpoint/Restore to Optimize Utilization of Cloud Compute Resources
Rohit Mehta and John A. Chandy
in Proceedings of IEEE Workshop on Cloud-Based Networks and ApplicationsClearwater Beach, FL, pp. 714-721, October 2015.

Using an Object-Based Active Storage Framework to Improve Parallel Storage
Cengiz Karakoyunlu, Michael Runde, and John A. Chandy
in Proceedings of Workshop on Interfaces and Architectures for Scientific Data Storage Minneapolis, MN, Sept. 2014.

Creating a programmable object storage stack
Orko Momin, Cengiz Karakoyunlu, Michael T. Runde, and John A. Chandy
in Proceedings of the Programmable File Systems Workshop , Vancouver, CANADA, June 2014.

An object interface storage node for clustered file systems
Orko Momin and John A. Chandy
in Proceedings of IEEE Cluster Computing, Indianapolis, IN, September 2013.

Optimizations on a Parallel File System Integrated with Object-Based Storage Devices
Cengiz Karakoyunlu and John A. Chandy
in Proceedings of IEEE Cluster Computing, Indianapolis, IN, September 2013.

A Case for Optimistic Coordination in HPC Storage Systems
Philip Carns, Kevin Harms, Dries Kimpe, Robert Ross, Justin Wozniak, Lee Ward, Matthew Curry, Ruth Klundt, Geoff Danielson, Cengiz Karakoyunlu, John Chandy, Bradley Settlemeyer, and William Gropp
in Proceedings of Petascale Data Storage Workshop, Salt Lake City, UT, November 2012.

Active Storage and SSD Caching in an Object Storage Environment
Michael T. Runde.
M.S. Thesis, Electrical Engineering, University of Connecticut. Aug. 2012.

Techniques for an Energy Aware Parallel File System
Cengiz Karakoyunlu and John A. Chandy
in Proceedings of International Green Computing Conference: Energy Consumption and Reliability of Storage Systems, San Jose, CA, pp. 13-17, June 2012.

An Active Storage Framework for Object Storage Devices
Michael T. Runde, Wesley G. Stevens, Paul A. Wortman, and John A. Chandy
in Proceedings of IEEE Conference on Massive Data Storage, Pacific Grove, CA, April 2012.

Extendable Storage Framework for Reliable Clustered Storage Systems
Sumit Narayan
Ph.D. Dissertation, Electrical Engineering, University of Connecticut. Aug. 2010.

User space storage system stack modules with file level control
Sumit Narayan, Rohit K. Mehta, and John A. Chandy
in Proceedings of the Annual Linux Symposium, July 2010

I/O Characterization on a Parallel File System
Sumit Narayan and John A. Chandy
in Proceedings of the International Symposium on Performance Evaluation of Computer and Telecommunication Systems, July 2010

Extendable storage framework for reliable clustered storage systems
Sumit Narayan and John A. Chandy
in Proceedings of IEEE IPDPS PhD Forum. June 2010.

Uncovering Errors: The Cost of Detecting Silent Data Corruption
Sumit Narayan, John A. Chandy, Sam Lang, Philip Carns, and Rob Ross
in Proceedings of the 4th Petascale Data Storage Workshop (PDSW) held in conjunction with IEEE/ACM Supercomputing 2009, Portland, OR. November 2009.

ATTEST: ATTribute-based Extendable STorage
Sumit Narayan and John A. Chandy
in Journal of Systems and Software, vol. 83, no. 4, pp. 548-556, November 2009.

FEARLESS: Flash Enabled Active Replication of Low End Survivable Storage
Vamsi Kundeti and John A. Chandy
in Proceedings of the International Workshop on Integrating Solid-state Memory into the Storage Hierarchy (WISH), Washington, DC, March 2009.

Active Storage for Database Applications
Tina Miriam John
M.S. Thesis, Electrical Engineering, University of Connecticut. Dec. 2008.

RAID0.5: Design and Implementation of a Low Cost Disk Array Data Protection Architecture
John A. Chandy
in Journal of Supercomputing, vol. 46, no. 2, pp. 108-123, November 2008.

Active Storage using Object-Based Devices
Tina Miriam John, Anuradharthi Thiruvenkata Ramani, and John A. Chandy
in Proceedings of International Workshop on High Performance I/O Systems and Data Intensive Computing (HiperIO), Tsukuba, Japan, October 2008.

A Generalized Replica Placement Strategy to Optimize Latency in a Wide Area Distributed Storage System
John A. Chandy
in Proceedings of International Workshop on Data Aware Distributed Computing, Boston, MA, June 2008.

Dual Actuator Logging Disk Architecture and Modeling
John A. Chandy
in Journal of Systems Architecture, Vol. 53, No. 12, pages 913-926, December 2007.

Parity Redundancy in a Clustered Storage System
Sumit Narayan and John A. Chandy
in Proceedings of International Workshop on Storage and Network Architecture and Parallel I/Os, San Diego, CA, Sept. 2007

Reliability Tradeoffs in Personal Storage Systems
John A. Chandy and Sumit Narayan
in ACM Operating Systems Review, Vol. 41, No. 1, pages 37-41, January 2007.

RAID0.5: Active Data Replication for Low Cost Disk Array Data Protection
John A. Chandy
in Proceedings of International Conference on Parallel and Distributed Processing Techniques and Applications, Las Vegas, NV, pp. 963-969, June 2006.

Storage Allocation in Unreliable Peer-to-Peer Systems
John A. Chandy
in Proceedings of International Conference on Dependable Systems and Networks, Philadelphia, PA, June 2006, pp. 227-236.

A Quorum Based Content Delivery Architecture
Michael P. Kapralos and John A. Chandy
in Proceedings of International Conference on Parallel and Distributed Processing Techniques and Applications, Las Vegas, NV, June 2005.

File System Optimization using Block Reorganization Techniques
Sumit Narayan
M.S. Thesis, Electrical Engineering, University of Connecticut. Dec. 2004.

Trace Based Analysis of File System Effects on Disk I/O
Sumit Narayan and John A. Chandy
in Proceedings of International Symposium on Performance Evaluation of Computer and Telecommunication Systems, San Jose, CA, July 2004

Parity Redundancy Strategies in a Large Scale Distributed Storage System
John A. Chandy
in Proceedings of IEEE Conference on Mass Storage Systems and Technologies, Adelphi, MD, April 2004, pp. 185-192

Data Integrity in a Distributed Storage System
Jonathan D. Bright and John A. Chandy
in Proceedings of International Conference on Parallel and Distributed Processing Techniques and Applications, Las Vegas, NV, June 2003.

A Dual Actuator Logging Disk Architecture
John A. Chandy
in Proceedings of IASTED International Conference on Computer Science and Technology, Cancun, Mexico, May 2003.


Reconfigurable Computing

HOTMeTaL: Hardware Optimization Tool for Memory Table and Logic Conversion
Michael Kapralos and John A. Chandy
in Proceedings of the ACM/SIGDA International Symposium on Field-Programmable Gate Arrays, February 2019.

Active Storage Networks: Using Embedded Computation in the Network Switch for Cluster Data Processing
Janardhan Singaraju, Ajithkumar Thamarakuzhi and John A. Chandy
in Future Generation Computer Systems, vol. 45, pp. 149-160, April 2015.

Reconfigurable Processing Architectures for Stream Processing and Hybrid Computing
Janardhan Singaraju.
Ph.D. Dissertation, Electrical Engineering, University of Connecticut. Dec. 2011.

Active Storage Networks for Accelerating K-Means Data Clustering
Janardhan Singaraju and John A. Chandy
in Proceedings of the Symposium on Applied Reconfigurable Computing, March 2011

Parallel data sort using networked FPGAs
Janardhan Singaraju and John A. Chandy
in Proceedings of the International Conference on ReConFigurable Computing and FPGAs, December 2010

Scaling the NetFPGA switch using Aurora over SATA
Ajithkumar Thamarakuzhi and John A. Chandy
in Proceedings of the NetFPGA Developers Workshop, August 2010

Hardware parallelism vs. software parallelism
John A. Chandy and Janardhan Singaraju
in Proceedings of the USENIX Workshop on Hot Topics in Parallelism (HotPar), Berkeley, CA, March 2009

FPGA Based String Matching for Network Processing Applications
Janardhan Singaraju and John A. Chandy
in Microprocessors and Microsystems, Vol. 32, No. 4, pages 210-222, June 2008.

A Case for Active Storage Networks in High Performance Computing
John A. Chandy
in Proceedings of Boston Area Architecture Workshop, pages 23–24. Jan. 2007.

A CAM-based Keyword Match Processor Architecture
Long Bu and John A. Chandy
in Microelectronics Journal, Vol. 38, No. 8, pages 828-836, August 2006.

A Generic Lookup Cache Architecture for Network Processing Applications
Janardhan Singaraju and John A. Chandy
in Proceedings of International Conference on Engineering of Reconfigurable Systems and Algorithms, Las Vegas, NV, pp. 247-248, June 2006.

Signature Match Processor for Network Processing Applications
Janardhan Singaraju
M.S. Thesis, Electrical Engineering, University of Connecticut. May 2006.

A Signature Match Processor Architecture for Network Intrusion Detection
Janardhan Singaraju, Long Bu and John A. Chandy
in Proceedings of IEEE Symposium on Field-Programmable Custom Computing Machines, Napa, CA, April 2005

A Keyword Match Processor Architecture Using Content Addressable Memory
Long Bu and John A. Chandy
in Proceedings of Great Lakes Symposium on VLSI, Boston, MA, April 2004

FPGA Based Network Intrusion Detection using Content Addressable Memories
Long Bu and John A. Chandy
in Proceedings of IEEE Symposium on Field-Programmable Custom Computing
Machines, Napa, CA, April 2004


Parallel Algorithms and Systems

An Analysis of Parallel Programming Techniques for Data Intensive Computation
Anuradharthi Thiruvenkata Ramani and John A. Chandy
in Proceedings of the International Conference on Parallel and Distributed Processing Techniques and Applications (PDPTA), Las Vegas, NV, July 2009

An Analysis of Resource Costs in a Public Computing Grid
John A. Chandy
in Proceedings of International Parallel and Distributed Processing Symposium Workshop on Desktop Grids and Volunteer Computing Systems. May 2009.

An Analysis of Parallel Programming Techniques for Data Intensive Computation
Anuradharthi Thiruvenkata Ramani
M.S. Thesis, Electrical Engineering, University of Connecticut. May 2009.

On-Chip Networks

A Non-blocking Switching Network and Routing Algorithm for On-Chip Networks
Ajithkumar Thamarakuzhi and John A. Chandy
in Procedia Engineering, vol. 30, pp. 997-1004, 2012.

2-Dilated Flattened Butterfly: A Nonblocking Switching Topology for High-Radix Networks
Ajithkumar Thamarakuzhi and John A. Chandy
in Computer Communications, vol. 34, no. 15, pp. 1822-1835, September 15, 2011.

Active Storage Networks: Topology, Routing, and Application
Ajithkumar Thamarakuzhi
Ph.D. Dissertation, Electrical Engineering, University of Connecticut. Aug. 2011.

Design and Implementation of a Nonblocking 2-Dilated Flattened Butterfly Switching Network
Ajithkumar Thamarakuzhi and John A. Chandy
in IEEE Latin America Transactions, vol. 9, no. 4, pp. 557-564, July 2011

Adaptive Load Balanced Routing for 2-Dilated Flattened Butterfly Switching Network
Ajithkumar Thamarakuzhi and John A. Chandy
in Proceedings of the International Conference on Networks, January 2011, Best Paper Award

Design and Implementation of a Nonblocking 2-Dilated Flattened Butterfly Switching Network
Ajithkumar Thamarakuzhi and John A. Chandy
in Proceedings of the IEEE Latin American Conference on Communications, September 2010

2-Dilated Flattened Butterfly: A Nonblocking Switching Network
Ajithkumar Thamarakuzhi and John A. Chandy
in Proceedings of the International Conference on High Performance Switching and Routing, June 2010

Misc

A design flow with integrated verification of requirements and faults in safety-critical systems
Wei Yan, Daniel Fontaine, John A. Chandy, and Laurent Michel
in Proceedings of System of Systems Engineering Conference, Hawaii, June 2017.