Issued Patents All Time
Showing 1–20 of 20 patents
| Patent # | Title | Co-Inventors | Date |
|---|---|---|---|
| 12026001 | LDO-based odometer to combat ic recycling | Nima Maghari, Michael Levin, Sreeja Chowdhury | 2024-07-02 |
| 11989273 | Biometric locking methods and systems for internet of things and the connected person | Damon Woodard, Fatemeh Ganji, Sumaiya Shomaji | 2024-05-21 |
| 11893742 | Accelerated segmentation for reverse engineering of integrated circuits | Damon Woodard, Navid Asadi-Zanjani, Ronald Wilson | 2024-02-06 |
| 11799673 | Hardness amplification of physical unclonable functions (PUFS) | Fatemeh Ganji, Shahin Tajik, Jean-Pierre Seifert, Mark M. Tehranipoor | 2023-10-24 |
| 11776093 | Automatic sharpness adjustment for imaging modalities | Damon Woodard, Navid Asadizanjani, Ronald Wilson | 2023-10-03 |
| 11657405 | Detection of recycled integrated circuits and system-on-chips based on degradation of power supply rejection ratio | Sreeja Chowdhury, Fatemeh Ganji, Nima Maghari | 2023-05-23 |
| 11611429 | Comprehensive framework for protecting intellectual property in the semiconductor industry | Mark M. Tehranipoor, Ujjwal Guin | 2023-03-21 |
| 11508857 | Optical scrambler with nano-pyramids | Haoting Shen, Navid Asadizanjani, Mark M. Tehranipoor | 2022-11-22 |
| 11475168 | CAD framework for power side-channel vulnerability assessment | Mark M. Tehranipoor, Adib Nahiyan, Jungmin Park | 2022-10-18 |
| 11270439 | Histogram-based method for auto segmentation of integrated circuit structures from SEM images | Navid Asadizanjani, Damon Woodard, Ronald Wilson | 2022-03-08 |
| 11270002 | Hardware trojan detection through information flow security verification | Mark M. Tehranipoor, Adib Nahiyan | 2022-03-08 |
| 11222098 | Protecting obfuscated circuits against attacks that utilize test infrastructures | Mark M. Tehranipoor, Farimah Farahmandi, Adib Nahiyan, Fahim Rahman, Mohammad Sazadur Rahman | 2022-01-11 |
| 11157675 | Method and apparatus for automatic extraction of standard cells to generate a standard cell candidate library | Damon Woodard, Ronald Wilson, Navid Asadizanjani | 2021-10-26 |
| 11087058 | Prevention of front-side probing attacks | Mark M. Tehranipoor, Qihang Shi, Huanyu Wang, Haoting Shen | 2021-08-10 |
| 11056448 | Covert gates to protect gate-level semiconductors | Bicky Shakya, Haoting Shen, Mark M. Tehranipoor | 2021-07-06 |
| 11030348 | Circuit edit and obfuscation for trusted chip fabrication | Mark M. Tehranipoor, Bicky Shakya, Navid Asadizanjani | 2021-06-08 |
| 10929741 | Cross-registration for unclonable chipless RFID tags | Mark M. Tehranipoor, Kun Yang, Ulbert Botero, Haoting Shen | 2021-02-23 |
| 10573605 | Layout-driven method to assess vulnerability of ICs to microprobing attacks | Mark M. Tehranipoor, Navid Asadizanjani, Qihang Shi | 2020-02-25 |
| 10283459 | Vanishing via for hardware IP protection from reverse engineering | Swarup Bhunia, Haoting Shen, Mark M. Tehranipoor, Navid Asadizanjani | 2019-05-07 |
| 10181065 | Unclonable environmentally-sensitive chipless RFID tag with a plurality of slot resonators | Mark M. Tehranipoor, Haoting Shen, Kun Yang | 2019-01-15 |