John Chandy, Ph.D.

Professor, School of Engineering University of Connecticut

  • Storrs CT

Professor focused on cybersecurity, computer hacking, Internet of Things, systems engineering, and computer hardware security.

Contact

University of Connecticut

View more experts managed by University of Connecticut

Biography

Dr. John Chandy is a Professor and Associate Head at the School of Engineering. Dr. Chandy's research is focused on clustered network storage and distributed file systems, parallel algorithms and distributed system architectures, reconfigurable computing, and hardware security.

Areas of Expertise

Hardware Security
Distributed System Architectures
Distributed File Systems
Network Storage
Parallel Algorithms
Reconfigurable Computing

Education

Massachusetts Institute of Technology

B.S.

Electrical Engineering

1989

University of Illinois

M.S.

Electrical Engineering

1993

University of Illinois

Ph.D.

Electrical Engineering

1996

Affiliations

  • Institute of Electrical and Electronics Engineers, Member
  • Association for Computing Machinery, Member
  • USENIX, Member

Social

Media

Media Appearances

New UConn robotics program aims to help build manufacturing workforce of the future, spur new startups

Hartford Business Journal  online

2021-08-09

UConn is one of only two U.S. research-active universities to offer a robotics major. While the school has a history of robotics research among engineering faculty, which has transferred to companies or fueled startups, Chandy says one of the goals is to get new robotics majors thinking about business opportunities.

“Even at the freshman level, we need to change the mindset,” Chandy said. “Many [engineering] students come in thinking about [getting] a stable job at a big company [after graduation], but we want them to think about entrepreneurship as an option.”

View More

Articles

PUF-based Fuzzy Authentication without Error Correcting Codes

IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems

Wei Yan, Fatemeh Tehranipoor, John A Chandy

2016

Counterfeit Integrated Circuits (IC) can be very harmful to the security and reliability of critical applications. Physical Unclonable Functions (PUF) have been proposed as a mechanism for uniquely identifying ICs and thus reducing the prevalence of counterfeits. However, maintaining large databases of PUF challenge response pairs (CRPs) and dealing with PUF errors make it difficult to use PUFs reliably. This paper presents an innovative approach to authenticate CRPs on PUF-based ICs.

View more

DRAM-Based Intrinsic Physically Unclonable Functions for System-Level Security and Authentication

IEEE Transactions on Very Large Scale Integration (VLSI) Systems

Fatemeh Tehranipoor, Nima Karimian, Wei Yan, John A Chandy

2017

A physically unclonable function (PUF) is an irreversible probabilistic function that produces a random bit string. It is simple to implement but hard to predict and emulate. PUFs have been widely proposed as security primitives to provide device identification and authentication. In this paper, we propose a novel dynamic-memory-based PUF [dynamic RAM PUF (DRAM PUF)] for the authentication of electronic hardware systems.

View more

Algebraic Side-Channel Attack on Twofish

Journal of Internet Services and Information Security

Chujiao Ma, John Chandy, Zhijie Shi

2017

While algebraic side-channel attack (ASCA) has been successful in breaking simple cryptographic algorithms, it has never been done on larger or more complex algorithms such as Twofish. Compared to other algorithms that ASCA has been used on, Twofish is more difficult to attack due to the key-dependent S-boxes as well as the complex key scheduling.

View more

Show All +