Dr. John Chandy is a Professor and Associate Head at the School of Engineering. Dr. Chandy's research is focused on clustered network storage and distributed file systems, parallel algorithms and distributed system architectures, reconfigurable computing, and hardware security.
Areas of Expertise (6)
Distributed System Architectures
Distributed File Systems
University of Illinois: Ph.D., Electrical Engineering 1996
University of Illinois: M.S., Electrical Engineering 1993
Massachusetts Institute of Technology: B.S., Electrical Engineering 1989
- Institute of Electrical and Electronics Engineers, Member
- Association for Computing Machinery, Member
- USENIX, Member
Murali Lingalugari, Pik-Yiu Chan, John Chandy, Evan Heller, Faquir Jain
2017 This paper presents a quantum dot access channel nonvolatile random access memory (QDAC-NVRAM) which has comparable write and erase times to conventional random access memories but consumes less power and has a smaller footprint. We have fabricated long-channel (W/L= 15μm/10μm) nonvolatile random access memories (NVRAMs) with 4μs erase times.
Bander Saman, P Gogna, El-Sayed Hasaneen, J Chandy, E Heller, FC Jain
2017 This paper presents the design and simulation of static random access memory (SRAM) using two channel spatial wavefunction switched field-effect transistor (SWS-FET), also known as a twin-drain metal oxide semiconductor field effect transistor (MOS-FET). In the SWS-FET, the channel between source and drain has two quantum well layers separated by a high band gap material between them. The gate voltage controls the charge carrier concentration in the quantum well layers and it causes the switching of charge carriers from one channel to other channel of the device.
Chujiao Ma, John Chandy, Zhijie Shi
2017 While algebraic side-channel attack (ASCA) has been successful in breaking simple cryptographic algorithms, it has never been done on larger or more complex algorithms such as Twofish. Compared to other algorithms that ASCA has been used on, Twofish is more difficult to attack due to the key-dependent S-boxes as well as the complex key scheduling.
Fatemeh Tehranipoor, Nima Karimian, Wei Yan, John A Chandy
2017 A physically unclonable function (PUF) is an irreversible probabilistic function that produces a random bit string. It is simple to implement but hard to predict and emulate. PUFs have been widely proposed as security primitives to provide device identification and authentication. In this paper, we propose a novel dynamic-memory-based PUF [dynamic RAM PUF (DRAM PUF)] for the authentication of electronic hardware systems.
Wei Yan, Fatemeh Tehranipoor, John A Chandy
2016 Counterfeit Integrated Circuits (IC) can be very harmful to the security and reliability of critical applications. Physical Unclonable Functions (PUF) have been proposed as a mechanism for uniquely identifying ICs and thus reducing the prevalence of counterfeits. However, maintaining large databases of PUF challenge response pairs (CRPs) and dealing with PUF errors make it difficult to use PUFs reliably. This paper presents an innovative approach to authenticate CRPs on PUF-based ICs.