hero image
John Chandy, Ph.D. - University of Connecticut. Storrs, CT, US

John Chandy, Ph.D. John Chandy, Ph.D.

Professor, School of Engineering | University of Connecticut


Professor focused on cybersecurity, computer hacking, Internet of Things, systems engineering, and computer hardware security.


Dr. John Chandy is a Professor and Associate Head at the School of Engineering. Dr. Chandy's research is focused on clustered network storage and distributed file systems, parallel algorithms and distributed system architectures, reconfigurable computing, and hardware security.

Areas of Expertise (6)

Hardware Security

Distributed System Architectures

Distributed File Systems

Network Storage

Parallel Algorithms

Reconfigurable Computing

Education (3)

University of Illinois: Ph.D., Electrical Engineering 1996

University of Illinois: M.S., Electrical Engineering 1993

Massachusetts Institute of Technology: B.S., Electrical Engineering 1989

Affiliations (3)

  • Institute of Electrical and Electronics Engineers, Member
  • Association for Computing Machinery, Member
  • USENIX, Member






loading image loading image



Articles (5)

Multi-Bit NVRAMs Using Quantum Dot Gate Access Channel

International Journal of High Speed Electronics and Systems

Murali Lingalugari, Pik-Yiu Chan, John Chandy, Evan Heller, Faquir Jain

2017 This paper presents a quantum dot access channel nonvolatile random access memory (QDAC-NVRAM) which has comparable write and erase times to conventional random access memories but consumes less power and has a smaller footprint. We have fabricated long-channel (W/L= 15μm/10μm) nonvolatile random access memories (NVRAMs) with 4μs erase times.

view more

Spatial Wavefunction Switched (SWS) FET SRAM Circuits and Simulation

International Journal of High Speed Electronics and Systems

Bander Saman, P Gogna, El-Sayed Hasaneen, J Chandy, E Heller, FC Jain

2017 This paper presents the design and simulation of static random access memory (SRAM) using two channel spatial wavefunction switched field-effect transistor (SWS-FET), also known as a twin-drain metal oxide semiconductor field effect transistor (MOS-FET). In the SWS-FET, the channel between source and drain has two quantum well layers separated by a high band gap material between them. The gate voltage controls the charge carrier concentration in the quantum well layers and it causes the switching of charge carriers from one channel to other channel of the device.

view more

Algebraic Side-Channel Attack on Twofish

Journal of Internet Services and Information Security

Chujiao Ma, John Chandy, Zhijie Shi

2017 While algebraic side-channel attack (ASCA) has been successful in breaking simple cryptographic algorithms, it has never been done on larger or more complex algorithms such as Twofish. Compared to other algorithms that ASCA has been used on, Twofish is more difficult to attack due to the key-dependent S-boxes as well as the complex key scheduling.

view more

DRAM-Based Intrinsic Physically Unclonable Functions for System-Level Security and Authentication

IEEE Transactions on Very Large Scale Integration (VLSI) Systems

Fatemeh Tehranipoor, Nima Karimian, Wei Yan, John A Chandy

2017 A physically unclonable function (PUF) is an irreversible probabilistic function that produces a random bit string. It is simple to implement but hard to predict and emulate. PUFs have been widely proposed as security primitives to provide device identification and authentication. In this paper, we propose a novel dynamic-memory-based PUF [dynamic RAM PUF (DRAM PUF)] for the authentication of electronic hardware systems.

view more

PUF-based Fuzzy Authentication without Error Correcting Codes

IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems

Wei Yan, Fatemeh Tehranipoor, John A Chandy

2016 Counterfeit Integrated Circuits (IC) can be very harmful to the security and reliability of critical applications. Physical Unclonable Functions (PUF) have been proposed as a mechanism for uniquely identifying ICs and thus reducing the prevalence of counterfeits. However, maintaining large databases of PUF challenge response pairs (CRPs) and dealing with PUF errors make it difficult to use PUFs reliably. This paper presents an innovative approach to authenticate CRPs on PUF-based ICs.

view more