Jump to content

Draft:Amir Rahmati

From Wikipedia, the free encyclopedia
Amir Rahmati
Bornc. July 1989 (age 35)
Alma materUniversity of Michigan
Scientific career
FieldsComputer science
InstitutionsStony Brook University
Thesis[University of Michigan Library Attacking and Defending Emerging Computer Systems Using the Memory Remanence Effect] (2017)
Doctoral advisorAtul Prakash
WebsiteAmir Rahmati homepage

Amir Rahmati (born c. July 1989) is an assistant professor of computer science at Stony Brook University, where he also directs the Ethos Security and Privacy lab. Rahmati's research focuses on computer security and privacy, with an emphasis on problems that broadly impact emerging technologies.[1]

Education

[edit]

Rahmati was awarded the B.Sc. in Computer Engineering from Sharif University of Technology in 2011, and the M.S.E. and Ph.D. in Computer Science and Engineering from the University of Michigan in 2014, and 2017, respectively.[2]

Career

[edit]

As a graduate student, Rahmati developed various security mechanisms for Embedded system and internet of things systems. In 2012, he developed A new technology called Time and Remanence Decay in SRAM (TARDIS) that used the predictable patterns in the decay of static RAM (SRAM) to create a short-duration clock. This enables RFID chips to detect potential security threats, particularly brute-force attacks, without requiring new hardware.[3][4] In 2013, Rahmati and coauthors developed a new technology to detect malware on hospital devices by monitoring changes in their power consumption.[5][6] The technology was later used by Virta Labs and deployed in two large US hospitals.[7]


He joined Stony Brook University as an Assistant Professor in the Computer Science department in 2018.[8]


References

[edit]
  1. ^ "Amir Rahmati CV" (PDF). amir.rahmati.com. Retrieved 2024-10-08.
  2. ^ "Stony Brook University Computer Science Department". cs.stonybrook.com. Retrieved 2024-10-08.
  3. ^ Rahmati, Amir; Salajegheh, Mastooreh; Holcomb, Daniel; Sorber, Jacob; Burleson, Wayne; Fu, Kevin (2012). "TARDIS: Time and Remanence Decay in SRAM to Implement Secure Protocols on Embedded Devices without Clocks" (PDF). 21st USENIX Security Symposium.
  4. ^ Anderson, Margo (2012-08-06). "Could an SRAM Hourglass Save RFID Chips Just in Time?". IEEE Spectrum. Retrieved 2024-10-08.
  5. ^ Clark, Shane; Ransford, Benjamin; Rahmati, Amir; Shane, Guineau; Sorber, Jacob; Xu, Wenyuan; Fu, Kevin (2013). "WattsUpDoc: Power side channels to nonintrusively discover untargeted malware on embedded medical devices" (PDF). USENIX Workshop on Health Information Technologies (HealthTech).
  6. ^ Talbot, David (2013-08-09). "Electric Therapy for Medical-Device Malware". MIT Technology Review. Retrieved 2024-10-08.
  7. ^ Pauli, Darren (2015-04-27). "US hospitals to treat medical device malware with AC power probes". The Register. Retrieved 2024-10-08.
  8. ^ "CEAS New Faculty". stonybrook.com. Retrieved 2024-10-08.
[edit]