Shahin Tajik

Orcid: 0000-0003-3752-2358

According to our database1, Shahin Tajik authored at least 71 papers between 2013 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
1/0 Shades of UC: Photonic Side-Channel Analysis of Universal Circuits.
IACR Trans. Cryptogr. Hardw. Embed. Syst., 2024

BackMon: IC Backside Tamper Detection using On-Chip Impedance Monitoring.
IACR Cryptol. ePrint Arch., 2024

FaultyGarble: Fault Attack on Secure Multiparty Neural Network Inference.
IACR Cryptol. ePrint Arch., 2024

Evaluating Vulnerability of Chiplet-Based Systems to Contactless Probing Techniques.
CoRR, 2024

LaserEscape: Detecting and Mitigating Optical Probing Attacks.
CoRR, 2024

Parasitic Circus: On the Feasibility of Golden Free PCB Verification.
CoRR, 2024

RandOhm: Mitigating Impedance Side-channel Attacks using Randomized Circuit Configurations.
CoRR, 2024

Calibratable Polymorphic Temperature Sensor for Detecting Fault Injection and Side-Channel Attacks.
Proceedings of the IEEE International Symposium on Hardware Oriented Security and Trust, 2024

Amnesiac Memory: A Self-Destructive Polymorphic Mechanism Against Cold Boot Data Remanence Attack.
Proceedings of the Great Lakes Symposium on VLSI 2024, 2024

2023
Trojan awakener: detecting dormant malicious hardware using laser logic state imaging (extended version).
J. Cryptogr. Eng., November, 2023

A Survey and Perspective on Artificial Intelligence for Security-Aware Electronic Design Automation.
ACM Trans. Design Autom. Electr. Syst., March, 2023

A Twofold Clock and Voltage-Based Detection Method for Laser Logic State Imaging Attack.
IEEE Trans. Very Large Scale Integr. Syst., 2023

ImpedanceVerif: On-Chip Impedance Sensing for System-Level Tampering Detection.
IACR Trans. Cryptogr. Hardw. Embed. Syst., 2023

Silicon Echoes: Non-Invasive Trojan and Tamper Detection using Frequency-Selective Impedance Analysis.
IACR Trans. Cryptogr. Hardw. Embed. Syst., 2023

LeakyOhm: Secret Bits Extraction using Impedance Analysis.
IACR Cryptol. ePrint Arch., 2023

LAT-UP: Exposing Layout-Level Analog Hardware Trojans Using Contactless Optical Probing.
Proceedings of the IEEE Computer Society Annual Symposium on VLSI, 2023

Polymorphic Sensor to Detect Laser Logic State Imaging Attack.
Proceedings of the 24th International Symposium on Quality Electronic Design, 2023

SPRED: Spatially Distributed Laser Fault Injection Resilient Design.
Proceedings of the 24th International Symposium on Quality Electronic Design, 2023

Protection Against Physical Attacks Through Self-Destructive Polymorphic Latch.
Proceedings of the IEEE/ACM International Conference on Computer Aided Design, 2023

Counterfeit Chip Detection using Scattering Parameter Analysis.
Proceedings of the 26th International Symposium on Design and Diagnostics of Electronic Circuits and Systems, 2023

2022
Artificial Neural Networks and Fault Injection Attacks.
Security and Artificial Intelligence, 2022

Physically Unclonable Functions and AI - Two Decades of Marriage.
Security and Artificial Intelligence, 2022

ScatterVerif: Verification of Electronic Boards Using Reflection Response of Power Distribution Network.
ACM J. Emerg. Technol. Comput. Syst., 2022

TAMED: Transitional Approaches for LFI Resilient State Machine Encoding.
Proceedings of the IEEE International Test Conference, 2022

Self-timed Sensors for Detecting Static Optical Side Channel Attacks.
Proceedings of the 23rd International Symposium on Quality Electronic Design, 2022

Hardware Moving Target Defenses against Physical Attacks: Design Challenges and Opportunities.
Proceedings of the 9th ACM Workshop on Moving Target Defense, 2022

Toward Optical Probing Resistant Circuits: A Comparison of Logic Styles and Circuit Design Techniques.
Proceedings of the 27th Asia and South Pacific Design Automation Conference, 2022

2021
CONCEALING-Gate: Optical Contactless Probing Resilient Design.
ACM J. Emerg. Technol. Comput. Syst., 2021

Rock'n'roll PUFs: crafting provably secure pufs from less secure ones (extended version).
J. Cryptogr. Eng., 2021

Programmable RO (PRO): A Multipurpose Countermeasure against Side-channel and Fault Injection Attacks.
IACR Cryptol. ePrint Arch., 2021

Programmable RO (PRO): A Multipurpose Countermeasure against Side-channel and Fault Injection Attack.
CoRR, 2021

Special Session: Physical Attacks through the Chip Backside: Threats, Challenges, and Opportunities.
Proceedings of the 39th IEEE VLSI Test Symposium, 2021

Automatic Extraction of Secrets from the Transistor Jungle using Laser-Assisted Side-Channel Attacks.
Proceedings of the 30th USENIX Security Symposium, 2021

Real-World Snapshots vs. Theory: Questioning the t-Probing Security Model.
Proceedings of the 42nd IEEE Symposium on Security and Privacy, 2021

SPARSE: Spatially Aware LFI Resilient State Machine Encoding.
Proceedings of the HASP '21: Workshop on Hardware and Architectural Support for Security and Privacy, 2021

PATRON: A Pragmatic Approach for Encoding Laser Fault Injection Resistant FSMs.
Proceedings of the Design, Automation & Test in Europe Conference & Exhibition, 2021

Trojan Awakener: Detecting Dormant Malicious Hardware Using Laser Logic State Imaging.
Proceedings of the ASHES@CCS 2021: Proceedings of the 5th Workshop on Attacks and Solutions in Hardware Security, 2021

2020
Hidden in Plaintext: An Obfuscation-based Countermeasure against FPGA Bitstream Tampering Attacks.
ACM Trans. Design Autom. Electr. Syst., 2020

Defense-in-depth: A recipe for logic locking to prevail.
Integr., 2020

Physically Unclonable Functions and AI: Two Decades of Marriage.
CoRR, 2020

Artificial Neural Networks and Fault Injection Attacks.
CoRR, 2020

SPARTA: A Laser Probing Approach for Trojan Detection.
Proceedings of the IEEE International Test Conference, 2020

The Key is Left under the Mat: On the Inappropriate Security Assumption of Logic Locking Schemes.
Proceedings of the 2020 IEEE International Symposium on Hardware Oriented Security and Trust, 2020

Pitfalls in Machine Learning-based Adversary Modeling for Hardware Systems.
Proceedings of the 2020 Design, Automation & Test in Europe Conference & Exhibition, 2020

2019
Theoretical and Practical Approaches for Hardness Amplification of PUFs.
IACR Cryptol. ePrint Arch., 2019

Blockchain-enabled Cryptographically-secure Hardware Obfuscation.
IACR Cryptol. ePrint Arch., 2019

Rock'n'roll PUFs: Crafting Provably Secure PUFs from Less Secure Ones.
Proceedings of 8th International Workshop on Security Proofs for Embedded Systems, 2019

RAM-Jam: Remote Temperature and Voltage Fault Attack on FPGAs using Memory Collisions.
Proceedings of the 2019 Workshop on Fault Diagnosis and Tolerance in Cryptography, 2019

2018
Key Extraction Using Thermal Laser Stimulation A Case Study on Xilinx Ultrascale FPGAs.
IACR Trans. Cryptogr. Hardw. Embed. Syst., 2018

Physical Inspection & Attacks: New Frontier in Hardware Security.
Proceedings of the 3rd IEEE International Verification and Security Workshop, 2018

A Fourier Analysis Based Attack Against Physically Unclonable Functions.
Proceedings of the Financial Cryptography and Data Security, 2018

2017
On the physical security of physically unclonable functions.
PhD thesis, 2017

Photonic Side-Channel Analysis of Arbiter PUFs.
J. Cryptol., 2017

Having no mathematical model may not secure PUFs.
J. Cryptogr. Eng., 2017

On the Power of Optical Contactless Probing: Attacking Bitstream Encryption of FPGAs.
IACR Cryptol. ePrint Arch., 2017

Noise-Tolerant Machine Learning Attacks against Physically Unclonable Functions.
IACR Cryptol. ePrint Arch., 2017

PUFMon: Security monitoring of FPGAs using physically unclonable functions.
Proceedings of the 23rd IEEE International Symposium on On-Line Testing and Robust System Design, 2017

2016
PAC learning of arbiter PUFs.
J. Cryptogr. Eng., 2016

No Place to Hide: Contactless Probing of Secret Data on FPGAs.
IACR Cryptol. ePrint Arch., 2016

Strong Machine Learning Attack against PUFs with No Mathematical Model.
IACR Cryptol. ePrint Arch., 2016

2015
A Complete and Linear Physical Characterization Methodology for the Arbiter PUF Family.
IACR Cryptol. ePrint Arch., 2015

Why Attackers Win: On the Learnability of XOR Arbiter PUFs.
Proceedings of the Trust and Trustworthy Computing - 8th International Conference, 2015

Let Me Prove It to You: RO PUFs Are Provably Learnable.
Proceedings of the Information Security and Cryptology - ICISC 2015, 2015

Laser Fault Attack on Physically Unclonable Functions.
Proceedings of the 2015 Workshop on Fault Diagnosis and Tolerance in Cryptography, 2015

Lattice Basis Reduction Attack against Physically Unclonable Functions.
Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, 2015

2014
Physical Characterization of Arbiter PUFs.
IACR Cryptol. ePrint Arch., 2014

Multi-sensor Based Gestures Recognition with a Smart Finger Ring.
Proceedings of the Human-Computer Interaction. Advanced Interaction Modalities and Techniques, 2014

Multi-sensor Finger Ring for Authentication Based on 3D Signatures.
Proceedings of the Human-Computer Interaction. Advanced Interaction Modalities and Techniques, 2014

Emission Analysis of Hardware Implementations.
Proceedings of the 17th Euromicro Conference on Digital System Design, 2014

Physical vulnerabilities of Physically Unclonable Functions.
Proceedings of the Design, Automation & Test in Europe Conference & Exhibition, 2014

2013
MultiFlow: Enhancing IP Multicast over IEEE 802.11 WLAN.
Proceedings of the IFIP Wireless Days, 2013


  Loading...