Google Scholar Profile
DBLP Link
– Book
- S. Tajik, “On the Physical Security of Physically Unclonable Functions,” T-Labs Series in Telecommunication Services, Springer International Publishing, 2018.
– Book Chapters
- S. Tajik and F. Ganji, “Artificial neural networks and fault injection attacks,” Security and Artificial Intelligence, Lecture Notes in Computer Science, vol 13049. Springer, Cham, 2022
- F. Ganji and S. Tajik, “Physically Unclonable Functions and AI: Two decades of marriage,” Security and Artificial Intelligence, Lecture Notes in Computer Science, vol 13049. Springer, Cham, 2022
– Journal Papers
- T. Mosavirik, F. Ganji, P. Schaumont, S. Tajik, “ScatterVerif: Verification of Electronic Boards Using Reflection Response of Power Distribution Network,” ACM Journal on Emerging Technologies in Computing Systems (JETC), 2022.
- M. T. Rahman, N. F. Dipu, D. Mehta, S. Tajik, M. Tehranipoor, N. Asadizanjani, “CONCEALING-Gate: Optical Contactless Probing Resilient Design,” ACM Journal on Emerging Technologies in Computing Systems (JETC), 2021.
- F. Ganji, S. Tajik, P. Stauss, J.-P. Seifert, D. Forte, M. Tehranipoor, “Rock’n’roll PUFs: Crafting Provably Secure PUFs from Less Secure Ones (Extended Version), ” Journal of Cryptographic Engineering, 2020.
- M. T. Rahman, M. S. Rahman, H. Wang, S. Tajik, W. Khalil, F. Farahmandi, D. Forte, N. Asadizanjani, M. Tehranipoor, “Defense-in-Depth: A Recipe for Logic Locking to Prevail” in Integration, the VLSI Journal, Elsevier, 2020.
- T. Hoque, K. Yang, R. Karam, S. Tajik, D. Forte, M. Tehranipoor, and S. Bhunia, “Hidden in Plaintext: An Obfuscation-based Countermeasure against FPGA Bitstream Tampering Attacks” in ACM Transactions on Design Automation of Electronic Systems (TODAES), 2019.
- H. Lohrke, S. Tajik, T. Krachenfels, C. Boit, J.-P. Seifert, “Key Extraction Using Thermal Laser Stimulation: A Case Study on Xilinx Ultrascale FPGAs” in IACR Transactions on CHES, Volume 3, 2018.
- F. Ganji, S. Tajik, F. Fäßler, and J.-P. Seifert, “Having No Mathematical Model May Not Secure PUFs”, Journal of Cryptographic Engineering, 2017.
- S. Tajik, E. Dietz, S. Frohmann, H. Dittrich, D. Nedospasov, C. Helfmeier, J.-P. Seifert, C. Boit, H.-W. Hübers, “Photonic Side-Channel Analysis of Arbiter PUFs,” in Journal of Cryptology, 2017.
- F. Ganji, S. Tajik, and J.-P. Seifert, “PAC Learning of Arbiter PUFs,” in Journal of Cryptographic Engineering, 2016.
– Conference Papers
- S. Roy, T. Farheen, S. Tajik, D. Forte, “Self-timed Sensors for Detecting Static Optical Side Channel Attacks,” International Symposium on Quality Electronic Design (ISQED), 2022.
- S. Parvin, T. Krachenfels, S. Tajik, J.-P. Seifert, F. Sill Torres, R. Drechsler, “Toward Optical Probing Resistant Circuits: A Comparison of Logic Styles and Circuit Design Techniques,” 27th Asia and South Pacific Design Automation Conference (ASP-DAC), 2022.
- T. Krachenfels, J.-P. Seifert, S. Tajik, “Trojan Awakener: Detecting Dormant Malicious Hardware Using Laser Logic State Imaging,” 5th ACM Workshop on Attacks and Solutions in Hardware Security (ASHES). 2021.
- M. Choudhury, S. Tajik, D. Forte, “SPARSE: Spatially Aware LFI Resilient State Machine Encoding,” Hardware and Architectural Support for Security and Privacy (HASP), ACM, 2021.
- E. Amini, K. Bartels, C. Boit, M. Eggert, N. Herfurth, T. Kiyan, T. Krachenfels, J.-P. Seifert, S. Tajik, “Special Session: Physical Attacks through the Chip Backside: Threats, Challenges, and Opportunities,” 39th IEEE VLSI Test Symposium (VTS), 2021.
- T. Krachenfels, T. Kiyan , S. Tajik, J.-P. Seifert, “Automatic Extraction of Secrets from the Transistor Jungle using Laser-Assisted Side-Channel Attacks,” 30th USENIX Security Symposium (USENIX Security 21), 2021.
- T. Krachenfels, F. Ganji, A. Moradi, S. Tajik, J.-P. Seifert, “Real-World Snapshots vs. Theory: Questioning the t-Probing Security Model,” 42nd IEEE Symposium on Security & Privacy (Oakland), San Francisco, USA, 2021.
- M. Choudhury, S. Tajik, D. Forte, “PATRON: A Pragmatic Approach for Encoding Laser Fault Injection Resistant FSMs,” Design, Automation and Test in Europe Conference and Exhibition (DATE), IEEE, 2021.
- A. Stern, D. Mehta, S. Tajik, U. Guin, F. Farahmandi, M. Tehranipoor, “SPARTA-COTS: A Laser Probing Approach for Sequential Trojan Detection in COTS Integrated Circuits,” IEEE International Conference on Physical Assurance and Inspection of Electronics (PAINE), 2020.
- A. Stern, D. Mehta, S. Tajik, F. Farahmandi, M. Tehranipoor, “SPARTA: A Laser Probing Approach for Trojan Detection,” IEEE International Test Conference (ITC), 2020.
- A. Stern, J Vosatka, S. Tajik, F. Farahmandi, M. Tehranipoor, “Trust Assessment for Electronic Components using Laser and Emission-based Microscopy,” 2020 IEEE Research and Applications of Photonics in Defense Conference (RAPID), 2020.
- F. Ganji, S. Amir, S. Tajik, D. Forte, J.-P. Seifert, “Pitfalls in Machine Learning-based Adversary Modeling for Hardware Systems,” Design, Automation & Test in Europe Conference & Exhibition (DATE 2020). IEEE, 2020.
- M. T. Rahman, S. Tajik, M.S. Rahman, M. Tehranipoor, N. Asadizanjani “The Key is Left under the Mat: On the Inappropriate Security Assumption of Logic Locking Schemes, ” IEEE International Symposium on Hardware Oriented Security and Trust (HOST 2020). IEEE, 2020.
- M. Alam, S. Tajik, F. Ganji, M. Tehranipoor, D. Forte, “RAM-Jam: Remote Temperature and Voltage Fault Attack on FPGAs using Memory Collisions,” 16th Workshop on Fault Diagnosis and Tolerance in Cryptography (FDTC 2019), Atlanta, Georgia, USA, August 2019.
- F. Ganji, S. Tajik, P. Stauss, J.-P. Seifert, D. Forte, M. Tehranipoor, “Rock’n’roll PUFs: Crafting Provably Secure PUFs from Less Secure Ones,” 8th International Workshop on Security Proofs for Embedded Systems (PROOFS 2019), Atlanta, Georgia, USA, August 2019.
- M. T. Rahman, Q. Shi, S. Tajik, H. Shen, D. L. Woodard, M. Tehranipoor, N. Asadizanjani, “Physical Inspection & Attacks: New Frontier in Hardware Security,” 3rd International Verification and Security Workshop (IVSW), IEEE, July 2018.
- F. Ganji, S. Tajik, J.-P. Seifert, “A Fourier Analysis Based Attack against Physically Unclonable Functions,” 22nd International Conference on Financial Cryptography and Data Security (FC’18), Curaçao, Feb.-Mar., 2018.
- S. Tajik, H. Lohrke, J.-P. Seifert, C. Boit, “On the Power of Optical Contactless Probing: Attacking Bitstream Encryption of FPGAs,” 24th ACM Computer and Communications Security (CCS 2017), Dallas, Texas, USA, Oct.-Nov., 2017 (nominated for CCS best paper award, won CSAW’17 Applied Research Competition prize).
- S. Tajik, J. Fietkau, H. Lohrke, J.-P. Seifert, C. Boit, “PUFMon: Security Monitoring of FPGAs using Physically Unclonable Functions”, 23rd IEEE International Symposium on On-Line Testing and Robust System Design — IOLTS, Thessaloniki, Greece, 2017.
- H. Lohrke, H. Zöllner, P. Scholz, S. Tajik, C. Boit, and J.-P. Seifert, “Visible Light Techniques in the FinFET Era: Challenges, Threats and Opportunities”, invited paper for IEEE IPFA, Chengdu, China, 4-7 July 2017.
- H. Lohrke, S. Tajik, P. Scholz, J.-P. Seifert, C. Boit, “Automated Detection of Fault Sensitive Locations for Reconfiguration Attacks on Programmable Logic”, ISTFA, Forth Worth, Texas, USA, November 8, 2016.
- H. Lohrke, S. Tajik, Christian Boit, and J.-P. Seifert, “No Place to Hide: Contactless Probing of Secret Data on FPGAs”, Conference on Cryptographic Hardware and Embedded Systems–CHES, Santa Barbara, USA, August 2016.
- F. Ganji, S. Tajik, F. Fäßler, and J.-P. Seifert, “Strong Machine Learning Attack against PUFs with No Mathematical Model”, Conference on Cryptographic Hardware and Embedded Systems–CHES, Santa Barbara, USA, August 2016 (Invited to Journal of Cryptographic Engineering).
- C. Boit, S. Tajik, P. Scholz, E. Amini, A. Beyreuther, H. Lohrke, J.P. Seifert, “From IC Debug to Hardware Security Risk: The Power of Backside Access and Optical Interaction”, invited paper for IEEE IPFA, Marina Bay Sands, Singapore, 18-21 July 2016.
- F. Ganji, S. Tajik, J.-P. Seifert, “Let Me Prove it to You: RO PUFs are Provably Learnable”, 18th Annual International Conference on Information Security and Cryptology (ICISC 2015), Seoul, Korea, November 25-27, 2015
- F. Ganji, J. Krämer, J. -P. Seifert, S. Tajik, “Lattice Basis Reduction Attack against Physically Unclonable Functions”, 22nd ACM Conference on Computer and Communications Security (CCS 2015), Denver, Colorado, USA, October 2015.
- F. Ganji, S. Tajik, J. -P. Seifert, “Why Attackers Win: On the Learnability of XOR Arbiter PUFs”, TRUST 2015, Heraklion, Crete, Greece, August 2015.
- S. Tajik, H. Lohrke, F. Ganji, J. -P. Seifert, C. Boit, “Laser Fault Attack on Physically Unclonable Functions”, FDTC 2015, Saint-Malo, France, September 2015.
- S. Tajik, E. Dietz, J.-P. Seifert, D. Nedospasov, S. Frohmann, C. Helfmeier, H. Dittrich, C. Boit, “Physical Characterization of Arbiter PUFs”, Conference on Cryptographic Hardware and Embedded Systems–CHES, Busan, South Korea, 2014 (Invited to Journal of Cryptology).
- S.Tajik, D. Nedospasov, C. Helfmeier, J.-P Seifert, C. Boit, “Emission Analysis of Hardware Implementations”, EUROMICRO DSD, Verona Italy, 2014.
- M. Roshandel, A. Munjal, P. Moghadam, S. Tajik, and H. Ketabdar, “Multi-sensor Finger Ring for Authentication based on 3D Signatures”, Human-Computer Interaction (HCI) International 2014
- C. Helfmeier, D. Nedospasov, S. Tajik, C. Boit, J.-P Seifert, “Physical Vulnerabilities of Physically Unclonable Functions,” Design, Automation, and Test (DATE) in Europe, Dresden, Germany, 2014.
- S. Tajik and A. Rostami, “MultiFlow: Enhancing IP Multicast over IEEE 802.11 WLAN,” Wireless Days (WD), IFIP/IEEE, Valencia, Spain, 2013