Skip to content

Publications

Google Scholar Profile
DBLP Link

– Book

  1. S. Tajik, “On the Physical Security of Physically Unclonable Functions,” T-Labs Series in Telecommunication Services, Springer International Publishing, 2018.

– Book Chapters

  1. S. Tajik and F. Ganji, “Artificial neural networks and fault injection attacks,” Security and Artificial Intelligence, Lecture Notes in Computer Science, vol 13049. Springer, Cham, 2022
  2. F. Ganji and S. Tajik, “Physically Unclonable Functions and AI: Two decades of marriage,” Security and Artificial Intelligence, Lecture Notes in Computer Science, vol 13049. Springer, Cham, 2022

– Journal Papers

  1. T. Mosavirik, F. Ganji, P. Schaumont, S. Tajik, “ScatterVerif: Verification of Electronic Boards Using Reflection Response of Power Distribution Network,” ACM Journal on Emerging Technologies in Computing Systems (JETC), 2022.
  2. M. T. Rahman, N. F. Dipu, D. Mehta, S. Tajik, M. Tehranipoor, N. Asadizanjani, “CONCEALING-Gate: Optical Contactless Probing Resilient Design,” ACM Journal on Emerging Technologies in Computing Systems (JETC), 2021.
  3. F. Ganji, S. Tajik, P. Stauss, J.-P. Seifert, D. Forte, M. Tehranipoor, “Rock’n’roll PUFs: Crafting Provably Secure PUFs from Less Secure Ones (Extended Version), ” Journal of Cryptographic Engineering, 2020.
  4. M. T. Rahman, M. S. Rahman, H. Wang, S. Tajik, W. Khalil, F. Farahmandi, D. Forte, N. Asadizanjani, M. Tehranipoor, “Defense-in-Depth: A Recipe for Logic Locking to Prevail” in Integration, the VLSI Journal, Elsevier, 2020.
  5. T. Hoque, K. Yang, R. Karam, S. Tajik, D. Forte, M. Tehranipoor, and S. Bhunia, “Hidden in Plaintext: An Obfuscation-based Countermeasure against FPGA Bitstream Tampering Attacks” in ACM Transactions on Design Automation of Electronic Systems (TODAES), 2019.
  6. H. Lohrke, S. Tajik, T. Krachenfels, C. Boit, J.-P. Seifert, “Key Extraction Using Thermal Laser Stimulation: A Case Study on Xilinx Ultrascale FPGAs” in IACR Transactions on CHES, Volume 3, 2018.
  7. F. Ganji, S. Tajik, F. Fäßler, and J.-P. Seifert, “Having No Mathematical Model May Not Secure PUFs”, Journal of Cryptographic Engineering, 2017.
  8. S. Tajik, E. Dietz, S. Frohmann, H. Dittrich, D. Nedospasov, C. Helfmeier, J.-P. Seifert, C. Boit, H.-W. Hübers, “Photonic Side-Channel Analysis of Arbiter PUFs,” in Journal of Cryptology, 2017.
  9. F. Ganji, S. Tajik, and J.-P. Seifert, “PAC Learning of Arbiter PUFs,” in Journal of Cryptographic Engineering, 2016.

– Conference Papers

  1. S. Roy, T. Farheen, S. Tajik, D. Forte, “Self-timed Sensors for Detecting Static Optical Side Channel Attacks,” International Symposium on Quality Electronic Design (ISQED), 2022.
  2. S. Parvin, T. Krachenfels, S. Tajik, J.-P. Seifert, F. Sill Torres, R. Drechsler, “Toward Optical Probing Resistant Circuits: A Comparison of Logic Styles and Circuit Design Techniques,” 27th Asia and South Pacific Design Automation Conference (ASP-DAC), 2022.
  3. T. Krachenfels, J.-P. Seifert, S. Tajik, “Trojan Awakener: Detecting Dormant Malicious Hardware Using Laser Logic State Imaging,” 5th ACM Workshop on Attacks and Solutions in Hardware Security (ASHES). 2021.
  4. M. Choudhury, S. Tajik, D. Forte, “SPARSE: Spatially Aware LFI Resilient State Machine Encoding,” Hardware and Architectural Support for Security and Privacy (HASP), ACM, 2021.
  5. E. Amini, K. Bartels, C. Boit, M. Eggert, N. Herfurth, T. Kiyan, T. Krachenfels, J.-P. Seifert, S. Tajik, “Special Session: Physical Attacks through the Chip Backside: Threats, Challenges, and Opportunities,” 39th IEEE VLSI Test Symposium (VTS), 2021.
  6. T. Krachenfels, T. Kiyan , S. Tajik, J.-P. Seifert, “Automatic Extraction of Secrets from the Transistor Jungle using Laser-Assisted Side-Channel Attacks,” 30th USENIX Security Symposium (USENIX Security 21), 2021.
  7. T. Krachenfels, F. Ganji, A. Moradi, S. Tajik, J.-P. Seifert, “Real-World Snapshots vs. Theory: Questioning the t-Probing Security Model,” 42nd IEEE Sym­po­si­um on Se­cu­ri­ty & Pri­va­cy (Oak­land), San Fran­cis­co, USA, 2021.
  8. M. Choudhury, S. Tajik, D. Forte, “PATRON: A Pragmatic Approach for Encoding Laser Fault Injection Resistant FSMs,” Design, Automation and Test in Europe Conference and Exhibition (DATE), IEEE, 2021.
  9. A. Stern, D. Mehta, S. Tajik, U. Guin, F. Farahmandi, M. Tehranipoor, “SPARTA-COTS: A Laser Probing Approach for Sequential Trojan Detection in COTS Integrated Circuits,” IEEE International Conference on Physical Assurance and Inspection of Electronics (PAINE), 2020.
  10. A. Stern, D. Mehta, S. Tajik, F. Farahmandi, M. Tehranipoor, “SPARTA: A Laser Probing Approach for Trojan Detection,” IEEE International Test Conference (ITC), 2020.
  11. A. Stern, J Vosatka, S. Tajik, F. Farahmandi, M. Tehranipoor, “Trust Assessment for Electronic Components using Laser and Emission-based Microscopy,” 2020 IEEE Research and Applications of Photonics in Defense Conference (RAPID), 2020.
  12. F. Ganji, S. Amir, S. Tajik, D. Forte, J.-P. Seifert, “Pitfalls in Machine Learning-based Adversary Modeling for Hardware Systems,” Design, Automation & Test in Europe Conference & Exhibition (DATE 2020). IEEE, 2020.
  13. M. T. Rahman, S. Tajik, M.S. Rahman, M. Tehranipoor, N. Asadizanjani “The Key is Left under the Mat: On the Inappropriate Security Assumption of Logic Locking Schemes, ” IEEE International Symposium on Hardware Oriented Security and Trust (HOST 2020). IEEE, 2020.
  14. M. Alam, S. Tajik, F. Ganji, M. Tehranipoor, D. Forte, “RAM-Jam: Remote Temperature and Voltage Fault Attack on FPGAs using Memory Collisions,” 16th Workshop on Fault Diagnosis and Tolerance in Cryptography (FDTC 2019), Atlanta, Georgia, USA, August 2019.
  15. F. Ganji, S. Tajik, P. Stauss, J.-P. Seifert, D. Forte, M. Tehranipoor, “Rock’n’roll PUFs: Crafting Provably Secure PUFs from Less Secure Ones,” 8th International Workshop on Security Proofs for Embedded Systems (PROOFS 2019), Atlanta, Georgia, USA, August 2019.
  16. M. T. Rahman, Q. Shi, S. Tajik, H. Shen, D. L. Woodard, M. Tehranipoor, N. Asadizanjani, “Physical Inspection & Attacks: New Frontier in Hardware Security,” 3rd International Verification and Security Workshop (IVSW), IEEE, July 2018.
  17. F. Ganji, S. Tajik, J.-P. Seifert, “A Fourier Analysis Based Attack against Physically Unclonable Functions,” 22nd International Conference on Financial Cryptography and Data Security (FC’18), Curaçao, Feb.-Mar., 2018.
  18. S. Tajik, H. Lohrke, J.-P. Seifert, C. Boit, “On the Power of Optical Contactless Probing: Attacking Bitstream Encryption of FPGAs,” 24th ACM Computer and Communications Security (CCS 2017), Dallas, Texas, USA, Oct.-Nov., 2017 (nominated for CCS best paper award, won CSAW’17 Applied Research Competition prize).
  19. S. Tajik, J. Fietkau, H. Lohrke, J.-P. Seifert, C. Boit, “PUFMon: Security Monitoring of FPGAs using Physically Unclonable Functions”, 23rd IEEE International Symposium on On-Line Testing and Robust System Design — IOLTS, Thessaloniki, Greece, 2017.
  20. H. Lohrke, H. Zöllner, P. Scholz, S. Tajik, C. Boit, and J.-P. Seifert, “Visible Light Techniques in the FinFET Era: Challenges, Threats and Opportunities”, invited paper for IEEE IPFA, Chengdu, China, 4-7 July 2017.
  21. H. Lohrke, S. Tajik, P. Scholz, J.-P. Seifert, C. Boit, “Automated Detection of Fault Sensitive Locations for Reconfiguration Attacks on Programmable Logic”, ISTFA, Forth Worth, Texas, USA, November 8, 2016.
  22. H. Lohrke, S. Tajik, Christian Boit, and J.-P. Seifert, “No Place to Hide: Contactless Probing of Secret Data on FPGAs”, Conference on Cryptographic Hardware and Embedded Systems–CHES, Santa Barbara, USA, August 2016.
  23. F. Ganji, S. Tajik, F. Fäßler, and J.-P. Seifert, “Strong Machine Learning Attack against PUFs with No Mathematical Model”, Conference on Cryptographic Hardware and Embedded Systems–CHES, Santa Barbara, USA, August 2016 (Invited to Journal of Cryptographic Engineering).
  24. C. Boit, S. Tajik, P. Scholz, E. Amini, A. Beyreuther, H. Lohrke, J.P. Seifert, “From IC Debug to Hardware Security Risk: The Power of Backside Access and Optical Interaction”, invited paper for IEEE IPFA, Marina Bay Sands, Singapore, 18-21 July 2016.
  25. F. Ganji, S. Tajik, J.-P. Seifert, “Let Me Prove it to You: RO PUFs are Provably Learnable”, 18th Annual International Conference on Information Security and Cryptology (ICISC 2015), Seoul, Korea, November 25-27, 2015
  26. F. Ganji, J. Krämer, J. -P. Seifert, S. Tajik, “Lattice Basis Reduction Attack against Physically Unclonable Functions”, 22nd ACM Conference on Computer and Communications Security (CCS 2015), Denver, Colorado, USA, October 2015.
  27. F. Ganji, S. Tajik, J. -P. Seifert, “Why Attackers Win: On the Learnability of XOR Arbiter PUFs”, TRUST 2015, Heraklion, Crete, Greece, August 2015.
  28. S. Tajik, H. Lohrke, F. Ganji, J. -P. Seifert, C. Boit, “Laser Fault Attack on Physically Unclonable Functions”, FDTC 2015, Saint-Malo, France, September 2015.
  29. S. Tajik, E. Dietz, J.-P. Seifert, D. Nedospasov, S. Frohmann, C. Helfmeier, H. Dittrich, C. Boit, “Physical Characterization of Arbiter PUFs”, Conference on Cryptographic Hardware and Embedded Systems–CHES, Busan, South Korea, 2014 (Invited to Journal of Cryptology).
  30. S.Tajik,  D. Nedospasov, C. Helfmeier, J.-P Seifert, C. Boit, “Emission Analysis of Hardware Implementations”, EUROMICRO DSD, Verona Italy, 2014.
  31. M. Roshandel, A. Munjal, P. Moghadam, S. Tajik, and H. Ketabdar, “Multi-sensor Finger Ring for Authentication based on 3D Signatures”, Human-Computer Interaction (HCI) International 2014
  32. C. Helfmeier, D. Nedospasov, S. Tajik, C. Boit, J.-P Seifert, “Physical Vulnerabilities of Physically Unclonable Functions,” Design, Automation, and Test (DATE) in Europe, Dresden, Germany, 2014.
  33. S. Tajik and A. Rostami, “MultiFlow: Enhancing IP Multicast over IEEE 802.11 WLAN,” Wireless Days (WD), IFIP/IEEEValencia, Spain, 2013