Shahin Tajik
Shahin Tajik
Assistant Professor, Worcester Polytechnic Institute (WPI)
Verified email at wpi.edu - Homepage
Title
Cited by
Cited by
Year
Physical characterization of arbiter PUFs
S Tajik, E Dietz, S Frohmann, JP Seifert, D Nedospasov, C Helfmeier, ...
International Workshop on Cryptographic Hardware and Embedded Systems, 493-509, 2014
1102014
Laser Fault Attack on Physically Unclonable Functions
S Tajik, H Lohrke, F Ganji, JP Seifert, C Boit
Fault Diagnosis and Tolerance in Cryptography (FDTC), 2015 Workshop on, 2015
762015
Why attackers win: on the learnability of XOR arbiter PUFs
F Ganji, S Tajik, JP Seifert
International Conference on Trust and Trustworthy Computing, 22-39, 2015
642015
On the Power of Optical Contactless Probing: Attacking Bitstream Encryption of FPGAs
S Tajik, H Lohrke, JP Seifert, C Boit
Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications …, 2017
532017
Strong machine learning attack against PUFs with no mathematical model
F Ganji, S Tajik, F Fäßler, JP Seifert
International Conference on Cryptographic Hardware and Embedded Systems, 391-411, 2016
502016
Physical vulnerabilities of physically unclonable functions
C Helfmeier, C Boit, D Nedospasov, S Tajik, JP Seifert
2014 Design, Automation & Test in Europe Conference & Exhibition (DATE), 1-4, 2014
382014
Key Extraction Using Thermal Laser Stimulation: A Case Study on Xilinx Ultrascale FPGAs
H Lohrke, S Tajik, T Krachenfels, C Boit, JP Seifert
IACR Transactions on Cryptographic Hardware and Embedded Systems 2018, 2018
37*2018
No Place to Hide: Contactless Probing of Secret Data on FPGAs
H Lohrke, S Tajik, C Boit, JP Seifert
International Conference on Cryptographic Hardware and Embedded Systems, 147-167, 2016
372016
Photonic Side-Channel Analysis of Arbiter PUFs
S Tajik, E Dietz, S Frohmann, H Dittrich, D Nedospasov, C Helfmeier, ...
Journal of Cryptology, 1-22, 2016
362016
PAC learning of arbiter PUFs
F Ganji, S Tajik, JP Seifert
Journal of Cryptographic Engineering 6 (3), 249-258, 2016
34*2016
The Key is Left under the Mat: On the Inappropriate Security Assumption of Logic Locking Schemes
MT Rahman, S Tajik, MS Rahman, M Tehranipoor, N Asadizanjani
2020 IEEE International Symposium on Hardware Oriented Security and Trust (HOST), 2020
292020
A Fourier Analysis Based Attack against Physically Unclonable Functions
F Ganji, S Tajik, JP Seifert
International Conference on Financial Cryptography and Data Security, 2018
25*2018
Defense-in-depth: A recipe for logic locking to prevail
MT Rahman, MS Rahman, H Wang, S Tajik, W Khalil, F Farahmandi, ...
Integration 72, 39-57, 2020
242020
Lattice basis reduction attack against physically unclonable functions
F Ganji, J Krämer, JP Seifert, S Tajik
Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications …, 2015
242015
Pufmon: Security monitoring of fpgas using physically unclonable functions
S Tajik, J Fietkau, H Lohrke, JP Seifert, C Boit
2017 IEEE 23rd International Symposium on On-Line Testing and Robust System …, 2017
232017
Emission analysis of hardware implementations
S Tajik, D Nedospasov, C Helfmeier, JP Seifert, C Boit
2014 17th Euromicro Conference on Digital System Design, 528-534, 2014
222014
RAM-Jam: Remote Temperature and Voltage Fault Attack on FPGAs using Memory Collisions
MM Alam, S Tajik, F Ganji, M Tehranipoor, D Forte
Fault Diagnosis and Tolerance in Cryptography (FDTC), 2019 Workshop on, 2019
212019
Having no mathematical model may not secure PUFs
F Ganji, S Tajik, F Fäßler, JP Seifert
Journal of Cryptographic Engineering 7 (2), 113-128, 2017
212017
Physical inspection & attacks: New frontier in hardware security
MT Rahman, Q Shi, S Tajik, H Shen, DL Woodard, M Tehranipoor, ...
2018 IEEE 3rd International Verification and Security Workshop (IVSW), 93-102, 2018
202018
From ic debug to hardware security risk: The power of backside access and optical interaction
C Boit, S Tajik, P Scholz, E Amini, A Beyreuther, H Lohrke, JP Seifert
2016 IEEE 23rd International Symposium on the Physical and Failure Analysis …, 2016
202016
The system can't perform the operation now. Try again later.
Articles 1–20