Skip to main content

Showing 1–21 of 21 results for author: Tajik, S

Searching in archive cs. Search in all archives.
.
  1. arXiv:2506.05734  [pdf, ps, other

    cs.CR

    There's Waldo: PCB Tamper Forensic Analysis using Explainable AI on Impedance Signatures

    Authors: Maryam Saadat Safa, Seyedmohammad Nouraniboosjin, Fatemeh Ganji, Shahin Tajik

    Abstract: The security of printed circuit boards (PCBs) has become increasingly vital as supply chain vulnerabilities, including tampering, present significant risks to electronic systems. While detecting tampering on a PCB is the first step for verification, forensics is also needed to identify the modified component. One non-invasive and reliable PCB tamper detection technique with global coverage is the… ▽ More

    Submitted 6 June, 2025; originally announced June 2025.

  2. arXiv:2505.01518  [pdf, ps, other

    cs.CR

    Rubber Mallet: A Study of High Frequency Localized Bit Flips and Their Impact on Security

    Authors: Andrew Adiletta, Zane Weissman, Fatemeh Khojasteh Dana, Berk Sunar, Shahin Tajik

    Abstract: The increasing density of modern DRAM has heightened its vulnerability to Rowhammer attacks, which induce bit flips by repeatedly accessing specific memory rows. This paper presents an analysis of bit flip patterns generated by advanced Rowhammer techniques that bypass existing hardware defenses. First, we investigate the phenomenon of adjacent bit flips where two or more physically neighboring bi… ▽ More

    Submitted 18 June, 2025; v1 submitted 2 May, 2025; originally announced May 2025.

    ACM Class: K.6.5

  3. arXiv:2504.19418  [pdf, other

    cs.CR cs.AR

    ChipletQuake: On-die Digital Impedance Sensing for Chiplet and Interposer Verification

    Authors: Saleh Khalaj Monfared, Maryam Saadat Safa, Shahin Tajik

    Abstract: The increasing complexity and cost of manufacturing monolithic chips have driven the semiconductor industry toward chiplet-based designs, where smaller and modular chiplets are integrated onto a single interposer. While chiplet architectures offer significant advantages, such as improved yields, design flexibility, and cost efficiency, they introduce new security challenges in the horizontal hardw… ▽ More

    Submitted 27 April, 2025; originally announced April 2025.

  4. arXiv:2504.11633  [pdf, other

    cs.CR

    Chypnosis: Stealthy Secret Extraction using Undervolting-based Static Side-channel Attacks

    Authors: Kyle Mitard, Saleh Khalaj Monfared, Fatemeh Khojasteh Dana, Shahin Tajik

    Abstract: There is a growing class of static physical side-channel attacks that allow adversaries to extract secrets by probing the persistent state of a circuit. Techniques such as laser logic state imaging (LLSI), impedance analysis (IA), and static power analysis fall into this category. These attacks require that the targeted data remain constant for a specific duration, which often necessitates halting… ▽ More

    Submitted 17 April, 2025; v1 submitted 15 April, 2025; originally announced April 2025.

  5. arXiv:2501.13894  [pdf, other

    cs.CR

    Logical Maneuvers: Detecting and Mitigating Adversarial Hardware Faults in Space

    Authors: Fatemeh Khojasteh Dana, Saleh Khalaj Monfared, Shahin Tajik

    Abstract: Satellites are highly vulnerable to adversarial glitches or high-energy radiation in space, which could cause faults on the onboard computer. Various radiation- and fault-tolerant methods, such as error correction codes (ECC) and redundancy-based approaches, have been explored over the last decades to mitigate temporary soft errors on software and hardware. However, conventional ECC methods fail t… ▽ More

    Submitted 10 February, 2025; v1 submitted 23 January, 2025; originally announced January 2025.

    Comments: 9 pages, 10 figures, Workshop on the Security of Space and Satellite Systems

  6. arXiv:2405.14821  [pdf, other

    cs.CR

    Evaluating Vulnerability of Chiplet-Based Systems to Contactless Probing Techniques

    Authors: Aleksa Deric, Kyle Mitard, Shahin Tajik, Daniel Holcomb

    Abstract: Driven by a need for ever increasing chip performance and inclusion of innovative features, a growing number of semiconductor companies are opting for all-inclusive System-on-Chip (SoC) architectures. Although Moore's Law has been able to keep up with the demand for more complex logic, manufacturing large dies still poses a challenge. Increasingly the solution adopted to minimize the impact of sil… ▽ More

    Submitted 23 May, 2024; originally announced May 2024.

  7. arXiv:2405.03632  [pdf, other

    cs.CR

    LaserEscape: Detecting and Mitigating Optical Probing Attacks

    Authors: Saleh Khalaj Monfared, Kyle Mitard, Andrew Cannon, Domenic Forte, Shahin Tajik

    Abstract: The security of integrated circuits (ICs) can be broken by sophisticated physical attacks relying on failure analysis methods. Optical probing is one of the most prominent examples of such attacks, which can be accomplished in a matter of days, even with limited knowledge of the IC under attack. Unfortunately, few countermeasures are proposed in the literature, and none has been fabricated and tes… ▽ More

    Submitted 30 August, 2024; v1 submitted 6 May, 2024; originally announced May 2024.

  8. arXiv:2403.12252  [pdf, other

    cs.CR

    Parasitic Circus:On the Feasibility of Golden Free PCB Verification

    Authors: Maryam Saadat Safa, Patrick Schaumont, Shahin Tajik

    Abstract: Printed circuit boards (PCBs) are an integral part of electronic systems. Hence, verifying their physical integrity in the presence of supply chain attacks (e.g., tampering and counterfeiting) is of utmost importance. Recently, tamper detection techniques grounded in impedance characterization of PCB's Power Delivery Network (PDN) have gained prominence due to their global detection coverage, non-… ▽ More

    Submitted 18 March, 2024; originally announced March 2024.

  9. arXiv:2401.08925  [pdf, other

    cs.CR

    RandOhm: Mitigating Impedance Side-channel Attacks using Randomized Circuit Configurations

    Authors: Saleh Khalaj Monfared, Domenic Forte, Shahin Tajik

    Abstract: Physical side-channel attacks can compromise the security of integrated circuits. Most physical side-channel attacks (e.g., power or electromagnetic) exploit the dynamic behavior of a chip, typically manifesting as changes in current consumption or voltage fluctuations where algorithmic countermeasures, such as masking, can effectively mitigate them. However, as demonstrated recently, these mitiga… ▽ More

    Submitted 30 August, 2024; v1 submitted 16 January, 2024; originally announced January 2024.

  10. arXiv:2311.06633  [pdf

    cs.LG cs.AI

    The Pros and Cons of Using Machine Learning and Interpretable Machine Learning Methods in psychiatry detection applications, specifically depression disorder: A Brief Review

    Authors: Hossein Simchi, Samira Tajik

    Abstract: The COVID-19 pandemic has forced many people to limit their social activities, which has resulted in a rise in mental illnesses, particularly depression. To diagnose these illnesses with accuracy and speed, and prevent severe outcomes such as suicide, the use of machine learning has become increasingly important. Additionally, to provide precise and understandable diagnoses for better treatment, A… ▽ More

    Submitted 11 November, 2023; originally announced November 2023.

    Comments: 12 pages

    MSC Class: 68T01

  11. arXiv:2310.07014  [pdf, other

    cs.CR

    LeakyOhm: Secret Bits Extraction using Impedance Analysis

    Authors: Saleh Khalaj Monfared, Tahoura Mosavirik, Shahin Tajik

    Abstract: The threats of physical side-channel attacks and their countermeasures have been widely researched. Most physical side-channel attacks rely on the unavoidable influence of computation or storage on current consumption or voltage drop on a chip. Such data-dependent influence can be exploited by, for instance, power or electromagnetic analysis. In this work, we introduce a novel non-invasive physica… ▽ More

    Submitted 23 October, 2023; v1 submitted 8 May, 2023; originally announced October 2023.

  12. arXiv:2302.11034  [pdf, other

    cs.CR

    Counterfeit Chip Detection using Scattering Parameter Analysis

    Authors: Maryam Saadat Safa, Tahoura Mosavirik, Shahin Tajik

    Abstract: The increase in the number of counterfeit and recycled microelectronic chips in recent years has created significant security and safety concerns in various applications. Hence, detecting such counterfeit chips in electronic systems is critical before deployment in the field. Unfortunately, the conventional verification tools using physical inspection and side-channel methods are costly, unscalabl… ▽ More

    Submitted 21 February, 2023; originally announced February 2023.

  13. arXiv:2204.09579  [pdf, other

    cs.LG cs.AI cs.CR

    A Survey and Perspective on Artificial Intelligence for Security-Aware Electronic Design Automation

    Authors: David Selasi Koblah, Rabin Yu Acharya, Daniel Capecci, Olivia P. Dizon-Paradis, Shahin Tajik, Fatemeh Ganji, Damon L. Woodard, Domenic Forte

    Abstract: Artificial intelligence (AI) and machine learning (ML) techniques have been increasingly used in several fields to improve performance and the level of automation. In recent years, this use has exponentially increased due to the advancement of high-performance computing and the ever increasing size of data. One of such fields is that of hardware design; specifically the design of digital and analo… ▽ More

    Submitted 20 April, 2022; v1 submitted 19 April, 2022; originally announced April 2022.

  14. arXiv:2107.10147  [pdf, other

    cs.CR

    Trojan Awakener: Detecting Dormant Malicious Hardware Using Laser Logic State Imaging (Extended Version)

    Authors: Thilo Krachenfels, Jean-Pierre Seifert, Shahin Tajik

    Abstract: The threat of hardware Trojans (HTs) and their detection is a widely studied field. While the effort for inserting a Trojan into an application-specific integrated circuit (ASIC) can be considered relatively high, especially when trusting the chip manufacturer, programmable hardware is vulnerable to Trojan insertion even after the product has been shipped or during usage. At the same time, detecti… ▽ More

    Submitted 2 February, 2023; v1 submitted 21 July, 2021; originally announced July 2021.

    Comments: This is the extended version prepared for journal submission. For remarks on the changes, see the last paragraph of Section 1

  15. arXiv:2106.13784  [pdf, other

    cs.CR

    Programmable RO (PRO): A Multipurpose Countermeasure against Side-channel and Fault Injection Attack

    Authors: Yuan Yao, Pantea Kiaei, Richa Singh, Shahin Tajik, Patrick Schaumont

    Abstract: Side-channel and fault injection attacks reveal secret information by monitoring or manipulating the physical effects of computations involving secret variables. Circuit-level countermeasures help to deter these attacks, and traditionally such countermeasures have been developed for each attack vector separately. We demonstrate a multipurpose ring oscillator design - Programmable Ring Oscillator (… ▽ More

    Submitted 25 June, 2021; originally announced June 2021.

  16. arXiv:2102.11656  [pdf, other

    cs.CR

    Automatic Extraction of Secrets from the Transistor Jungle using Laser-Assisted Side-Channel Attacks

    Authors: Thilo Krachenfels, Tuba Kiyan, Shahin Tajik, Jean-Pierre Seifert

    Abstract: The security of modern electronic devices relies on secret keys stored on secure hardware modules as the root-of-trust (RoT). Extracting those keys would break the security of the entire system. As shown before, sophisticated side-channel analysis (SCA) attacks, using chip failure analysis (FA) techniques, can extract data from on-chip memory cells. However, since the chip's layout is unknown to t… ▽ More

    Submitted 23 February, 2021; originally announced February 2021.

    Comments: This is the preprint of the article accepted for publication at USENIX Security 2021

  17. Real-World Snapshots vs. Theory: Questioning the t-Probing Security Model

    Authors: Thilo Krachenfels, Fatemeh Ganji, Amir Moradi, Shahin Tajik, Jean-Pierre Seifert

    Abstract: Due to its sound theoretical basis and practical efficiency, masking has become the most prominent countermeasure to protect cryptographic implementations against physical side-channel attacks (SCAs). The core idea of masking is to randomly split every sensitive intermediate variable during computation into at least t+1 shares, where t denotes the maximum number of shares that are allowed to be ob… ▽ More

    Submitted 9 September, 2020; originally announced September 2020.

    Comments: This is the authors' version of the article accepted for publication at IEEE Symposium on Security and Privacy 2021

  18. arXiv:2008.11355  [pdf, other

    cs.CR cs.AI cs.LG

    Physically Unclonable Functions and AI: Two Decades of Marriage

    Authors: Fatemeh Ganji, Shahin Tajik

    Abstract: The current chapter aims at establishing a relationship between artificial intelligence (AI) and hardware security. Such a connection between AI and software security has been confirmed and well-reviewed in the relevant literature. The main focus here is to explore the methods borrowed from AI to assess the security of a hardware primitive, namely physically unclonable functions (PUFs), which has… ▽ More

    Submitted 11 February, 2021; v1 submitted 25 August, 2020; originally announced August 2020.

  19. arXiv:2008.07072  [pdf, other

    cs.CR cs.LG

    Artificial Neural Networks and Fault Injection Attacks

    Authors: Shahin Tajik, Fatemeh Ganji

    Abstract: This chapter is on the security assessment of artificial intelligence (AI) and neural network (NN) accelerators in the face of fault injection attacks. More specifically, it discusses the assets on these platforms and compares them with ones known and well-studied in the field of cryptographic systems. This is a crucial step that must be taken in order to define the threat models precisely. With r… ▽ More

    Submitted 11 February, 2021; v1 submitted 16 August, 2020; originally announced August 2020.

  20. arXiv:1907.08863  [pdf, other

    cs.CR

    Defense-in-Depth: A Recipe for Logic Locking to Prevail

    Authors: M Tanjidur Rahman, M Sazadur Rahman, Huanyu Wang, Shahin Tajik, Waleed Khalil, Farimah Farahmandi, Domenic Forte, Navid Asadizanjani, Mark Tehranipoor

    Abstract: Logic locking has emerged as a promising solution for protecting the semiconductor intellectual Property (IP) from the untrusted entities in the design and fabrication process. Logic locking hides the functionality of the IP by embedding additional key-gates in the circuit. The correct output of the chip is produced, once the correct key value is available at the input of the key-gates. The confid… ▽ More

    Submitted 20 July, 2019; originally announced July 2019.

  21. Database Learning: Toward a Database that Becomes Smarter Every Time

    Authors: Yongjoo Park, Ahmad Shahab Tajik, Michael Cafarella, Barzan Mozafari

    Abstract: In today's databases, previous query answers rarely benefit answering future queries. For the first time, to the best of our knowledge, we change this paradigm in an approximate query processing (AQP) context. We make the following observation: the answer to each query reveals some degree of knowledge about the answer to another query because their answers stem from the same underlying distributio… ▽ More

    Submitted 28 March, 2017; v1 submitted 15 March, 2017; originally announced March 2017.

    Comments: This manuscript is an extended report of the work published in ACM SIGMOD conference 2017