Skip to main content

Showing 1–19 of 19 results for author: Tajik, S

.
  1. arXiv:2405.14821  [pdf, other

    cs.CR

    Evaluating Vulnerability of Chiplet-Based Systems to Contactless Probing Techniques

    Authors: Aleksa Deric, Kyle Mitard, Shahin Tajik, Daniel Holcomb

    Abstract: Driven by a need for ever increasing chip performance and inclusion of innovative features, a growing number of semiconductor companies are opting for all-inclusive System-on-Chip (SoC) architectures. Although Moore's Law has been able to keep up with the demand for more complex logic, manufacturing large dies still poses a challenge. Increasingly the solution adopted to minimize the impact of sil… ▽ More

    Submitted 23 May, 2024; originally announced May 2024.

  2. arXiv:2405.03632  [pdf, other

    cs.CR

    LaserEscape: Detecting and Mitigating Optical Probing Attacks

    Authors: Saleh Khalaj Monfared, Kyle Mitard, Andrew Cannon, Domenic Forte, Shahin Tajik

    Abstract: The security of integrated circuits (ICs) can be broken by sophisticated physical attacks relying on failure analysis methods. Optical probing is one of the most prominent examples of such attacks, which can be accomplished in a matter of days, even with limited knowledge of the IC under attack. Unfortunately, few countermeasures are proposed in the literature, and none has been fabricated and tes… ▽ More

    Submitted 6 May, 2024; originally announced May 2024.

  3. arXiv:2403.12252  [pdf, other

    cs.CR

    Parasitic Circus:On the Feasibility of Golden Free PCB Verification

    Authors: Maryam Saadat Safa, Patrick Schaumont, Shahin Tajik

    Abstract: Printed circuit boards (PCBs) are an integral part of electronic systems. Hence, verifying their physical integrity in the presence of supply chain attacks (e.g., tampering and counterfeiting) is of utmost importance. Recently, tamper detection techniques grounded in impedance characterization of PCB's Power Delivery Network (PDN) have gained prominence due to their global detection coverage, non-… ▽ More

    Submitted 18 March, 2024; originally announced March 2024.

  4. arXiv:2401.08925  [pdf, other

    cs.CR

    RandOhm: Mitigating Impedance Side-channel Attacks using Randomized Circuit Configurations

    Authors: Saleh Khalaj Monfared, Domenic Forte, Shahin Tajik

    Abstract: Physical side-channel attacks can compromise the security of integrated circuits. Most physical side-channel attacks (e.g., power or electromagnetic) exploit the dynamic behavior of a chip, typically manifesting as changes in current consumption or voltage fluctuations where algorithmic countermeasures, such as masking, can effectively mitigate them. However, as demonstrated recently, these mitiga… ▽ More

    Submitted 6 May, 2024; v1 submitted 16 January, 2024; originally announced January 2024.

  5. arXiv:2311.06633  [pdf

    cs.LG cs.AI

    The Pros and Cons of Using Machine Learning and Interpretable Machine Learning Methods in psychiatry detection applications, specifically depression disorder: A Brief Review

    Authors: Hossein Simchi, Samira Tajik

    Abstract: The COVID-19 pandemic has forced many people to limit their social activities, which has resulted in a rise in mental illnesses, particularly depression. To diagnose these illnesses with accuracy and speed, and prevent severe outcomes such as suicide, the use of machine learning has become increasingly important. Additionally, to provide precise and understandable diagnoses for better treatment, A… ▽ More

    Submitted 11 November, 2023; originally announced November 2023.

    Comments: 12 pages

    MSC Class: 68T01

  6. arXiv:2310.07014  [pdf, other

    cs.CR

    LeakyOhm: Secret Bits Extraction using Impedance Analysis

    Authors: Saleh Khalaj Monfared, Tahoura Mosavirik, Shahin Tajik

    Abstract: The threats of physical side-channel attacks and their countermeasures have been widely researched. Most physical side-channel attacks rely on the unavoidable influence of computation or storage on current consumption or voltage drop on a chip. Such data-dependent influence can be exploited by, for instance, power or electromagnetic analysis. In this work, we introduce a novel non-invasive physica… ▽ More

    Submitted 23 October, 2023; v1 submitted 8 May, 2023; originally announced October 2023.

  7. arXiv:2302.11034  [pdf, other

    cs.CR

    Counterfeit Chip Detection using Scattering Parameter Analysis

    Authors: Maryam Saadat Safa, Tahoura Mosavirik, Shahin Tajik

    Abstract: The increase in the number of counterfeit and recycled microelectronic chips in recent years has created significant security and safety concerns in various applications. Hence, detecting such counterfeit chips in electronic systems is critical before deployment in the field. Unfortunately, the conventional verification tools using physical inspection and side-channel methods are costly, unscalabl… ▽ More

    Submitted 21 February, 2023; originally announced February 2023.

  8. arXiv:2208.12537  [pdf, other

    math.AT physics.data-an stat.CO

    Homology Groups of Embedded Fractional Brownian Motion

    Authors: H. Masoomy, S. Tajik, S. M. S. Movahed

    Abstract: A well-known class of non-stationary self-similar time series is the fractional Brownian motion (fBm) considered to model ubiquitous stochastic processes in nature. In this paper, we study the homology groups of high-dimensional point cloud data (PCD) constructed from synthetic fBm data. We covert the simulated fBm series to a PCD, a subset of unit $D$-dimensional cube, employing the time delay em… ▽ More

    Submitted 16 June, 2022; originally announced August 2022.

    Comments: 13 pages, 11 figures

  9. Quantum Bohmian Inspired Potential to Model Non-Gaussian Events and the Application in Financial Markets

    Authors: Reza Hosseini, Samin Tajik, Zahra Koohi Lai, Tayeb Jamali, Emmanuel Haven, G. Reza Jafari

    Abstract: We have implemented quantum modeling mainly based on Bohmian Mechanics to study time series that contain strong coupling between their events. We firstly propose how compared to normal densities, our target time series seem to be associated with a higher number of rare events, and Gaussian statistics tend to underestimate these events' frequency drastically. To this end, we suggest that by imposin… ▽ More

    Submitted 24 April, 2022; originally announced April 2022.

    Comments: 7 pages, 2 figures

  10. arXiv:2204.09579  [pdf, other

    cs.LG cs.AI cs.CR

    A Survey and Perspective on Artificial Intelligence for Security-Aware Electronic Design Automation

    Authors: David Selasi Koblah, Rabin Yu Acharya, Daniel Capecci, Olivia P. Dizon-Paradis, Shahin Tajik, Fatemeh Ganji, Damon L. Woodard, Domenic Forte

    Abstract: Artificial intelligence (AI) and machine learning (ML) techniques have been increasingly used in several fields to improve performance and the level of automation. In recent years, this use has exponentially increased due to the advancement of high-performance computing and the ever increasing size of data. One of such fields is that of hardware design; specifically the design of digital and analo… ▽ More

    Submitted 20 April, 2022; v1 submitted 19 April, 2022; originally announced April 2022.

  11. arXiv:2107.10147  [pdf, other

    cs.CR

    Trojan Awakener: Detecting Dormant Malicious Hardware Using Laser Logic State Imaging (Extended Version)

    Authors: Thilo Krachenfels, Jean-Pierre Seifert, Shahin Tajik

    Abstract: The threat of hardware Trojans (HTs) and their detection is a widely studied field. While the effort for inserting a Trojan into an application-specific integrated circuit (ASIC) can be considered relatively high, especially when trusting the chip manufacturer, programmable hardware is vulnerable to Trojan insertion even after the product has been shipped or during usage. At the same time, detecti… ▽ More

    Submitted 2 February, 2023; v1 submitted 21 July, 2021; originally announced July 2021.

    Comments: This is the extended version prepared for journal submission. For remarks on the changes, see the last paragraph of Section 1

  12. arXiv:2106.13784  [pdf, other

    cs.CR

    Programmable RO (PRO): A Multipurpose Countermeasure against Side-channel and Fault Injection Attack

    Authors: Yuan Yao, Pantea Kiaei, Richa Singh, Shahin Tajik, Patrick Schaumont

    Abstract: Side-channel and fault injection attacks reveal secret information by monitoring or manipulating the physical effects of computations involving secret variables. Circuit-level countermeasures help to deter these attacks, and traditionally such countermeasures have been developed for each attack vector separately. We demonstrate a multipurpose ring oscillator design - Programmable Ring Oscillator (… ▽ More

    Submitted 25 June, 2021; originally announced June 2021.

  13. arXiv:2102.11656  [pdf, other

    cs.CR

    Automatic Extraction of Secrets from the Transistor Jungle using Laser-Assisted Side-Channel Attacks

    Authors: Thilo Krachenfels, Tuba Kiyan, Shahin Tajik, Jean-Pierre Seifert

    Abstract: The security of modern electronic devices relies on secret keys stored on secure hardware modules as the root-of-trust (RoT). Extracting those keys would break the security of the entire system. As shown before, sophisticated side-channel analysis (SCA) attacks, using chip failure analysis (FA) techniques, can extract data from on-chip memory cells. However, since the chip's layout is unknown to t… ▽ More

    Submitted 23 February, 2021; originally announced February 2021.

    Comments: This is the preprint of the article accepted for publication at USENIX Security 2021

  14. Real-World Snapshots vs. Theory: Questioning the t-Probing Security Model

    Authors: Thilo Krachenfels, Fatemeh Ganji, Amir Moradi, Shahin Tajik, Jean-Pierre Seifert

    Abstract: Due to its sound theoretical basis and practical efficiency, masking has become the most prominent countermeasure to protect cryptographic implementations against physical side-channel attacks (SCAs). The core idea of masking is to randomly split every sensitive intermediate variable during computation into at least t+1 shares, where t denotes the maximum number of shares that are allowed to be ob… ▽ More

    Submitted 9 September, 2020; originally announced September 2020.

    Comments: This is the authors' version of the article accepted for publication at IEEE Symposium on Security and Privacy 2021

  15. arXiv:2008.11355  [pdf, other

    cs.CR cs.AI cs.LG

    Physically Unclonable Functions and AI: Two Decades of Marriage

    Authors: Fatemeh Ganji, Shahin Tajik

    Abstract: The current chapter aims at establishing a relationship between artificial intelligence (AI) and hardware security. Such a connection between AI and software security has been confirmed and well-reviewed in the relevant literature. The main focus here is to explore the methods borrowed from AI to assess the security of a hardware primitive, namely physically unclonable functions (PUFs), which has… ▽ More

    Submitted 11 February, 2021; v1 submitted 25 August, 2020; originally announced August 2020.

  16. arXiv:2008.07072  [pdf, other

    cs.CR cs.LG

    Artificial Neural Networks and Fault Injection Attacks

    Authors: Shahin Tajik, Fatemeh Ganji

    Abstract: This chapter is on the security assessment of artificial intelligence (AI) and neural network (NN) accelerators in the face of fault injection attacks. More specifically, it discusses the assets on these platforms and compares them with ones known and well-studied in the field of cryptographic systems. This is a crucial step that must be taken in order to define the threat models precisely. With r… ▽ More

    Submitted 11 February, 2021; v1 submitted 16 August, 2020; originally announced August 2020.

  17. arXiv:1907.08863  [pdf, other

    cs.CR

    Defense-in-Depth: A Recipe for Logic Locking to Prevail

    Authors: M Tanjidur Rahman, M Sazadur Rahman, Huanyu Wang, Shahin Tajik, Waleed Khalil, Farimah Farahmandi, Domenic Forte, Navid Asadizanjani, Mark Tehranipoor

    Abstract: Logic locking has emerged as a promising solution for protecting the semiconductor intellectual Property (IP) from the untrusted entities in the design and fabrication process. Logic locking hides the functionality of the IP by embedding additional key-gates in the circuit. The correct output of the chip is produced, once the correct key value is available at the input of the key-gates. The confid… ▽ More

    Submitted 20 July, 2019; originally announced July 2019.

  18. arXiv:1807.04658  [pdf, ps, other

    cond-mat.supr-con

    The effect of strong electron-rattling phonon coupling on some superconducting properties

    Authors: Samin Tajik, Božidar Mitrović, Frank Marsiglio

    Abstract: Using the Eliashberg theory of superconductivity we have examined several properties of a model in which electrons are coupled only to rattling phonon modes represented by a sharp peak in the electron-phonon coupling function. Our choice of parameters was guided by experiments on $β$-pyrochlore oxide superconductor KOs$_{2}$Os$_{6}$. We have calculated the temperature dependence of the superconduc… ▽ More

    Submitted 12 July, 2018; originally announced July 2018.

    Comments: 6 pages, 6 figures, accepted for publication by Canadian Journal of Physics, July 11, 2018

  19. Database Learning: Toward a Database that Becomes Smarter Every Time

    Authors: Yongjoo Park, Ahmad Shahab Tajik, Michael Cafarella, Barzan Mozafari

    Abstract: In today's databases, previous query answers rarely benefit answering future queries. For the first time, to the best of our knowledge, we change this paradigm in an approximate query processing (AQP) context. We make the following observation: the answer to each query reveals some degree of knowledge about the answer to another query because their answers stem from the same underlying distributio… ▽ More

    Submitted 28 March, 2017; v1 submitted 15 March, 2017; originally announced March 2017.

    Comments: This manuscript is an extended report of the work published in ACM SIGMOD conference 2017