However, the physical security of the system is still threatened by a
new class of physical attacks known as active or backscattered SCAs.
These attacks rely on power/signal integrity (PI/SI), electromagnetic compatibility (EMC),
and failure analysis (FA) methods. In backscattered SCAs, the attacker stimulates the
target device using signals in the forms of microwave radiations, near-infrared laser
beams, or even electron beams and measures the reflected/scattered signals.
The state of a circuit or memory contents affects the system's physical characteristics
(e.g., die's impedance, absorption coefficient and refractive index of transistors'
material, etc.). Thus, the scattered signal is modulated and can be exploited by
the attacker to extract secret information from the chip. In this talk, we
first review some of these powerful physical attacks and discuss why conventional
countermeasures fail to defend the system. Afterward, we explore the feasibility of
building novel schemes at the physical layer of the system for detecting such attacks
using sensors and responding to them using moving target defenses.
Bio: Dr. Shahin Tajik is an Assistant Professor at the electrical and computer engineering (ECE) department of Worcester Polytechnic Institute (WPI) in Massachusetts, USA. He is also the technical lead for the tech area Secure Edge Computing at the Northeastern Microelectronics Coalition (NEMC), which is selected as an innovation hub for CHIPS ACT's Microelectronics Commons program. Dr. Tajik received his Ph.D. in Electrical Engineering in 2017 from the working group SECT, a collaboration of the Technical University of Berlin and Deutsche Telekom Innovation Laboratories in Germany. His field of research includes non-invasive and semi-invasive attacks, Physically Unclonable Functions (PUFs), FPGA Security, and designing tamper detection mechanisms. He is the recipient of NSF CAREER Award in 2024.