top of page

Publications

Book and book chapters
  • F. Ganji, S. Tajik, Physically Unclonable Functions and AI. In Security and Artificial Intelligence. Springer, Cham, 2022.

  • S. Tajik, F. Ganji, Artificial neural networks and fault injection attacks. In Security and Artificial Intelligence. Springer, Cham, 2022. 

  • A. Covic, S. Chowdhury, R.Y. Acharya, F. Ganji, D. Forte, Post-Quantum Hardware Security: Physical Security in Classic vs. Quantum Worlds. in Emerging Topics in Hardware Security, Springer, 2021. 

  • F. Ganji, On the learnability of physically unclonable functions. Springer, 2018. 

Journal papers​
  • M. Hashemi, D. Forte, and F. Ganji. Guardianmpc: Backdoor-resilient neural network computation. IEEE Access, 2025. [Impact factor: 3.9]

  • D. M. Mehta, M. Hashemi, D. Forte, S. Tajik, and F. Ganji. 1/0 shades of UC: Photonic side-channel analysis of universal circuits. IACR Transactions on Cryptographic Hardware and Embedded Systems, 2024(3):574–602, 2024. [Impact factor: 3.5]

  • D. M. Mehta, M. Hashemi, D. S. Koblah, D. Forte, and F. Ganji. Bake it till you make it: Heat-induced leakage from masked neural networks. IACR Transactions on Cryptographic Hardware and Embedded System, 24(4):569–609, 2024. [Impact factor: 3.5]

  • M. Hasan, T. Hoque, F. Ganji, D. Woodard, D. Forte, and S. Shomaji. A resource efficient binary cnn implementation for enabling contactless iot authentication. Journal of Hardware and Systems Security, pages 1–14, 2024. [Impact factor: 1.2]

  • D. S. Koblah, U. J. Botero, S. P. Costello, O. P. Dizon-Paradis, F. Ganji, D. L. Woodard, and D. Forte. A fast object detection-based framework for via modeling on pcb x-ray ct images. ACM Journal on Emerging Technologies in Computing Systems, 19(4):1–20, 2023. [Impact factor: 2.01]

  • R. Y. Acharya, F. Ganji, and D. Forte. Information theory-based evolution of neural networks for side-channel analysis. IACR Transactions on Cryptographic Hardware and Embedded Systems, pages 401–437, 2023. [Impact factor: 3.5]

  • T. Mosavirik, F. Ganji, P. Schaumont, and S. Tajik. Scatterverif: Verification of electronic boards using reflection response of power distribution network. ACM Journal on Emerging Technologies in Computing Systems (JETC), 2022. [Impact factor: 1.42]

  • D. S. Koblah, R. Y. Acharya, D. Capecci, O. P. Dizon-Paradis, S. Tajik, F. Ganji, D. L. Woodard, and D. Forte. A survey and perspective on artificial intelligence for security-aware electronic design automation. ACM Transactions on Design

  • Automation of Electronic Systems (TODAES), 2022. [Impact factor: 1.74]

  • S. M. Sohi, J.-P. Seifert, and F. Ganji. Rnnids: Enhancing network intrusion detection systems through deep learning. Computers & Security, 102:102151, 2021. [Impact factor: 6.45]

  • S. Shomaji, Z. Guo, F. Ganji, N. Karimian, D. Woodard, and D. Forte. Blocker: A biometric locking paradigm for iot and the connected person. Journal of Hardware and Systems Security, 5(3):223–236, 2021. [Impact factor: 1.5]

  • S. Shomaji, P. Ghosh, F. Ganji, D. Woodard, and D. Forte. An analysis of enrollment and query attacks on hierarchical bloom filter-based biometric systems. IEEE Transactions on Information Forensics and Security, 16:5294–5309, 2021. [Impact factor: 7.178] 

  • S. Chowdhury, A. Covic, R. Y. Acharya, S. Dupee, F. Ganji, and D. Forte. Physical security in the post-quantum era: A survey on side-channel analysis, random number generators, and physically unclonable functions. Journal of Cryptographic Engineering, pages 1–37, 2021. [Impact factor: 1.81]

  • U. J. Botero, R. Wilson, H. Lu, M. T. Rahman, M. A. Mallaiyan, F. Ganji, N. Asadizanjani, M. M. Tehranipoor, D. L. Woodard, and D. Forte. Hardware trust and assurance through reverse engineering: A tutorial and outlook from im- age analysis and machine learning perspectives. ACM Journal on Emerging Technologies in Computing Systems (JETC), 17(4):1–53, 2021. [Impact factor: 1.42]

  • F. Ganji, S. Tajik, P. Stauss, J.-P. Seifert, M. Tehranipoor, and D. Forte. Rock’n’roll pufs: Crafting provably secure pufs from less secure ones (extended version). Journal of Cryptographic Engineering, 2020. [Impact factor: 1.82]

  • S. Chowdhury, F. Ganji, and D. Forte. Recycled soc detection using ldo degradation. SN Computer Science, 1(6):1–21, 2020. [Impact factor: 1.31]

Conference papers​
  • Maryam S. Safa , S. Nouraniboosjin, F. Ganji, and Shahin Tajik. There’s Waldo: PCB Tamper Forensic Analysis using Explainable AI on Impedance Signatures, accepted for presentation at IEEE International Symposium on Electromagnetic Compatibility, Signal and Power Integrity, 2025. [Acceptance rate: ~25%]

  • M. Hashemi, S. Tajik, and F. Ganji. Garblet: Multi-party Computation for Protecting Chiplet-based Systems, IEEE VLSI Test Symposium, 2025.  [Acceptance rate: 26%]

  • D. M. Mehta, T. MarcantonioMQP, M. Hashemi, S. KarkacheMQP, D. Shanmugam, P. Schaumont, F. Ganji. SCAPEgoat: Side Channel Analysis Library, IEEE VLSI Test Symposium, 2025.  [Acceptance rate: 26%]

  • M. Hashemi, D. M. Mehta, K. Mitard, S. Tajik, and F. Ganji. FaultyGarble: Fault Attack on Secure Multiparty Neural Network Inference. Workshop on Fault Detection and Tolerance in Cryptography (FDTC), 2024. [Acceptance rate: NA]

  • M. Hashemi, D. Forte, and F. Ganji. Time is money, friend! Timing side-channel attack against garbled circuit constructions. International Conference on Applied Cryptography and Network Security, 2024. [Acceptance rate: 23%] 

  • D. S. Koblah, D. M. Mehta, M. Hashemi, F. Ganji, and D. Forte. EDA workflow for optimization of robust model probing-compliant masked hardware gadgets. In GOMACTech, 2024. [Acceptance rate: NA]

  • D. S. Koblah, F. Ganji, D. Forte, and S. Tajik. Hardware moving target defenses against physical attacks: Design challenges and opportunities. In Proceedings of the 9th ACM Workshop on Moving Target Defense, pages 25–36, 2022. [Acceptance rate: NA]

  • M. Hashemi, S. Roy, F. Ganji, and D. Forte. Garbled EDA: Privacy preserving electronic design automation. In Proceedings of the 41st IEEE/ACM International Conference on Computer-Aided Design, pages 1–9, 2022. [Acceptance rate: 22.5%]

  • M. Hashemi, S. Roy, D. Forte, and F. Ganji. Hwgn2: Side-channel protected nns through secure and private function evaluation. In Security, Privacy, and Applied Cryptography Engineering: 12th International Conference, SPACE 2022, Jaipur, India, December 9–12, 2022, Proceedings, pages 225–248. Springer Nature Switzerland Cham, 2022. [Acceptance rate: 30%]

  • T. Krachenfels, F. Ganji, A. Moradi, S. Tajik, and J.-P. Seifert. Real-world snap- shots vs. theory: Questioning the t-probing security model. In 2021 IEEE Symposium on Security and Privacy (SP), pages 1955–1971. IEEE, 2021. [Acceptance rate: ~12.6%] 

  • U. J. Botero, F. Ganji, D. L. Woodard, and D. Forte. Automated trace and copper plane extraction of x-ray tomography imaged pcbs. In 2021 IEEE Physical Assurance and Inspection of Electronics (PAINE), pages 1–8. IEEE, 2021. [Acceptance rate: ~35%] 

  • R. Y. Acharya, N. F. Charlot, M. M. Alam, F. Ganji, D. Gauthier, and D. Forte. Chaogate parameter optimization using bayesian optimization and genetic algorithm. In International Symposium on Quality Electronic Design, 2021. [Acceptance rate: ~35%]

  • P. Ghosh, U. J. Botero, F. Ganji, D. Woodard, R. S. Chakraborty, and D. Forte. Automated detection and localization of counterfeit chip defects by texture analysis in infrared (ir) domain. In 2020 IEEE Physical Assurance and Inspection of Electronics (PAINE), pages 1–6. IEEE, 2020. [Acceptance rate: ~35%]

  • F. Ganji, S. Amir, S. Tajik, D. Forte, and J.-P. Seifert. Pitfalls in machine learning-based adversary modeling for hardware systems. In Design and Test European Conference, 2020. [Acceptance rate: ~36%] 

  • S. Chowdhury, F. Ganji, and D. Forte. Low-cost remarked counterfeit ic detection using ldo regulators. In 2020 IEEE International Symposium on Circuits and Systems (ISCAS), pages 1–5. IEEE, 2020. [Acceptance rate: ~50%] 

  • U. J. Botero, D. Koblah, D. E. Capecci, F. Ganji, N. Asadizanjani, D. L. Woodard, and D. Forte. Automated via detection for pcb reverse engineering. In ISTFA 2020, pages 157–171. ASM International, 2020. [Acceptance rate: NA] 

  • U. J. Botero, F. Ganji, N. Asadizanjani, D. L. Woodard, and D. Forte. Semi- supervised automated layer identification of x-ray tomography imaged pcbs. In 2020 IEEE Physical Assurance and Inspection of Electronics (PAINE), pages 1–6. IEEE, 2020. [Acceptance rate: ~35%]

  • R. Y. Acharya, S. Chowdhury, F. Ganji, and D. Forte. Attack of the genes: Finding keys and parameters of locked analog ics using genetic algorithm. In 2020 IEEE International Symposium on Hardware Oriented Security and Trust (HOST), pages 284–294. IEEE, 2020. [Acceptance rate: ~20%] 

  • alt.text.label.LinkedIn

Vernam Lab (AK 212)

Worcester Polytechnic Institute (WPI)
100 Institute Road
Worcester, MA | 01609-2280
Phone: +1-508-831-5000

©2022 by fganji_ece. Created with Wix.com

bottom of page