Website:Personal Web Page
Assistant Professor of Electrical Engineering & Computer Science
Room / Office: Dunham 519
10 Hillhouse AvenueNew Haven, CT 06511
P.O. Box 208267New Haven, CT 06520
Phone: (203) 432-1275
Fax: (203) 432-7481
- Ph.D., Princeton University
- M.A., Princeton University
- B.S., University of Illinois at Urbana-Champaign
Computer architecture and hardware security: security verification of processor architectures, hardware (FPGA) implementation of cryptographic algorithms, designs of new Physically Unclonable Functions (PUFs) and Physical Cryptography.
Selected Awards & Honors:
- Wu Prize for Excellence, Princeton University, School of Engineering & Applied Science, Fall 2012
- Outstanding Teaching Assistant Award, Princeton University, Dept. of Electrical Engineering, Spring 2011 & Spring 2010
- National Science Foundation's East Asia and Pacific Summer Institutes (EAPSI) Fellowship, Summer 2009
- Graduate Fellowship, Princeton University
- Wen Wang, Jakub Szefer, and Ruben Niederhagen. Solving Large Systems of Linear Equations over GF(2) on FPGAs. In Proceedings of the International Conference on Reconfigurable Computing and FPGAs, ReConFig, November 2016.
- Wenjie Xiong, Andre Schaller, Nikolaos A. Anagnostopoulos, Muhammad Umair Saleem, Sebastian Gabmeyer, Stefan Katzenbeisser, and Jakub Szefer. Run-time Accessible DRAM PUFs in Commodity Devices. In Proceedings of the Conference on Cryptographic Hardware and Embedded Systems, CHES, August 2016.
- Sebastian Biedermann, Stefan Katzenbeisser, and Jakub Szefer. Hard Drive Side-Channel Attacks using Smartphone Magnetic Field Sensors. In Proceedings of the Financial Cryptography and Data Security Conference, FC, January 2015.
- Jakub Szefer and Ruby B. Lee, "Architectural Support for Hypervisor-Secure Virtualization," In Proceedings of the International Conference on Architectural Support for Programming Languages and Operating Systems (ASPLOS), March 2012.
- Jakub Szefer, Eric Keller, Ruby B Lee, and Jennifer Rexford. Eliminating the hypervisor attack surface for a more secure cloud. In Proceedings of the 18th ACM Conference on Computer and Communications Security, pages 401–412. ACM, 2011.