Nadir Khan
Wissenschaftlicher Mitarbeiter
Werdegang
- Feb 2017 - to date: Research Scientist at FZI in the Embedded Systems and Sensor Engineering (ESS) department.
- 2016-2017: Senior Engineer, ARM Holdings plc - Trondheim, Norway
- 2013-2016: Design Engineer maXTouch, Atmel Corporation - Trondheim, Norway
- 2011-2013: Digital IC Design Engineer, TES Electronics Solutions GmbH - Berlin, Germany
- 2010: Master's degree in System on Chip Design, Lund University - Sweden
- 2008: Bachelor's degree in Computer Systems Engineering, UET Peshawar - Pakistan
Interests
- Hardware Architectures
- Signal/Image Processing
- Cryptography
- Reconfigurable Architectures
- Application Specific Reconfiguration
Publikationen
Zeitungs- oder Zeitschriftenartikel (1)
- Automatic Floorplanning and Standalone Generation of Bitstream-Level IP CoresDetails
Nadir Khan, Jorge Castro-Godínez, Shixiang Xue, Jörg Henkel, and Jürgen Becker, 2020
Konferenzbeitrag (6)
- A Secure Framework with Remote Configuration of Intellectual PropertyInfoDetails
Nadir Khan, Sven Nitzsche, Jürgen Becker, 2019
In this work, an intellectual property (IP) licensing framework is proposed that is secure against IP theft (cloning and redistribution). This security is provided by utilizing built-in features of modern field programmable gate arrays (FPGAs), e.g. secure boot, state-of-the-art cryptography and trusted execution environments (TEE). The scheme is also the least restrictive in comparison to other publications in this area. Using this scheme, multiple IP core vendors (CVs) can configure their IPs remotely by connecting directly to an FPGA. Devices are booted securely using an authenticated and encrypted boot loader that initiates an authenticated and encrypted hypervisor, which in turn provides a TEE by partitioning the system resources into secure and non-secure sections. At this stage, a secure operating system (OS) is loaded that handles all the security critical functions such as communication with CVs, storage and analysis of bitstreams, enforcement of license constraints and configuration of IPs. Then, a second, non-secure OS is loaded, which provides an isolated execution environment with unrestricted access to non-secure resources. Hence, they are not limited to predefined APIs. Both OSes can interact via the hypervisor. The implementation of this framework is a work-in-progress and results presented within this paper are subject to change.
- Secure Local Configuration of Intellectual Property Without a Trusted Third PartyDetails
Nadir Khan, Arthur Silitonga, Brian Pachideh, Sven Nitzsche and Jürgen Becker, 2019
- Amplifying Side Channel Leakage by Hardware Modification of Xilinx Zynq-7 FPGA Evaluation BoardsDetails
Nadir Khan, Sven Nitzsche, Raffaela Frank, Lars Bauer, Jörg Henkel, Jürgen Becker, 2019
- Reconfigurable Module of Multi-mode AES Cryptographic Algorithms for AP SoCsDetails
Arthur Silitonga, Zhou Jiang, Nadir Khan, Juergen Becker, 2019
- Implementation of an SVD Based MIMO OFDM channel estimatorDetails
Johan Löfgren, Shahid Mehmood, Nadir Khan, Babar Masood, M. Irfan Z. Awan, Imran Khan, Nafiz A. Chisty, Peter Nilsson, 2009
- Effect of Increasing Number of Gaussian on Text-Independent GMM-Based Voice Recognition SystemDetails
Sardar Ali, Mohammad Mustafa Bari, Nadir Mohammad Khan, Syed Waqar Shah, 2008
Export Suchergebnis .bib
Kontakt
Telefon: +49 721 9654-160
E-Mail: khan@ fzi.de