Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Mohammad Nasim Imtiaz Khan is active.

Publication


Featured researches published by Mohammad Nasim Imtiaz Khan.


international conference on computer aided design | 2016

Security and privacy threats to on-chip non-volatile memories and countermeasures

Swaroop Ghosh; Mohammad Nasim Imtiaz Khan; Asmit De; Jae-Won Jang

Non-volatile memories (NVMs) such as Spin-Transfer Torque RAM (STTRAM) have drawn significant attention due to complete elimination of bitcell leakage. In addition to the plethora of benefits such as density, non-volatility, low-power and high speed, majority of Non-Volatile Memories (NVMs) are also compatible with CMOS technology enabling easy integration. Although promising, NVM brings new security challenges that were absent in their conventional volatile memory counterparts such as Static RAM (SRAM) and embedded Dynamic RAM (eDRAM). The root cause is persistent data that may allow the adversary to retrieve sensitive information like password or cryptographic keys. This is primarily due to the fundamental dependency of these memory technologies on environmental parameters such as magnetic fields and temperature which can be exploited by the adversary to tamper with the stored data. This paper investigates the data security and privacy challenges in NVMs by exploring the security specific properties and novel security primitives realized using spintronic building blocks. A thorough analysis is done on the vulnerabilities, data security and privacy issues, threats and possible countermeasures to enable safe computing environment using spintronics.


international conference on computer design | 2017

Side-Channel Attack on STTRAM Based Cache for Cryptographic Application

Mohammad Nasim Imtiaz Khan; Shivam Bhasin; Alex Yuan; Anupam Chattopadhyay; Swaroop Ghosh

In this paper, we propose a Side Channel Attack (SCA) model on Spin-Torque Transfer RAM (STTRAM) where an adversary can monitor the supply current of the memory array consumed during read/write operations and recover the secret key of Advanced Encryption Standard (AES) execution. Simulation results indicate that by monitoring write current, 50% of keys could be extracted using 2000 traces. Further improvement of attacks on write operation is also proposed. The read current is found to be more susceptible to leak the key. It reveals first byte in only 40 traces and leaks the entire key in as low as 400 traces. The results are then compared with Static RAM (SRAM) based cache. The attack model has been experimentally validated on read operation of commercial MRAM chip (STTRAM variant). Experimental results indicate that the attack can reveal correct key in 15 traces compared to 40 in simulation due to less algorithmic noise. To the best of our knowledge, this is the first comprehensive SCA study for STTRAM based cache for cryptographic application.


design, automation, and test in europe | 2017

Novel magnetic burn-in for retention testing of STTRAM

Mohammad Nasim Imtiaz Khan; Anirudh Iyengar; Swaroop Ghosh

Spin-Transfer Torque RAM (STTRAM) is an emerging Non-Volatile Memory (NVM) technology that has drawn significant attention due to complete elimination of bitcell leakage. However, it brings new challenges in characterizing the retention time of the array during test. Significant shift of retention time under static (process variation (PV)) and dynamic (voltage, temperature fluctuation) variability furthers this issue. In this paper, we propose a novel magnetic burn-in (MBI) test which can be implemented with minimal changes in the existing test flow to enable STTRAM retention testing at short test time. The magnetic burn-in is also combined with thermal burn-in (MBI−BI) for further compression of retention and test time. Simulation results indicate MBI with 220Oe (at 25C) can improve the test time by 3.71×1013 X while MBI−BI with 220Oe at 125C can improve the test time by 1.97×1014X.


Archive | 2019

Sensing of Phase-Change Memory

Mohammad Nasim Imtiaz Khan; Alexander M Jones; Rashmi Jha; Swaroop Ghosh

PCM is an emerging non-volatile memory that offers high integration density and high endurance. The speed of PCM is comparable to DRAM. However, PCM sense operation incurs issues due to the resistance drifting phenomenon, high sensing time, sense time variation from cell to cell, etc. Therefore, conventional sensing techniques need to be modified. In this chapter, we describe these issues along with the basics of PCM cell design and PCM read/write operation. We also summarized state-of-the-art PCM-specific sensing schemes proposed to address different PCM-sensing issues.


international symposium on low power electronics and design | 2018

Information Leakage Attacks on Emerging Non-Volatile Memory and Countermeasures

Mohammad Nasim Imtiaz Khan; Swaroop Ghosh

Emerging Non-Volatile Memories (NVMs) suffer from high and asymmetric read/write current and long write latency which can result in supply noise, such as supply voltage droop and ground bounce. The magnitude of supply noise depends on the old data and the new data that is being written (for a write operation) or on the stored data (for a read operation). Therefore, victims write operation creates a supply noise which propagates to adversarys memory space. The adversary can detect victims write initiation and can leverage faster read latency (compared to write) to further sense the Hamming Weight (HW) of the victims write data by detecting read failures in his memory space. These attacks are specifically possible if exhaustive testing of the memory for all patterns, all possible location combinations, all possible parallel read/write conditions are not performed under bit-to-bit process variations and specified (-10°C to 90°C) and unspecified temperature ranges (i.e., less than -10°C and greater than 90°C). Simulation result indicates that adversary can sense HW of victims (near-by) write data = 66.77%, and further narrow the range based on read/write failure characteristics. Side Channel Attacks can utilize this information to strengthen the attacks.


design, automation, and test in europe | 2018

Novel application of spintronics in computing, sensing, storage and cybersecurity

Seyedhamidreza Motaman; Mohammad Nasim Imtiaz Khan; Swaroop Ghosh


Journal of Hardware and Systems Security | 2017

Replacing eFlash with STTRAM in IoTs: Security Challenges and Solutions

Asmit De; Mohammad Nasim Imtiaz Khan; Jongsun Park; Swaroop Ghosh


vlsi test symposium | 2018

Test challenges and solutions for emerging non-volatile memories

Mohammad Nasim Imtiaz Khan; Swaroop Ghosh


hardware oriented security and trust | 2018

CTCG: Charge-trap based camouflaged gates for reverse engineering prevention

Asmit De; Anirudh Iyengar; Mohammad Nasim Imtiaz Khan; Sung-Hao Lin; Sandeep Krishna Thirumala; Swaroop Ghosh; Sumeet Kumar Gupta


hardware and architectural support for security and privacy | 2018

Fault injection attacks on emerging non-volatile memory and countermeasures

Mohammad Nasim Imtiaz Khan; Swaroop Ghosh

Collaboration


Dive into the Mohammad Nasim Imtiaz Khan's collaboration.

Top Co-Authors

Avatar

Swaroop Ghosh

Pennsylvania State University

View shared research outputs
Top Co-Authors

Avatar

Asmit De

Pennsylvania State University

View shared research outputs
Top Co-Authors

Avatar

Anirudh Iyengar

University of South Florida

View shared research outputs
Top Co-Authors

Avatar

Rashmi Jha

University of Cincinnati

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Jae-Won Jang

University of South Florida

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Researchain Logo
Decentralizing Knowledge