Personal profile

Research Statement

In the ever-evolving landscape of modern computing, the vulnerabilities of both cloud and edge computing infrastructure have expanded, exposing them to a higher risk of cyber attacks. To fortify these platforms effectively, it is crucial to prioritize the security of the physical platform where data and workloads are executed and accessed. An indispensable strategy involves concentrating on the first layer of defense, providing initial protection and instilling trust in higher-layer security controls.

Within the realm of my research, I am delving into Embedded Platform Security architectures to actualize a layered defense-in-depth security model. This innovative approach entails leveraging diverse hardware and software defenses to uphold fundamental data security principles—confidentiality, integrity, and availability—whether the data is at rest, in motion, or in use. A key focus of my research lies in runtime platform security, which encompasses risk-oriented cybersecurity engineering. This involves proactively identifying and mitigating anomalous system behaviors through the deployment of proactive countermeasures, thereby reinforcing the overall security posture of the system.

Expertise related to UN Sustainable Development Goals

In 2015, UN member states agreed to 17 global Sustainable Development Goals (SDGs) to end poverty, protect the planet and ensure prosperity for all. This person’s work contributes towards the following SDG(s):

  • SDG 3 - Good Health and Well-being
  • SDG 4 - Quality Education
  • SDG 8 - Decent Work and Economic Growth
  • SDG 9 - Industry, Innovation, and Infrastructure
  • SDG 10 - Reduced Inequalities
  • SDG 11 - Sustainable Cities and Communities
  • SDG 12 - Responsible Consumption and Production
  • SDG 16 - Peace, Justice and Strong Institutions
  • SDG 17 - Partnerships for the Goals

Keywords

  • TK Electrical engineering. Electronics Nuclear engineering
  • Embedded Systems
  • Cybersecurity
  • Safety-critical Systems
  • FPGA
  • Security
  • Proactive

Fingerprint

Dive into the research topics where Fahad Siddiqui is active. These topic labels come from the works of this person. Together they form a unique fingerprint.
  • 1 Similar Profiles

Collaborations and top research areas from the last five years

Recent external collaboration on country/territory level. Dive into details by clicking on the dots or