I am interested in computer security, especially program analysis. I work under the guidance of Professor Aravinda P Sistla and Professor
V.N.Venkatakrishnan. Currently I am
working on techniques to enhance the confidentiality of
sensitive data using program analysis.
- Our work on "SWIPE: Minimizing the Memory Footprint of Sensitive Data in Large Scale
Systems Software" got published in proceedings of ACM CODASPY 2012.
I am also interested in applying formal methods for monitoring and verifying programs and did some work under Professor Aravinda P Sistla.
-
Our work on "Monitoring the full range of
ω-regular Properties of Stochastic Systems" got
published in proceedings of VMCAI-2009.
|
|
- Computer System Security
- Web Security
- e-Voting and Secure Computer Systems
- Compiler Design
|
- During the
summer 2007, I did an academic internship, Summer
Experience, Colloquium and Research in Information
Technology (SECuR-IT). At the same time I had a chance to
work with the InfoSec Team of eBay and I could work on
topics like malware detection methodologies and threats
which eBay can face in the coming future.
- I also did security courses at Stanford University on web security and
emerging threats for web applications.
|
|
|
- My first job at CMC was to enhance their existing
product on Public Key Infrastructure, where I had to
develop the software for enhancements for a Certifying
Authority to issue Digital Certificates.
- This experience
helped me to understand the concepts of authentication and
non-repudiation and their importance in the e-commerce
applications.
develop the software oneabove for enhancements for a Certifying
develop the software eabove for enhancements for a Certifying
|
|
- Majority of the projects I worked on were
oriented towards using cryptography to provide the security
in their applications.
- Electronic cheque in the banking domain.
- XML digital signatures for e-cheque
- Finger prints analysis in criminal tracing system.
- This experience helped me to understand more
about the importance of security and gave me an idea of the
immense challenges present in this field. All these
projects have exposed me to a research oriented approach
and have honed my analytical and computational skills.
|
|
|
|
|
|
|
|