Home
Research Interests
Patents and
Papers
Academics
Resume
Contact
Miscellaneous
|
Research Interests
"I do anything
purely out of self-motivation and self-interest, out of
the anticipatory excitement for a new 'idea' or 'thing' that is
yet not mine nor is it on someone else's website even if the
expected value for such an event is relatively small."
(adapted)
One of the areas that gets me really excited about Computer Sciences is Systems and Application Security. This is what my Master's Research is about, my undergrad thesis was built on and my first real job was about, and this is what I have been doing for fun. [ mist, railsspace [2]]
My other broad areas of interest include Distributed Systems, Compilers, Network Protocols, Database Management Systems (efficient and reliable mining, NoSQL) and Identity Management (user-centric identity : Identity 2.0, the likes of open-social, OpenID, Facebook Connect, OAuth and Card-space)
Current Projects::
* Static analysis of software components to find security vulnerabilities using Rose compiler framework
Recent Projects::
Open All
* Verification of a newly proposed hardware sorter using Model Checking, Spring 2011
Abstract:Toggle
We designed a model for a newly proposed hardware sorter and verified it using NuSMV symbolic model checker. (Tech Stack: NuSMV, Computational Tree Logic) (more details...soon!)
* File Sharing / Backup Application (like Dropbox) using Amazon Cloud Services, Spring 2011
Abstract:Toggle
Our application, VaporWare is a Dropbox like service developed using Amazon Web Services ( S3/ EC2/ SimpleDB etc), that allows users to backup their files on the Amazon S3 Cloud Storage and share them with other users. (Tech Stack: Java, Python, Shell programming) [download poster]
* Distributed Key Value Store, Spring 2011
Abstract:Toggle
We designed a distributed key-value store (where keys and values are strings), that is scalable, highly consistent and fault-tolerant. ( Minor project ) (Tech Stack: Java, Python, Shell programming) [download report (draft)]
* Secure Electronic Voting System, Fall 2010
Abstract:Toggle
We present a system for secure electronic voting which maintains individual privacy andprevents tampering and cheating by voters. By using two central facilities it further ensures that no single entity can fix the election. The design and implementation were based on the secure election protocol described in Applied Cryptography, Bruce Schneier, John Wiley and Sons, New-York, 1996. (Tech Stack: Java, PKI, Shell programming) [download full report]
* ReDbg: Smart Debugger for Reverse Engineers, Spring 2010
Abstract:Toggle
Reverse engineering is one of the main techniques used for software analysis, especially malware. While efficient debugging techniques are being developed by the security research community, malware writers are also becoming good at leveraging various anti-reverse engineering techniques to evade detection by the debuggers and hide their code. A good reverse engineering tool, not only needs to be useful but should also be effective against such anti-reverse engineering techniques. There are a lot of tools with varying degrees of correctness and usefulness available in the software world, that aid a reverse engineer in this arcane art but most of them are either tedious or too complex to comprehend. We developed a basic debugger that circumvents the common techniques used by malicious programs to detect the debugger, and usefully displays the data it collects in a form that is easily comprehensible and used by even a novice reverse engineer. (Tech Stack: C, x86) [poster]
* Measurement Study of Online Social Networks, Spring 2010
Abstract:Toggle
Online Social Networking sites like Facebook, MySpace and Orkut have become a popular way to share and disseminate content. A few studies have characterized how information spreads over these networks, but none of them have focused on the prevalence of fat content in them. In this paper, we collected and analyzed data from the largest online social network in terms of the number of users and the amount of fat content generated, Facebook, and compared that with a popular non-OSN, CNN. We analyzed the data gathered and argued that although Facebook is very effective in serving as much as 50 times more fat content than CNN, some of the pre-fetching policies employed by it can be improved. We also looked at how the two sites behave differently for mobile users. We posit that a better understanding of some of the user interactions and the content delivery systems employed by these sites, coupled with the knowledge of the user geographical locations could improve the user experience manifold. (Tech Stack: Python, Perl, Wireshark, Tcpdump) [download full report]
* Design and Implementation of a framework for energy management of mobile devices, Fall 2009
Abstract:Toggle
Web applications are becoming increasingly popular on mobile/wireless devices. As more desktop applications that are inherently computational intensive and resource-demanding are being ported to the mobile platforms, the energy consumption of the devices is shooting up, thereby decreasing the battery life. An alternate approach is to off-load the resource intensive computations to remote server(s) and simply work off the results returned. However such solutions currently existing in the market do not handle multi-media applications like video-streaming very well often causing sub-optimal user experience. This paper proposed a framework for university and office settings that works transparently with the existing mobile clients and attempts to provide an energy efficient and fairly rich user experience by offloading computationally intensive tasks to desktops in their vicinity. (Tech Stack : C++, Openflow Switches) [download full report]
Undergraduate Thesis::
* Design and Implementation of a Unified hardware architecture for non key-based cryptographic hash primitives
Abstract:Toggle
We present design and implementation of the FPGA layout of 'extended hash chip', a hardware architecture aimed at providing a unified solution for three different commercial MDC (Manipulation Detection Codes) hash primitives, namely MD-5, SHA-256 and RIPEMD-160. The novelty of this work lies in the exploitation of the similarities in the structure of the algorithms to obtain an optimized architecture. (Tech Stack : C, Verilog, Tcl Tk, FPGA toolkit, Windows)
[download full report]
Recently on my mind::
(Warning: updation frequency is of the orders of the period of Halley's
comet - well, you get the idea!)
* cURL and wget
* Identity management and propagation, Single Sign-On/Log-Off
* Cloud Computing
* OpenFlow & NetFPGA
* Issues with Digital Forensics
* Spam, Spam and more Spam !
* Social Networking Dynamics
|