USC (2022-24) - Dean's 4.0 List | IIT Dharwad (2018-22) - Gold Medalist
Note: This is a complete resume and, thus, maybe a really long read.
GPA: 4.00 [Dean's 4.0 List]
Degree Certificate: HereCGPA: 8.94 [Director Gold Medalist]
Degree Certificate: HereThe threat of Hardware Trojans looms large on safety-critical systems. A Design-For-Trust technique to mitigate this threat without significant loss in performance is to implement these systems as a Heterogeneous Secure System − HSS. An HSS is built using an array of trustworthy home-grown cores and untrusted but fast third-party cores in a way that prevents unverified results from third-party cores reaching IO peripherals and devices. In this work, we propose to use the unverified results to initiate a speculative execution of subsequent layers of a Neural Network (NN) application on trustworthy cores. Our experiments on six popular NN applications show that on an average, the secure execution on an HSS is slower than the corresponding untrusted execution by up to 6.26% as compared to the slowdown of 80.89% experienced by a conventional trustworthy system.
The threat of network Trojans looms largely on mission-critical applications. This research work illustrates the generation of fake packets distinct from general conventional network traffic and their detection using tools like Scapy, Snort, and simulation of an IDS (Intrusion Detection System). It caters to the execution of the Payload (packet generation) and its real-time analytical understanding based on MITM (Man-in-the-middle) attack and its illustration using Scapy, Wireshark & Snort, thus utilizing the network analysis techniques. Furthermore, Port Security strategies to mitigate the most-vulnerable threats are also defined, possible DNA cryptographic techniques, and state-of-the-art Quantum Cryptography is also explored comprehensively.
In today’s modern and developing world, security and privacy are essential ingredients for ensuring data safety and the legitimate access of one’s information for most of the real-time applications they utilize, be it using smartphones, laptops, tablets, or electronic gadgets which are connected through the Internet thus making it an easy target to leverage the security of that device, resulting in enabling the attackers getting access to the sensitive and confidential data of the individual or organization. With the progression of technology at such a rapid pace, it may be frequent to conclude that drones will be delivering goods and merchandise, thus catering to the accessibility of mobile hotspots and ensuring the security & surveillance of smart cities. Considering the long-term utility of drones for smart cities, there also comes the threat of cyber-attacks like Deauthentication Attacks, GPS Spoofing, etc., which will lead to the disclosure of sensitive information. The smart devices consist of various embedded SoCs (System-On-Chip), which are integrated to sustain a large amount of user data by focusing primarily on avoiding the trade-off between the complexity of the machine learning implemented model and the available compatible edge devices (Hardware SoCs). Thus, it is essential to enhance the security of edge devices on a large scale, specifically from the perspective of smart cities. Several researchers have also proposed methodologies to improve and sustain the security of smart devices using optimized blockchain-based security frameworks using physical parameters like temperature, light, etc. This chapter defines an insight towards ensuring the security (focuses majorly on the Edge computing devices) of the smart devices, which are the prime source to enhance and maximize privacy, thus enabling the smart cities to be more secure from any cyberattack.
Research-I: PIRANHA Phishing Defence
Research-II: DISCERN: DeterLab/MergeTB [NSF Grant #2319864] & SPHERE [NSF Grant #2330066]
The NGO's website focusing on their successful events, their motive and vision behind promoting native agricultural practices throughout the world.
Check out: http://krishibharatham.org/
Check out: Rishit Saiya - Recommendation
Our team had to hack into the HiFive1-revB IoT board by exploiting the firmware of a Wi-Fi Access Point and corresponding firmware binary running on a RISC-V based Architecture on IoT platform using OSINT & other Open-Source Reverse Engineering tools like Ghidra.
Problem Statement here
Official CSAW-ESC, 2020 - GitHub Repository
Qualification Phase:
Our research introduces a technique to improve the performance of a Neural-Network based application on a Heterogenous Secure System - a system that uses fast but untrusted third-party cores along with trusted but slow home-grown cores. The untrusted third-party cores serve to accelerate the execution of the NN on the home-grown cores through assisted parallelization. The work further proposes an ILP-based technique that groups NN layers into batches in a way that balances the execution latency of each batch across cores as well as minimizes the communication overhead incurred when sending the results from third-party cores to home-grown cores (for verification as well as ahead-of-time execution).
This research was originally designed to cater upon fake packet generation and their detection using Snort, simulation of a IDS (Intrusion Detection System). This is a base for understanding the Man in the Middle Attacks and their working using Scapy, Wireshark & Snort and networking techniques.
This chapter defines an insight into the implemented and optimized approach towards ensuring the security (focuses majorly on the Edge computing devices) of the intelligent devices, which are the prime source to enhance and maximize privacy, thus enabling the smart cities to be more secure from any cyberattacks.
The work also further proposes on how security and privacy are essential ingredients for ensuring data safety and the legitimate access of one’s information for most of the real-time applications they incur, be it using devices which are connected through the Internet thus making it an easy target to leverage the security of that device, resulting in enabling the attackers to get access to the sensitive and confidential data of the individual or organization.
Developed a Spring Boot Web-Application, Resume Builder where user is authenticated using Spring Security to create their personal shareable resume/personal web-page bridged by Thymeleaf in the front-end which provides user data to HTML & CSS templates.
Spring Boot application was integrated with JPA-Hibernate as Object-Relation mapping tool with Relational Database system - Postgres & Deployed on AWS.
I commenced maintaining Writeups bit late since I started. But for all beginners, this consise list of all writeups will avail them to kickstart in CTFs. My current worldwide rank is 41st out of over 40,000 participants on CTFlearn.
A ToDo list powered by Ethereum smart contracts using Truffle Framework created with the Solidity programming language. Finally a client side application using Node JS is created and deployed on Blockchain (using Ganache). The transactions will be monitored on Blockchain Network on browsers using MetaMask Ethereum Wallet.
As a part of Computer Architecture Course Project, our team had to procure simulation of packing BCD Numbers on NXP's ARM Cortex M3-LPC1768. Using Keil's Emulator to simulate this process we produced packing of BCD numbers with and without usage of THUMB instructions. Further analysis like time of computations, total numbers of steps required as per instructions was also made.
As a part of Database Management Systems Course Project, our team had to make a project which could essentially display on the concepts grasped in the course and display its implementation in an application. We built a Django based coding practice platform for students. With a profile with proper analysis of correct vs incorrect code execution for a given user, we have provided in-built code editor with C, C++ and Python with syntax highlighting.
A UAV Drone Swarm to spot a target amongst a clutter of different objects spread randomly over a grassy land and subsequently communicate the location of the target to their remaining two drones using swarm technology only.
A bot that makes best decisions for lumberjack's route to make highest profits in given time span for different specifications of trees on grid.
A secure web application that serves as an Academic Portal for college.
A machine which can be used to transplant rice on smaller farms, a demographic that is often overlooked.
A simple management system which enables the instructor & students of course to manage courses and participants.