Rishit Saiya

USC (2022-24) - Dean's 4.0 List | IIT Dharwad (2018-22) - Gold Medalist


Resume here



Note: This is a complete resume and, thus, maybe a really long read.


 
 
 

Education

University of Southern California (USC)

Masters in Sciences, Cyber Security

GPA: 4.00 [Dean's 4.0 List]

Aug 2022 - May 2024

Indian Institute of Technology (IIT), Dharwad

B.Tech in Computer Science and Engineering

CGPA: 8.94 [Director Gold Medalist]

Aug 2018 - Apr 2022

Velociity Junior College, Hyderabad

HSC

Percentage: 98.6%

May 2016 - May 2018

Narayana CO Spark, SCO, Hyderabad

SSC

CGPA: 10/10

May 2015 - Apr 2016

Research

Puppeteer: Leveraging a Large Language Model for Scambaiting

58th Hawaii International Conference on System Sciences (2025) [HICSS]

Scambaiting is a defense that engages with scammers to waste their resources and gain information about their fraud campaigns. This defense needs automation to scale to the vast number of scams we see today. In this paper, we propose a scalable, automated scambaiting system, Puppeteer, which leverages a large language model for response generation and state machines for conversation tracking. We measure Puppeteer's effectiveness via a user study, where participants play a role of a scammer in two scam scenarios. Puppeteer convinced more than 72% of the participants that they were interacting with a human, and was able to extract information from 68% of participants. In comparison, using the same large language model without conversation tracking convinced only 54% of the participants that they were interacting with a human and obtained information from 54% of participants. Our results show potential for real-world use of Puppeteer. To the best of our knowledge, we are also the first to systematically evaluate a large language model for a scambaiting task.

SANNA: Secure Acceleration of Neural Network Applications

36th International Conference on VLSI Design (2023) and 22nd International Conference on Embedded Systems (2023) [VLSID]

The threat of Hardware Trojans looms large on safety-critical systems. A Design-For-Trust technique to mitigate this threat without significant loss in performance is to implement these systems as a Heterogeneous Secure System - HSS. An HSS is built using an array of trustworthy home-grown cores and untrusted but fast third-party cores in a way that prevents unverified results from third-party cores reaching IO peripherals and devices. In this work, we propose to use the unverified results to initiate a speculative execution of subsequent layers of a Neural Network (NN) application on trustworthy cores. Our experiments on six popular NN applications show that on an average, the secure execution on an HSS is slower than the corresponding untrusted execution by up to 6.26% as compared to the slowdown of 80.89% experienced by a conventional trustworthy system.

Fake Packet Generation, Detection and its analysis using Network Security

7th International Conference for Convergence in Technology (2022) [I2CT]

The threat of network Trojans looms largely on mission-critical applications. This research work illustrates the generation of fake packets distinct from general conventional network traffic and their detection using tools like Scapy, Snort, and simulation of an IDS (Intrusion Detection System). It caters to the execution of the Payload (packet generation) and its real-time analytical understanding based on MITM (Man-in-the-middle) attack and its illustration using Scapy, Wireshark & Snort, thus utilizing the network analysis techniques. Furthermore, Port Security strategies to mitigate the most-vulnerable threats are also defined, possible DNA cryptographic techniques, and state-of-the-art Quantum Cryptography is also explored comprehensively.

Reliability and Security of Edge Computing Devices for Smart Cities

Springer, Nature Switzerland AG (2023)

In today's modern and developing world, security and privacy are essential ingredients for ensuring data safety and the legitimate access of one's information for most of the real-time applications they utilize, be it using smartphones, laptops, tablets, or electronic gadgets which are connected through the Internet thus making it an easy target to leverage the security of that device, resulting in enabling the attackers getting access to the sensitive and confidential data of the individual or organization. With the progression of technology at such a rapid pace, it may be frequent to conclude that drones will be delivering goods and merchandise, thus catering to the accessibility of mobile hotspots and ensuring the security & surveillance of smart cities. Considering the long-term utility of drones for smart cities, there also comes the threat of cyber-attacks like Deauthentication Attacks, GPS Spoofing, etc., which will lead to the disclosure of sensitive information. The smart devices consist of various embedded SoCs (System-On-Chip), which are integrated to sustain a large amount of user data by focusing primarily on avoiding the trade-off between the complexity of the machine learning implemented model and the available compatible edge devices (Hardware SoCs). Thus, it is essential to enhance the security of edge devices on a large scale, specifically from the perspective of smart cities. Several researchers have also proposed methodologies to improve and sustain the security of smart devices using optimized blockchain-based security frameworks using physical parameters like temperature, light, etc. This chapter defines an insight towards ensuring the security (focuses majorly on the Edge computing devices) of the smart devices, which are the prime source to enhance and maximize privacy, thus enabling the smart cities to be more secure from any cyberattack.


Experience

Cyber Risk and Regulatory Associate

PwC, US

Aug 2024 - Present

Graduate Research Assistant

STEEL: Security Research Lab, USC Information Sciences Institute (ISI)

Research-I: PIRANHA Phishing Defence

  • Developing an interactive dialogue exchange IRC based systems that not only responses to the phishers but also elicits their information.
  • Aims to mitigate and defend against increasing threats of Phishing and social engineering attacks using automated HMI components. Check the repository here.
  • Worked on this research with Prof. Jelena Mirkovic, Genevieve Bartlett and Will Charnsethikul

Research-II: DISCERN: DeterLab/MergeTB [NSF Grant #2319864] & SPHERE [NSF Grant #2330066]

  • Developing Cybersecurity experiments in the new MergeTB testbed using and building on open source tools to develop cyber attacks scenarios using botnets and other such technologies.
  • Assisting in producing datasets that capture how attack technologies use resources, in comparison to benign resource usage that would come from typical permitted use of a system like DeterLab. Check the repository here.
  • Collaborated with senior researchers to draft research proposals and successfully secured NSF grants worth of $18,593,139 USD.
  • Worked on this research with Prof. Jelena Mirkovic, Brian Kocoloski and Spencer Stingley

Check out: Rishit Saiya - Recommendation

Aug 2022 - May 2024

Cyber Risk and Regulatory Intern

PwC, US

  • Worked in Cybersecurity, Risk & Regulatory practice wherein developed security strategies, DLP programs with policies to transform business operations. Integrated security compliances to perform cloud assessments focusing on DLP capabilities.
  • Designing and mapping security requirements of M365 suites and performed AWS cloud environment assessments to pertaining controls within the FFIEC, NIST CSF, CCF and ERC compliances.

Jun 2023 - Aug 2023

Teaching Assistant

  • Teaching Assistant for the course: CSCI 430 - Computer and Network Security
  • Assess assignments, labs, and exams, covering concepts of Cryptography, Key Management, IDS/IPS, Authentication/Authorization, DNS Security.
  • Conduct office hours to assist students in clarifying doubts.
  • Working on this course with Prof. Luis Garcia
Check out: Rishit Saiya - Recommendation

Jan 2023 - May 2023

Cyber Security Intern

Toshiba, Bangalore

  • Integration of Security standards IEC 62351, IEC 61850 to ICS products
  • IED Development involving security standards like TLS, OCSP, LDAP, X509 Certificates and communication with RBAC servers and HMI systems.
  • Worked on a secured C Plugin compatible for a cross platform array of embedded devices over an automated substation.
Check out: Rishit Saiya - Certification

Oct 2021 - Jun 2022

Software Develeper Intern

  • Worked on an Ethereum based User Authenticated distributed ledger which is a highly flexible blockchain SDK architecture with great transaction performance on Web OS based devices.

  • Check out: Rishit Saiya - Certification

    Aug 2021 - Dec 2021

    Red Team Intern

  • Red Team Assessment, Realistic Attack scenarios using tactics, techniques, and procedures seen in real-world attacks, Tailored engagements to meet organizational needs, with objectives based on the most relevant risks to organization.
  • Detailed, concise reports with actionable recommendations to aid in remediating identified issues post-engagement. Assessments performed for clients like Hangyo Ice Creams, Indian Institute of Science [IISc] (Institute of Eminence).

  • Check out: Rishit Saiya - Certification
    Lecture: Scanning Phase - Ethical Hacking
    Assignments: Documentations and Writeups for challenges on TryHackMe

    Dec 2020 - Jun 2021

    Core Team Member, DSC - IIT Dharwad

    DSC Chapter, IIT Dharwad

  • Developer Student Club, IIT Dharwad is a university based community group for students interested in Google Developer Technologies. Students from all undergraduate or graduate programs with an interest in growing as a developer are welcome to join this chapter.
  • As a core member, we act as a link to support students grow their knowledge in a peer-to-peer learning environment and build solutions for local businesses and their community.

  • Check out: Rishit Saiya - DSC Profile

    Sep 2020 - Apr 2022

    CDC Member

    CDC, IIT Dharwad

  • CDC (Career Development Cell), IIT Dharwad is committed to provide assistance to the all students achieving their career goals. We were also responsible for facilitating the campus internships and placements for the students of IIT Dharwad.
  • I contributed in the Technical Team in making the content for the official documents, compliance and also drawing in industry leaders through my network for betterment of other colleagues.

  • Check out: Rishit Saiya - Certification

    Jul 2020 - Apr 2021

    Full Stack Developer

    Krishibharatham, Hyderabad

    The NGO's website focusing on their successful events, their motive and vision behind promoting native agricultural practices throughout the world.

    Check out: http://krishibharatham.org/
    Check out: Rishit Saiya - Recommendation

    Mar 2020 - May 2020

    Accepted Intern

    RCI Lab, DRDO, Hyderabad

  • The work was on a framework development for Network Interception of Malicious Packets using Machine Learning, Big Data and Information Security.

  • (The internship had to be on-site and was aborted due to COVID-19 pandemic).

    May 2020 - Jul 2020

    SUMMER INTERN TRAINEE

    • Evolution of Cyber Security Landscape
    • Information Security Standards
    • Networking & TCP/IP Fundamentals
    • Risk Management & Mitigation in Information Security & Compliance
    (No work can be revealed in compliance with Confendiatilty Policy of BioTelemetry, Inc.)

    Check out: Rishit Saiya - Recommendation

    May 2019 - Jun 2019

    Projects

    CSAW - Embedded Security Challenge, 2020

    Team: TheHackingCompany

    Our team had to hack into the HiFive1-revB IoT board by exploiting the firmware of a Wi-Fi Access Point and corresponding firmware binary running on a RISC-V based Architecture on IoT platform using OSINT & other Open-Source Reverse Engineering tools like Ghidra.

    Qualification Phase:
    • Understand the working of a Wi-Fi Access Point on a RISC-V platform.
    • Explore all the security vulnerabilities on this RISC-V platform.
    • Try out the Reverse Engineering Reconnaissance Techniques using Ghidra.
    • Explain the details of the solutions to the three preliminary challenges.
    • Qualification Research Paper/Report
    Final Phase:
    • Reverse Engineered various Binary firmwares using techniques like Buffer Overflow, Port Scan in LAN using Nmap, Data Type Manipulation by Buffer Overflow, Simulation, Exploiting Assembly Language Code, etc.
    • Final Research Paper/Report
    Results:

    Securing Neural Networks against Hardware Trojans through Assisted Parallelization

    Embedded Systems security, Safety Critical Systems (B.Tech Project w/ Prof. Rajshekar K)

    Our research introduces a technique to improve the performance of a Neural-Network based application on a Heterogenous Secure System - a system that uses fast but untrusted third-party cores along with trusted but slow home-grown cores. The untrusted third-party cores serve to accelerate the execution of the NN on the home-grown cores through assisted parallelization. The work further proposes an ILP-based technique that groups NN layers into batches in a way that balances the execution latency of each batch across cores as well as minimizes the communication overhead incurred when sending the results from third-party cores to home-grown cores (for verification as well as ahead-of-time execution).

    Fake Packet Generation and Detection in Computer Networks

    Network Security, Snort, Scapy, Wireshark (RnD Project, IIT Dharwad)

    This research was originally designed to cater upon fake packet generation and their detection using Snort, simulation of a IDS (Intrusion Detection System). This is a base for understanding the Man in the Middle Attacks and their working using Scapy, Wireshark & Snort and networking techniques.

    Reliability and Security of Edge Computing Devices for Smart Cities

    Research (w/ Nikunj Pansari)

    This chapter defines an insight into the implemented and optimized approach towards ensuring the security (focuses majorly on the Edge computing devices) of the intelligent devices, which are the prime source to enhance and maximize privacy, thus enabling the smart cities to be more secure from any cyberattacks.
    The work also further proposes on how security and privacy are essential ingredients for ensuring data safety and the legitimate access of one's information for most of the real-time applications they incur, be it using devices which are connected through the Internet thus making it an easy target to leverage the security of that device, resulting in enabling the attackers to get access to the sensitive and confidential data of the individual or organization.

    Performance and Security Comparison of Security and Separation Kernels in High-Assurance Systems

    Computer Systems Assurance, Trusted Systems

    • Conducted a comparative analysis of security and separation kernels using TCSEC and SKPP frameworks, evaluating high-assurance systems GEMSOS and Integrity-178B to assess performance, security policies, and covert channel mitigation techniques.
    • Found that security kernels offer superior reference validation as a Trusted Computing Base (TCB) but face compatibility challenges with modern OS and third-party applications.
    • Highlighted trade-offs between kernel models, emphasizing the security kernel's potential for high-assurance systems and the need to overcome integration barriers for broader adoption.
    • Final Research Project/Paper

    Secure Decentralized Audit System for Electronic Health Records

    Cryptography, Merkle Trees, AES

    Developed and prototyped a secure audit logging system for Electronic Health Record (EHR) platforms, ensuring privacy, user identification, and immutability while meeting functional and regulatory requirements, including HIPAA compliance. The system utilized advanced features like decentralized design with Merkle Trees, AES encryption, and hashing to secure audit logs, preventing unauthorized access, tampering, or deletion, and enabling robust detection of any internal threats or unauthorized modifications. By providing immutable, detailed audit trails and leveraging decentralized mechanisms, the solution enhanced the security and integrity of EHR audit logs, supporting both operational efficiency and regulatory compliance in modern healthcare environments.

    Patient Data Protection Strategy under HIPAA/HITECH: A Compliance and Security Framework

    Access Controls, HIPAA, HITECH, NIST 800-66r1

    • Developed a comprehensive security policy for a bioinformatics center, ensuring HIPAA and HITECH compliance by addressing critical threats such as unauthorized access, data breaches, and insider threats, while safeguarding patient data throughout its lifecycle with strategies aligned to NIST 800-66r1 guidelines.
    • The policy incorporated a robust role-based access control (RBAC) model that combined Mandatory Access Control (MAC) and Discretionary Access Control (DAC) mechanisms to enforce the principle of least privilege, restricting access to sensitive data based on predefined roles and responsibilities.
    • By balancing stringent security measures with operational flexibility, the policy mitigated risks, protected patient privacy, and maintained data integrity within the bioinformatics environment.
    • Final Research Project/Paper

    Resume Builder

    Spring Boot Framework, JPA-Hibernate, Postgres, AWS

    Developed a Spring Boot Web-Application, Resume Builder where user is authenticated using Spring Security to create their personal shareable resume/personal web-page bridged by Thymeleaf in the front-end which provides user data to HTML & CSS templates.
    Spring Boot application was integrated with JPA-Hibernate as Object-Relation mapping tool with Relational Database system - Postgres & Deployed on AWS.

    CTF Writeups

    Cryptography, Forensics, Reversing, Pwning and other Misc problems

    I commenced maintaining Writeups bit late since I started. But for all beginners, this consise list of all writeups will avail them to kickstart in CTFs. My current worldwide rank is 41st out of over 40,000 participants on CTFlearn.

    Ethereum Based TodoList

    Blockchain, Metamask, Ganache

    A ToDo list powered by Ethereum smart contracts using Truffle Framework created with the Solidity programming language. Finally a client side application using Node JS is created and deployed on Blockchain (using Ganache). The transactions will be monitored on Blockchain Network on browsers using MetaMask Ethereum Wallet.

    MICRO Compiler

    Yacc, Flex/Bison, C++

    A compiler for MICRO language using Flex for Scanner and Bison for Parser to build where Flex/Bison being C++ based.

    Code:

    Assembly BCD Packing

    Computer Architecture, Keil Emulator


    As a part of Computer Architecture Course Project, our team had to procure simulation of packing BCD Numbers on NXP's ARM Cortex M3-LPC1768. Using Keil's Emulator to simulate this process we produced packing of BCD numbers with and without usage of THUMB instructions. Further analysis like time of computations, total numbers of steps required as per instructions was also made.

    CodeShinobi

    DBMS, Django, ER Model


    As a part of Database Management Systems Course Project, our team had to make a project which could essentially display on the concepts grasped in the course and display its implementation in an application. We built a Django based coding practice platform for students. With a profile with proper analysis of correct vs incorrect code execution for a given user, we have provided in-built code editor with C, C++ and Python with syntax highlighting.

    D.R.D.O. SASE's UAV Fleet Challenge

    Inter IIT Tech Meet 8.0, IIT Roorkee

    A UAV Drone Swarm to spot a target amongst a clutter of different objects spread randomly over a grassy land and subsequently communicate the location of the target to their remaining two drones using swarm technology only.

    • Built the swarm focused on low-speed stability using Pixhawk as the flight controller and Ardupilot firmware.
    • Using a flooding based communication approach, drones publish their current GPS coordinates for Collision Avoidance and box location to all drones for cross-referencing.
    • GPS coordinates were obtained and appropriate movement commands were sent by Dronekit API which has access to all Ardupilot parameters in real-time.
    • The team used basic OpenCV for object detection instead of a Deep Learning frameworks like Tensorflow, due to heavy processing power of RPI and that was taken into consideration.
    • Our Team finished 4th in absolute scoring in D.R.D.O. SASE's UAV Fleet Challenge at Inter IIT Tech Meet 8.0, IIT Roorkee.

    Lumberjack (Domino Effect)

    Optimization, C++, Time/Space Complexity

    A bot that makes best decisions for lumberjack's route to make highest profits in given time span for different specifications of trees on grid.

    • Optimization using algorithms and STL in C++.
    • Implemented structures to refine the code and STL to improve the readability of the code.
    • Introspected the intricacies of the problem statement and calculated the best profits for any given grid scenario.

    Moodle

    MySQL, XAMPP, DBMS, HTML, CSS, JS

    A secure web application that serves as an Academic Portal for college.

    • Clean UI/UX design with CSS & JS.
    • Used PHP for server side scripting and MySQL, XAMPP for DBMS.
    • Registration and login features with bifurcative services given to Admin, Instructors and Students respectively.
    • Appropiate pages and services to respective designations in institution.

    TCTD Challenge

    Inter IIT Tech Meet 7.0, IIT Bombay

    A machine which can be used to transplant rice on smaller farms, a demographic that is often overlooked.

    • Keeping in mind the financial conditions of most of the small scale farmers, we planned to keep the cost of our device as low as possible.
    • We also aimed to keep our transplanting mechanism simple and robust so that it can be easily repaired by even an amateur mechanic.
    • Our Team finished 4th in relative scoring in TCTD Challenge Event at Inter IIT Tech Meet 7.0, IIT Bombay.

    Course Management System

    C, File Handling, Database Management

    A simple management system which enables the instructor & students of course to manage courses and participants.

    • A structured file handling project in C.
    • Implemented structures to refine the code and STL to improve the readability of the code.


    Awards



    Positions of Responsibility

    • Artifact Evaluation Committee, NDSS 2025: Evaluated submitted research artifacts for usability, completeness, and reproducibility, facilitating author communication to resolve issues and ensure rigorous, badge-based assessment. Letter here.
    • USC CTF Team Member 2022-2024, CYBORG, USC: Play CTFs and several other hacking challenges for CTF Team solving challenges in domains of Red Teaming, Blue Teaming, Purple Teaming. Some of the notable CTFs we competed were CSAW, CPTC and WRCCDC.
    • CTF Lead Organiser PARSEC, 2022: Led a team where we prepared challenges and organised the VeniVidiVici 2.0 CTF event including different hacking domains. Certificate here.
    • Department Academic Student Mentor 2020-2022, SMP, IIT Dharwad: served as a proactive academic student mentor, guiding sophomore students in careers and helping them academically. Certificate here.
    • Technical Team Member & Provisional PR 2020-2021, CDC, IIT Dharwad: Responsible for creation and maintenance of CDC website alongwith one of the points of contacts for inviting various companies for internships and placements at CSE Department, IIT Dharwad. Letter here.
    • Core Team Member 2019-2020, IIC, IIT Dharwad: Helped intricately in conducting various innovation and entrepreneurship related activities, and to systematically foster the culture of innovation in IIT Dharwad.
    • Student Mentor 2019-2020, SMP, IIT Dharwad: served as a proactive student mentor, guiding freshmen & sophomore students through their primitive years in college. Certificate here.
    • Sponsorship Lead, PARSEC, 2020: devised strategies to overcome target budgets and achieved so by collaborating with industry giants like GitHub, Matic, SBI, etc. Certificate here.
    • Contingent Co-Ordinator, Inter IIT Tech Meet 8.0 (2019), IIT Roorkee: Optimizing with the resources we had, made plans on selections of teams to more events alongwith providing guidance to freshmen to make reports and synopsis.
    • Campus Ambassador, TechFest, 2020: Marketing and organising the events from scratch in the TechFest, IIT Bombay. Certificate here.
    • Class Representative 2018-2019, CSE Department, IIT Dharwad: Class Representative for Computer Science & Engineering Department. Certificate here.

    Miscellaneous


    Skills

    Programming Languages
    Markdown Languages
    Version Control System