Rishit Saiya

Cyber Security - USC | Gold Medalist - IIT Dharwad (2018-22)


Resume here



Note: This is a complete resume and, thus, maybe a really long read.


 
 
 

Education

University of Southern California (USC)

Masters in Sciences, Cyber Security
Aug 2022 - Present

Indian Institute of Technology (IIT), Dharwad

B.Tech in Computer Science and Engineering

CGPA: 8.94 [Director Gold Medalist]

Degree Certificate: Here
Transcript: Here
Gold Medal Accolade: Certificate | 3rd Convocation of IIT Dharwad
Aug 2018 - April 2022

Velociity Junior College, Hyderabad

HSC

Percentage: 98.6%

HSC Certificate: Here
May 2016 - May 2018

Narayana CO Spark, SCO, Hyderabad

SSC

CGPA: 10/10

SSC Certificate: Here
May 2015 - April 2016

Research

SANNA: Secure Acceleration of Neural Network Applications

36th International Conference on VLSI Design (2023) and 22nd International Conference on Embedded Systems (2023) [VLSID]

The threat of Hardware Trojans looms large on safety-critical systems. A Design-For-Trust technique to mitigate this threat without significant loss in performance is to implement these systems as a Heterogeneous Secure System − HSS . An HSS is built using an array of trustworthy home-grown cores and untrusted but fast third-party cores in a way that prevents unverified results from third-party cores reaching IO peripherals and devices. In this work, we propose to use the unverified results to initiate a speculative execution of subsequent layers of a Neural Network (NN) application on trustworthy cores. Our experiments on six popular NN applications show that on an average, the secure execution on an HSS is slower than the corresponding untrusted execution by up to 6.26% as compared to the slowdown of 80.89% experienced by a conventional trustworthy system.

Fake Packet Generation, Detection and its analysis using Network Security

7th International Conference for Convergence in Technology (2022) [I2CT]

The threat of network Trojans looms largely on mission-critical applications. This research work illustrates the generation of fake packets distinct from general conventional network traffic and their detection using tools like Scapy, Snort, and simulation of an IDS (Intrusion Detection System). It caters to the execution of the Payload (packet generation) and its real-time analytical understanding based on MITM (Man-in-the-middle) attack and its illustration using Scapy, Wireshark & Snort, thus utilizing the network analysis techniques. Furthermore, Port Security strategies to mitigate the most-vulnerable threats are also defined, possible DNA cryptographic techniques, and state-of-the-art Quantum Cryptography is also explored comprehensively.

Reliability and Security of Edge Computing Devices for Smart Cities

Springer, Nature Switzerland AG (2023)

In today’s modern and developing world, security and privacy are essential ingredients for ensuring data safety and the legitimate access of one’s information for most of the real-time applications they utilize, be it using smartphones, laptops, tablets, or electronic gadgets which are connected through the Internet thus making it an easy target to leverage the security of that device, resulting in enabling the attackers getting access to the sensitive and confidential data of the individual or organization. With the progression of technology at such a rapid pace, it may be frequent to conclude that drones will be delivering goods and merchandise, thus catering to the accessibility of mobile hotspots and ensuring the security & surveillance of smart cities. Considering the long-term utility of drones for smart cities, there also comes the threat of cyber-attacks like Deauthentication Attacks, GPS Spoofing, etc., which will lead to the disclosure of sensitive information. The smart devices consist of various embedded SoCs (System-On-Chip), which are integrated to sustain a large amount of user data by focusing primarily on avoiding the trade-off between the complexity of the machine learning implemented model and the available compatible edge devices (Hardware SoCs). Thus, it is essential to enhance the security of edge devices on a large scale, specifically from the perspective of smart cities. Several researchers have also proposed methodologies to improve and sustain the security of smart devices using optimized blockchain-based security frameworks using physical parameters like temperature, light, etc. This chapter defines an insight towards ensuring the security (focuses majorly on the Edge computing devices) of the smart devices, which are the prime source to enhance and maximize privacy, thus enabling the smart cities to be more secure from any cyberattack.


Experience

Graduate Research Assistant

STEEL: Security Research Lab, USC Information Sciences Institute (ISI)

Research-I: PIRANHA Phishing Defence

  • Developing an interactive dialogue exchange IRC based systems that not only responses to the phishers but also elicits their information.
  • Aims to mitigate and defend against increasing threats of Phishing and social engineering attacks using automated HMI components.
  • Working on this research with Prof. Jelena Mirkovic, Genevieve Bartlett and Will Charnsethikul

Research-II: DISCERN: DeterLab/MergeTB [Grant #2319864] & SPHERE [Grant #2330066]

  • Developing Cybersecurity experiments in the new MergeTB testbed using and building on open source tools to develop cyber attacks scenarios using botnets and other such technologies.
  • Assisting in producing datasets that capture how attack technologies use resources, in comparison to benign resource usage that would come from typical permitted use of a system like DeterLab.
  • Working on this research with Prof. Jelena Mirkovic, Brian Kocoloski and Spencer Stingley

Aug 2022 - Present

Cyber Risk and Regulatory Intern

PwC, US

  • Worked in Cybersecurity, Risk & Regulatory practice wherein developed security strategies, DLP programs with policies to transform business operations. Integrated security compliances to perform cloud assessments focusing on DLP capabilities.
  • Designing and mapping security requirements of M365 suites and performed AWS cloud environment assessments to pertaining controls within the FFIEC, NIST CSF, CCF and ERC compliances.

Jun 2023 - Aug 2023

Teaching Assistant

  • Teaching Assistant for the course: CSCI 430 - Computer and Network Security
  • Assess assignments, labs, and exams, covering concepts of Cryptography, Key Management, IDS/IPS, Authentication/Authorization, DNS Security.
  • Conduct office hours to assist students in clarifying doubts.
  • Working on this course with Prof. Luis Garcia

Jan 2023 - May 2023

Cyber Security Intern

Toshiba, Bangalore

  • Integration of Security standards IEC 62351, IEC 61850 to ICS products
  • IED Development involving security standards like TLS, OCSP, LDAP, X509 Certificates and communication with RBAC servers and HMI systems.
  • Worked on a secured C Plugin compatible for a cross platform array of embedded devices over an automated substation.
Check out: Rishit Saiya - Certification

Oct 2021 - June 2022

Software Develeper Intern

  • Worked on an Ethereum based User Authenticated distributed ledger which is a highly flexible blockchain SDK architecture with great transaction performance on Web OS based devices.

  • Check out: Rishit Saiya - Recommendation

    Aug 2021 - Dec 2021

    Red Team Intern

  • Red Team Assessment, Realistic Attack scenarios using tactics, techniques, and procedures seen in real-world attacks, Tailored engagements to meet organizational needs, with objectives based on the most relevant risks to organization.
  • Detailed, concise reports with actionable recommendations to aid in remediating identified issues post-engagement. Assessments performed for clients like Hangyo Ice Creams, Indian Institute of Science [IISc] (Institute of Eminence).

  • Check out: Rishit Saiya - Certification
    Lecture: Scanning Phase - Ethical Hacking
    Assignments: Documentations and Writeups for challenges on TryHackMe

    December 2020 - June 2021

    Core Team Member, DSC - IIT Dharwad

    DSC Chapter, IIT Dharwad

  • Developer Student Club, IIT Dharwad is a university based community group for students interested in Google Developer Technologies. Students from all undergraduate or graduate programs with an interest in growing as a developer are welcome to join this chapter.
  • As a core member, we act as a link to support students grow their knowledge in a peer-to-peer learning environment and build solutions for local businesses and their community.

  • Check out: Rishit Saiya - DSC Profile

    September 2020 - April 2022

    CDC Member

    CDC, IIT Dharwad

  • CDC (Career Development Cell), IIT Dharwad is committed to provide assistance to the all students achieving their career goals. We were also responsible for facilitating the campus internships and placements for the students of IIT Dharwad.
  • I contributed in the Technical Team in making the content for the official documents, compliance and also drawing in industry leaders through my network for betterment of other colleagues.

  • Check out: Recommendation from executives

    July 2020 - April 2021

    Full Stack Developer

    Krishibharatham, Hyderabad

    The NGO's website focusing on their successful events, their motive and vision behind promoting native agricultural practices throughout the world.

    Check out: http://krishibharatham.org/
    Check out: Recommendation from Kauitlya Guduru

    March 2020 - May 2020

    Accepted Intern

    RCI Lab, DRDO, Hyderabad

  • The work was on a framework development for Network Interception of Malicious Packets using Machine Learning, Big Data and Information Security.

  • (The internship had to be on-site and was aborted due to COVID-19 pandemic).

    May 2020 - July 2020

    SUMMER INTERN TRAINEE

    • Evolution of Cyber Security Landscape
    • Information Security Standards
    • Networking & TCP/IP Fundamentals
    • Risk Management & Mitigation in Information Security & Compliance
    (No work can be revealed in compliance with Confendiatilty Policy of BioTelemetry, Inc.)

    Check out: Recommendation from Ketan Shah

    May 2019 - June 2019

    Projects

    CSAW - Embedded Security Challenge, 2020

    Team: TheHackingCompany

    Our team had to hack into the HiFive1-revB IoT board by exploiting the firmware of a Wi-Fi Access Point and corresponding firmware binary running on a RISC-V based Architecture on IoT platform using OSINT & other Open-Source Reverse Engineering tools like Ghidra.

    Problem Statement here
    Official CSAW-ESC, 2020 - GitHub Repository

    Qualification Phase:

    • Understand the working of a Wi-Fi Access Point on a RISC-V platform.
    • Explore all the security vulnerabilities on this RISC-V platform.
    • Try out the Reverse Engineering Reconnaissance Techniques using Ghidra.
    • Explain the details of the solutions to the three preliminary challenges.
    • Qualification Research Paper/Report
    Final Phase:
    • Reverse Engineered various Binary firmwares using techniques like Buffer Overflow, Port Scan in LAN using Nmap, Data Type Manipulation by Buffer Overflow, Simulation, Exploiting Assembly Language Code, etc.
    • Final Research Paper/Report
    Results:

    Securing Neural Networks against Hardware Trojans through Assisted Parallelization

    Embedded Systems security, Safety Critical Systems (B.Tech Project w/ Prof. Rajshekar K)

    Our research introduces a technique to improve the performance of a Neural-Network based application on a Heterogenous Secure System - a system that uses fast but untrusted third-party cores along with trusted but slow home-grown cores. The untrusted third-party cores serve to accelerate the execution of the NN on the home-grown cores through assisted parallelization. The work further proposes an ILP-based technique that groups NN layers into batches in a way that balances the execution latency of each batch across cores as well as minimizes the communication overhead incurred when sending the results from third-party cores to home-grown cores (for verification as well as ahead-of-time execution).

    Fake Packet Generation and Detection in Computer Networks

    Network Security, Snort, Scapy, Wireshark (RnD Project, IIT Dharwad)

    This research was originally designed to cater upon fake packet generation and their detection using Snort, simulation of a IDS (Intrusion Detection System). This is a base for understanding the Man in the Middle Attacks and their working using Scapy, Wireshark & Snort and networking techniques.

    Reliability and Security of Edge Computing Devices for Smart Cities

    Research (w/ Nikunj Pansari)

    This chapter defines an insight into the implemented and optimized approach towards ensuring the security (focuses majorly on the Edge computing devices) of the intelligent devices, which are the prime source to enhance and maximize privacy, thus enabling the smart cities to be more secure from any cyberattacks.
    The work also further proposes on how security and privacy are essential ingredients for ensuring data safety and the legitimate access of one’s information for most of the real-time applications they incur, be it using devices which are connected through the Internet thus making it an easy target to leverage the security of that device, resulting in enabling the attackers to get access to the sensitive and confidential data of the individual or organization.

    Resume Builder

    Spring Boot Framework, JPA-Hibernate, Postgres, AWS

    Developed a Spring Boot Web-Application, Resume Builder where user is authenticated using Spring Security to create their personal shareable resume/personal web-page bridged by Thymeleaf in the front-end which provides user data to HTML & CSS templates.
    Spring Boot application was integrated with JPA-Hibernate as Object-Relation mapping tool with Relational Database system - Postgres & Deployed on AWS.

    CTF Writeups

    Cryptography, Forensics, Reversing, Pwning and other Misc problems

    I commenced maintaining Writeups bit late since I started. But for all beginners, this consise list of all writeups will avail them to kickstart in CTFs. My current worldwide rank is 41st out of over 40,000 participants on CTFlearn.

    Ethereum Based TodoList

    Blockchain, Metamask, Ganache

    A ToDo list powered by Ethereum smart contracts using Truffle Framework created with the Solidity programming language. Finally a client side application using Node JS is created and deployed on Blockchain (using Ganache). The transactions will be monitored on Blockchain Network on browsers using MetaMask Ethereum Wallet.

    MICRO Compiler

    Yacc, Flex/Bison, C++

    A compiler for MICRO language using Flex for Scanner and Bison for Parser to build where Flex/Bison being C++ based.

    Code:

    Assembly BCD Packing

    Computer Architecture, Keil Emulator


    As a part of Computer Architecture Course Project, our team had to procure simulation of packing BCD Numbers on NXP's ARM Cortex M3-LPC1768. Using Keil's Emulator to simulate this process we produced packing of BCD numbers with and without usage of THUMB instructions. Further analysis like time of computations, total numbers of steps required as per instructions was also made.

    CodeShinobi

    DBMS, Django, ER Model


    As a part of Database Management Systems Course Project, our team had to make a project which could essentially display on the concepts grasped in the course and display its implementation in an application. We built a Django based coding practice platform for students. With a profile with proper analysis of correct vs incorrect code execution for a given user, we have provided in-built code editor with C, C++ and Python with syntax highlighting.

    D.R.D.O. SASE's UAV Fleet Challenge

    Inter IIT Tech Meet 8.0, IIT Roorkee

    A UAV Drone Swarm to spot a target amongst a clutter of different objects spread randomly over a grassy land and subsequently communicate the location of the target to their remaining two drones using swarm technology only.

    • Built the swarm focused on low-speed stability using Pixhawk as the flight controller and Ardupilot firmware.
    • Using a flooding based communication approach, drones publish their current GPS coordinates for Collision Avoidance and box location to all drones for cross-referencing.
    • GPS coordinates were obtained and appropriate movement commands were sent by Dronekit API which has access to all Ardupilot parameters in real-time.
    • The team used basic OpenCV for object detection instead of a Deep Learning frameworks like Tensorflow, due to heavy processing power of RPI and that was taken into consideration.
    • Our Team finished 4th in absolute scoring in D.R.D.O. SASE's UAV Fleet Challenge at Inter IIT Tech Meet 8.0, IIT Roorkee.

    Lumberjack (Domino Effect)

    Optimization, C++, Time/Space Complexity

    A bot that makes best decisions for lumberjack's route to make highest profits in given time span for different specifications of trees on grid.

    • Optimization using algorithms and STL in C++.
    • Implemented structures to refine the code and STL to improve the readability of the code.
    • Introspected the intricacies of the problem statement and calculated the best profits for any given grid scenario.

    Moodle

    MySQL, XAMPP, DBMS, HTML, CSS, JS

    A secure web application that serves as an Academic Portal for college.

    • Clean UI/UX design with CSS & JS.
    • Used PHP for server side scripting and MySQL, XAMPP for DBMS.
    • Registration and login features with bifurcative services given to Admin, Instructors and Students respectively.
    • Appropiate pages and services to respective designations in institution.

    TCTD Challenge

    Inter IIT Tech Meet 7.0, IIT Bombay

    A machine which can be used to transplant rice on smaller farms, a demographic that is often overlooked.

    • Keeping in mind the financial conditions of most of the small scale farmers, we planned to keep the cost of our device as low as possible.
    • We also aimed to keep our transplanting mechanism simple and robust so that it can be easily repaired by even an amateur mechanic.
    • Our Team finished 4th in relative scoring in TCTD Challenge Event at Inter IIT Tech Meet 7.0, IIT Bombay.

    Course Management System

    C, File Handling, Database Management

    A simple management system which enables the instructor & students of course to manage courses and participants.

    • A structured file handling project in C.
    • Implemented structures to refine the code and STL to improve the readability of the code.


    Awards

    • Top 30 Global Rank CSAW CTF 2022 in Global Stacked Category. CTF Team - USC Cyborg.
    • 2nd Runner Ups CSAW-ESC 2020 (India Region). Check Results of our Team TheHackingCompany at: Winners - CSAW ESC 2020.
    • 41st rank (out of over 75,000 participants) on CTFlearn Platform.
    • 9th rank (out of over 150 teams) in ByteCTF 2020. Certificate.
    • 4th in consecutive Inter IIT Tech Meet 7.0 & 8.0 in TCTD & DRDO SASE's UAV Problem respectively. TCTD Challenge, DRDO SASE’s UAV Challenge
    • Represented in IIT Dharwad Cyber Security Team at Inter IIT Tech Meet 8.0 in Payatu Infosec CTF Event. Inter IIT CTF.
    • IIT JEE Advanced Rank - 3567 { Percentile: 99.989 }
    • 7th rank in HSC Intermediate State Examination, Telagana State, India.
    • 1st - In school - Indian National Astronomy Olympiad qualified - 2016. Selection Letter.

    Certifications

    Positions of Responsibility

    • USC CTF Team Member 2022 - Present, Cyborg: Play CTFs and several other hacking challenges for CTF Team solving challenges in domains of Red Teaming, Blue Teaming, Purple Teaming, etc.
    • CTF Lead Organiser PARSEC, 2022: Led a team where we prepared challenges and organised the VeniVidiVici 2.0 CTF event including different hacking domains. Certificate here.
    • Department Academic Student Mentor 2020 - 22, SMP, IIT Dharwad: served as a proactive academic student mentor, guiding sophomore students in careers and helping them academically. Certificate here.
    • Technical Team Member & Provisional PR 2020 - 21, CDC, IIT Dharwad: Responsible for creation and maintenance of CDC website alongwith one of the points of contacts for inviting various companies for internships and placements at CSE Department, IIT Dharwad. Letter here.
    • Core Team Member 2019 - 2020, IIC, IIT Dharwad: Helped intricately in conducting various innovation and entrepreneurship related activities, and to systematically foster the culture of innovation in IIT Dharwad.
    • Student Mentor 2019 - 2020, SMP, IIT Dharwad: served as a proactive student mentor, guiding freshmen & sophomore students through their primitive years in college. Certificate here.
    • Sponsorship Lead, PARSEC, 2020: devised strategies to overcome target budgets and achieved so by collaborating with industry giants like GitHub, Matic, SBI, etc. Volunteer Certificate.
    • Contingent Co-Ordinator, Inter IIT Tech Meet 8.0 (2019), IIT Roorkee: Optimizing with the resources we had, made plans on selections of teams to more events alongwith providing guidance to freshmen to make reports and synopsis.
    • Campus Ambassador, TechFest, 2020: Marketing and organising the events from scratch in the TechFest, IIT Bombay. Certificate here.
    • Class Representative 2018-2019, CSE Department, IIT Dharwad: Class Representative for Computer Science & Engineering Department. Certificate here.


    Miscellaneous


    Skills

    Programming Languages
    Markdown Languages
    Version Control System