Skip to main content
Skip to footer
Contact Us
We are taking you to another website now.

Overview

The teams active in this research area work on designing methods, technologies, and tools that positively influence both the theory and practice of cybersecurity and privacy, spanning the whole range of needs created by digital technologies.

Themes

This team’s research and innovation efforts cover the following five themes:

  • Trustworthy AI: Suitably tweaked training data can lead to untrustworthy AI systems. Alternatively, systematic querying to existing models can help invert them, learn training data, and thus breach privacy. This has serious safety repercussions, with everything being connected in different domains. The research group under this theme aims to make AI more transparent, trustworthy, and ensure security in untrusted environments.
  • Privacy by Design: Privacy is typically an afterthought and added later as a bolt on. This turns out to be a more expensive and less effective solution compared to embedding privacy in the whole software / system design and consideration right at the start. The marquee project under this theme tries to balance utility and privacy by allowing the data principal to choose between the two. Another project tries to move these concerns to an earlier stage in the SDLC, making it easier to guarantee software that respects privacy and privacy regulations
  •  De-Risking Cloud: There is an explosion in the cloud adoption for the agility, flexibility, and economies of scale it offers. However, security and privacy of data in cloud continue to remain major concerns. The research group under this theme works to secure data processing/storage in cloud, minimize data exposure to field agents and enable data sharing in a privacy preserving manner.
  • Strengthening the ‘Carbon’ Layer: Human is always considered as the weakest link when it comes to security. The research group under this theme works on detecting and eliminating internal threats that target system vulnerabilities and risks and also addressing traditional access control limitations.
  •  Securing Internet of Things: While IoT has a lot of disruptive potential, catastrophe awaits in its new vulnerabilities and dangers. The research group under this theme works on resolving the security and privacy issues faced by devices that do not have a traditional interface and hence cannot employ the same protections as other machines

People & Patents

  • Research team: Led by Chief Scientist Dr. Sachin Lodha and Principal Scientist Sitaram Chamarty, the team includes Vijayanand Banahatti; Srinivasa Rao Chalamala; Praveen Gauravaram; Mangesh Gharote; Rajan M. A.; Vigneswaran R.; Rajidi Satish Chandra Reddy; Sumanta Sarkar; Manish Shukla; and Kumar Vidhani
  • Academic partners: Blavatnik Interdisciplinary Cyber Research Center, Tel Aviv University, Israel; Cybersecurity Cooperative Research Centre, Australia
  • Patents This research group has received over 40 patents and has had its work published in over 20 journals and conferences
  • Publications since 2016

1. Privacy Preserving Machine Learning for Malicious URL Detection

Database and Expert Systems Applications (DEXA) 2021 Workshops

27/09/2021

Imtiyazuddin Shaik, Nitesh Emmadi, Harshal Tupsamudre, Harika Narumanchi and Rajan A

2. Visuals Triumph in a Curious Case of Privacy Policy.

IFIP Conference on Human Computer Interaction (INTERACT) 2021

30/08/2021

Shree Nivas, Gokul CJ, Vijayanand Banahatti and Sachin Lodha

3. Privacy Enabled Password Strength Meters with FHE

International Symposium on Cyber Security Cryptography and Machine Learning

09/07/2021

Imtiyazuddin Shaik, Harshal Tupsamudre, Nitesh Emmadi, Harika Narumanchi, Rajan M A and Sachin Lodha

4. Privacy Enabled Immunity Credential System on Blockchain.

Hyperledger Global Forum, 2021

09/06/2021

Harika Narumanchi, Nitesh Emmadi and Lakshmi Padmaja Maddali

5. Multi-Objective Optimization for Virtual Machine Allocation in Computational Scientific Workflow Under Uncertainty

11th International Conference on Cloud Computing and Services Science

28/04/2021

Arun Ramamurthy, Priyanka D. Pantula, Mangesh Gharote, Kishalay Mitra and Sachin Lodha

6. Secure and Privacy Preserving Method for Biometric Template Protection using Fully Homomorphic Encryption.

IEEE International Conference on Trust, Security and Privacy in Computing and Communications

05/12/2020

Imtiyazuddin Shaik, Arun Kumar Jindal, Vasudha Vasudha, Srinivas Rao Chalamala, Rajan M A and Sachin Lodha.

7. Generic CAPTCHA Solver using Histogram of Oriented Gradient.

International Conference on Information Systems Security (ICISS) 2020

20/12/2020

Abhijit Chougule, Harshal Tupsamudre and Sachin Lodha

8. PETA: Privacy Enabled Task Allocation.

IEEE International Conference on Services Computing

11/11/2020

Nitin Phuke, Saket Kumar Saurabh, Mangesh Gharote and Sachin Lodha

9. Selection of Cloud Service Providers in Multi-Cloud: A Comprehensive Methodology.

IEEE International Conference on Services Computing (SCC)

01/11/2020

Arun Ramamurthy, Saket Kumar Saurabh, Santosh Palaskar, Mangesh Gharote and Sachin Lodha.

10. rProfiler: Assessing Insider Influence on Enterprise Assets

ACM SIGSAC Conference on Computer and Communications Security

30/10/2020

Manish Shukla and Sachin Lodha.

11. PassO – New Circular Pattern Lock Scheme Evaluation

International Conference on Human-Computer Interaction with Mobile Devices and Services

05/10/2020

Sukanya Vaddepalli, Shree Nivas, Gokul CJ, Gangadhara Sirigireddy, Vijayanand Banahatti and Sachin Lodha.

12. A Patch Prioritization Framework for SCADA Chain in Smart Grid

Annual International Conference on Mobile Computing and Networking (MobiCom) 2020

21/09/2020

Geeta Yadav, Praveen Gauravaram and Arun Jindal.

13. Passworld: A Serious Game for Enterprise Password Awareness

Symposium on Usable Privacy and Security (SOUPS), 2020

11/08/2020

Gokul CJ, Gangadhara Sirigireddy, Sukanya Vaddepalli, Vijayanand Banahatti, Sachin Lodha and Sankalp Pandit

14. A Recommender System for efficient implementation of Privacy Preserving Machine Learning Primitives based on FHE

International Symposium on Cyber Security Cryptology and Machine Learning

02/07/2020

Imtiyazuddin Shaik, Ajeetk Singh1, H Narumanchi, Nitesh Emmadi1, Rajan Ma

15.  To infect or not to infect: a critical analysis of infective countermeasures in fault attacks

Journal of Cryptographic Engineering

23/05/2020

Anubhab Baksi, Dhiman Saha & Sumanta Sarkar

16. An Efficient Privacy-preserving IoT System for Face Recognition.

IEEE Workshop on Emerging Technologies for Security in IoT (ETSecIoT)

01/04/2020

Wanli Xue, Wen Hu, Praveen Gauranvaram, Aruna Seneviratne and Sanjay Jha

17. Decentralizing Access Controls through Blockchain

Hyperledger Global Forum 2020

06/03/2020

Nitesh Emmadi, Harshita Nallagonda and Vigneswaran R.

18. Veriblock: A Novel Blockchain Framework Based on Verifiable Computing and Trusted Execution Environment

International Conference on Communication Systems and Networks (COMSNETS) 2020

10/01/2020

Lakshmi Padmaja Maddali, Meena Singh, Vigneswaran R, Rajan MA, Srujana K, Batsayan Da

19. Introduction to blockchain

General Technical Topic

14/12/2019

Rajan M A,

20. VeriBlock: A novel blockchain framework based on verifiable computing and trusted execution environment

International Conference on COMmunication Systems and NETworkS

16/12/2019

Meena Singh Dilip Thakur, Lakshmi Padmaja, Rajan M A, Vigneswaran, Srujana, Batsayan Das,

21. pFilter - Retrofitting Legacy Applications for Data Privacy

ACM Conference on Computer and Communications Security

16/09/2019

Manish Shukla, Sachin Lodha, Vijayanand Mahadeo Banahatti, Gangadhara Reddy, Kumar Mansukhlal Vidhani,

22. Practical Challenges in Blockchain

General Technical Topic

18/09/2019

Vigneswaran,

23. Force vs. Nudge: Comparing Users Pattern Choices on SysPal and TinPal

ACM Conference on Computer and Communications Security

16/09/2019

Harshal Tupsamudre, Sukanya Vaddepalli, Vijayanand Mahadeo Banahatti, Sachin Lodha,

24. Homomorphic Encryption: Enabling Secure Computations on Encrypted Data

White Papers

28/08/2019

Nitesh Emmadi, Rajan M A, Harika Narumanchi,

25. LIGHTER-R: Optimized Reversible Circuit Implementation for SBoxes

International System-on-Chip Conference

03/07/2019

Sumanta Sarkar,

26. From Strings to Things: Knowledge-Enabled VQA Model That Can Read and Reason

IEEE International Conference on Computer Vision

22/07/2019

Ajeet Kumar Singh,

27. OCR-VQA: Visual Question Answering by Reading Text in Images

International Conference on Document Analysis and Recognition

20/05/2019

Ajeet Kumar Singh,

28. A Fuzzy Approach to Mute Sensitive Information in Noisy Audio Conversations

International Conference on Computational Linguistics and Intelligent Text Processing

21/02/2019

Imran Ahamad Sheikh, Sunil Kumar Kopparapu, Srinivasa Rao Chalamala, Bala Mallikarjuna Rao Garlapati,

29. PRAN: A Provenance Based Model and Prototype to Strengthen Authentication

IEEE International Conference on Advanced Information Networking and Applications

14/01/2019

Rajidi Satish Chandra Reddy, Srinivas G Reddy

30. Biometric Template Protection Through Adversarial Learning

IEEE International Conference on Consumer Electronics

05/09/2018

Santosh Kumar Jami, Srinivasa Rao Chalamala, Arun Kumar Jindal,

31. Securing Face Templates using Deep Convolutional Neural Network and Random Projection

IEEE International Conference on Consumer Electronics

05/09/2018

Arun Kumar Jindal, Srinivasa Rao Chalamala, Santosh Kumar Jami,

32. Deep Embedding using Bayesian Risk Minimization with Application to Sketch Recognition

Asian Conference on Computer Vision

15/06/2018

Ajeet Kumar Singh,

33. Practical Deployability of Permissioned Blockchains

Blockchain and Smart Contract Technologies

23/06/2018

Nitesh Emmadi, Vigneswaran, Srujana, Lakshmi Padmaja, Harika Narumanchi,

34. Practical Deployability of Permissioned Blockchains

Blockchain and Smart Contract Technologies

23/06/2018

Nitesh Emmadi, Vigneswaran, Srujana, Lakshmi Padmaja, Harika Narumanchi,

35. Face Template Protection Using Deep Convolutional Neural Network

Conference on Computer Vision and Pattern Recognition

04/04/2018

Arun Kumar Jindal, Srinivasa Rao Chalamala, Santosh Kumar Jami,

36. Lightweight Design Choices for LED-like Block Ciphers

International Conference on Cryptology

05/10/2017

Sumanta Sarkar, Habeeb Basha Syed,

37. A Dynamic Delegation Model and Prototype for an Enterprise Context

IEEE Conference on Open Systems

24/09/2017

Rajidi Satish Chandra Reddy, Srinivas G Reddy,

38. Multi-objective Stable Matching with Ties

IEEE International Conference on Industrial Engineering and Engineering Management

01/08/2017

Nitin Phuke, Mangesh Gharote, Sachin Lodha,

39. Security Analysis of a Design Variant of Randomized Hashing

Applications and Techniques in Information Security

24/04/2017

Praveen Gauravaram,

40. Analysis of Toeplitz MDS Matrices

Australasian Conference on Information Security and Privacy

07/04/2017

Sumanta Sarkar, Habeeb Basha Syed,

41. Thermal Infrared Face Recognition: A Review

International Conference on Computer Modelling and Simulation

13/03/2017

Krishna Rao, Srinivasa Rao Chalamala,

42. A System for Handwritten and Printed Text Classification

International Conference on Computer Modelling and Simulation

09/03/2017

Bala Mallikarjuna Rao Garlapati, Srinivasa Rao Chalamala,

43. Cross Local Gabor Binary Pattern Descriptor with Probabilistic Linear Discriminant Analysis for Pose-Invariant Face Recognition

International Conference on Computer Modelling and Simulation

09/03/2017

Santosh Kumar Jami, Krishna Rao, Srinivasa Rao Chalamala,

44. Lightweight diffusion layer: Importance of Toeplitz matrices

Fast Software Encryption

23/01/2017

Sumanta Sarkar, Habeeb Basha Syed

45. Enterprise Digital Rights Management for Document Protection

IEEE International Conference on Advanced Information Networking and Applications

23/12/2016

Rajidi Satish Chandra Reddy, Srinivas G Reddy,

46. Performance Analysis of Sorting of FHE Data: Integer-wise Comparison vs Bit-wise Comparison

IEEE International Conference on Advanced Information Networking and Applications

22/12/2016

Harika Narumanchi, Nitesh Emmadi, Praveen Gauravaram,

47. A User Study about Security Practices of Less-Literate Smartphone Users

International Conference on Intelligent Human Computer Interaction

19/10/2016

Pankaj H Doke, Sylvan Lobo,

48. Rotate to Protect

Symposium on Usable Privacy and Security

03/06/2016

Harshal Tupsamudre, Akhil Dixit, Vijayanand Mahadeo Banahatti, Sachin Lodha, Manish Shukla,

49. An integrated framework to measure the energy consumption of a parallel application on a computational grid

International Journal of Computer Science and Network Security

15/05/2016

Rajan M A

What’s your challenge?
Let’s work together to solve it.
More Like This
×

Thank you for downloading

Your opinion counts! Let us know what you think by choosing one option below.