Overview
The teams active in this research area work on design methods, technologies, and tools that positively influence both the theory and practice of cybersecurity and privacy, spanning the whole range of needs created by digital technologies.
Fields
This team’s research and innovation efforts cover the following five themes:
Trustworthy data management: This team works on maintaining the long-term integrity of data; protecting both data and computations on the cloud; optimizing protections for data in the light of regulatory concerns; and providing new data controls for openness and transparency
Privacy by design: The marquee project under this theme tries to balance utility and privacy by allowing the data principal to choose between the two. Another project tries to move these concerns to an earlier stage in the SDLC, making it easier to guarantee software that respects privacy and privacy regulations
Access control, authentication, and authorization: This team works to address access control limitations, while also devising ways to protect newer mechanisms that implement access control in a scalable manner
Combating internal threats: This research group works on detecting and eliminating internal threats that target system vulnerabilities and risks
Security of cyber-physical systems: This team works on resolving the security and privacy issues faced by devices that do not have a traditional interface and hence cannot employ the same protections as other machines
People & Patents
Research team: Led by Principal Scientist Sachin Lodha and Principal Scientist Sitaram Chamarty, the team includes Vijayanand Banahatti; Srinivasa Rao Chalamala; Praveen Gauravaram; Mangesh Gharote; Rajan M. A.; Vigneswaran R.; Rajidi Satish Chandra Reddy; Sumanta Sarkar; Manish Shukla; and Kumar Vidhani
Academic partners: Blavatnik Interdisciplinary Cyber Research Center, Tel Aviv University, Israel; Cybersecurity Cooperative Research Centre, Australia
- Patents This research group has received over 40 patents and has had its work published in over 20 journals and conferences
- Publications since 2016
Lightweight diffusion layer: Importance of Toeplitz matrices
Fast Software Encryption
23/01/2017
Sumanta Sarkar, Habeeb Basha Syed,
An integrated framework to measure the energy consumption of a parallel application on a computational grid
International Journal of Computer Science and Network Security
15/05/2016
Rajan M A,
Analysis of Toeplitz MDS Matrices
Australasian Conference on Information Security and Privacy
07/04/2017
Sumanta Sarkar, Habeeb Basha Syed,
Lightweight Design Choices for LED-like Block Ciphers
International Conference on Cryptology
05/10/2017
Sumanta Sarkar, Habeeb Basha Syed,
LIGHTER-R: Optimized Reversible Circuit Implementation for SBoxes
International System-on-Chip Conference
03/07/2019
Sumanta Sarkar,
Rotate to Protect
Symposium on Usable Privacy and Security
03/06/2016
Harshal Tupsamudre, Akhil Dixit, Vijayanand Mahadeo Banahatti, Sachin Lodha, Manish Shukla,
A User Study about Security Practices of Less-Literate Smartphone Users
International Conference on Intelligent Human Computer Interaction
19/10/2016
Pankaj H Doke, Sylvan Lobo,
Enterprise Digital Rights Management for Document Protection
IEEE International Conference on Advanced Information Networking and Applications
23/12/2016
Rajidi Satish Chandra Reddy, Srinivas G Reddy,
A Dynamic Delegation Model and Prototype for an Enterprise Context
IEEE Conference on Open Systems
24/09/2017
Rajidi Satish Chandra Reddy, Srinivas G Reddy,
Performance Analysis of Sorting of FHE Data: Integer-wise Comparison vs Bit-wise Comparison
IEEE International Conference on Advanced Information Networking and Applications
22/12/2016
Harika Narumanchi, Nitesh Emmadi, Praveen Gauravaram,
Homomorphic Encryption: Enabling Secure Computations on Encrypted Data
White Papers
28/08/2019
Nitesh Emmadi, Rajan M A, Harika Narumanchi,
Thermal Infrared Face Recognition: A Review
International Conference on Computer Modelling and Simulation
13/03/2017
Krishna Rao, Srinivasa Rao Chalamala,
A System for Handwritten and Printed Text Classification
International Conference on Computer Modelling and Simulation
09/03/2017
Bala Mallikarjuna Rao Garlapati, Srinivasa Rao Chalamala,
Cross Local Gabor Binary Pattern Descriptor with Probabilistic Linear Discriminant Analysis for Pose-Invariant Face Recognition
International Conference on Computer Modelling and Simulation
09/03/2017
Santosh Kumar Jami, Krishna Rao, Srinivasa Rao Chalamala,
A Fuzzy Approach to Mute Sensitive Information in Noisy Audio Conversations
International Conference on Computational Linguistics and Intelligent Text Processing
21/02/2019
Imran Ahamad Sheikh, Sunil Kumar Kopparapu, Srinivasa Rao Chalamala, Bala Mallikarjuna Rao Garlapati,
From Strings to Things: Knowledge-Enabled VQA Model That Can Read and Reason
IEEE International Conference on Computer Vision
22/07/2019
Ajeet Kumar Singh,
Biometric Template Protection Through Adversarial Learning
IEEE International Conference on Consumer Electronics
05/09/2018
Santosh Kumar Jami, Srinivasa Rao Chalamala, Arun Kumar Jindal,
Securing Face Templates using Deep Convolutional Neural Network and Random Projection
IEEE International Conference on Consumer Electronics
05/09/2018
Arun Kumar Jindal, Srinivasa Rao Chalamala, Santosh Kumar Jami,
Face Template Protection Using Deep Convolutional Neural Network
Conference on Computer Vision and Pattern Recognition
04/04/2018
Arun Kumar Jindal, Srinivasa Rao Chalamala, Santosh Kumar Jami,
OCR-VQA: Visual Question Answering by Reading Text in Images
International Conference on Document Analysis and Recognition
20/05/2019
Ajeet Kumar Singh,
Deep Embedding using Bayesian Risk Minimization with Application to Sketch Recognition
Asian Conference on Computer Vision
15/06/2018
Ajeet Kumar Singh,
Security Analysis of a Design Variant of Randomized Hashing
Applications and Techniques in Information Security
24/04/2017
Praveen Gauravaram,
Multi-objective Stable Matching with Ties
IEEE International Conference on Industrial Engineering and Engineering Management
01/08/2017
Nitin Phuke, Mangesh Gharote, Sachin Lodha,
Practical Deployability of Permissioned Blockchains
Blockchain and Smart Contract Technologies
23/06/2018
Nitesh Emmadi, Vigneswaran, Srujana, Lakshmi Padmaja, Harika Narumanchi,
Introduction to blockchain
General Technical Topic
14/12/2019
Rajan M A,
Practical Challenges in Blockchain
General Technical Topic
18/09/2019
Vigneswaran,
VeriBlock: A novel blockchain framework based on verifiable computing and trusted execution environment
International Conference on COMmunication Systems and NETworkS
16/12/2019
Meena Singh Dilip Thakur, Lakshmi Padmaja, Rajan M A, Vigneswaran, Srujana, Batsayan Das,
Practical Deployability of Permissioned Blockchains
Blockchain and Smart Contract Technologies
23/06/2018
Nitesh Emmadi, Vigneswaran, Srujana, Lakshmi Padmaja, Harika Narumanchi,
pFilter - Retrofitting Legacy Applications for Data Privacy
ACM Conference on Computer and Communications Security
16/09/2019
Manish Shukla, Sachin Lodha, Vijayanand Mahadeo Banahatti, Gangadhara Reddy, Kumar Mansukhlal Vidhani,
Force vs. Nudge: Comparing Users Pattern Choices on SysPal and TinPal
ACM Conference on Computer and Communications Security
16/09/2019
Harshal Tupsamudre, Sukanya Vaddepalli, Vijayanand Mahadeo Banahatti, Sachin Lodha,
PRAN: A Provenance Based Model and Prototype to Strengthen Authentication
IEEE International Conference on Advanced Information Networking and Applications
14/01/2019
Rajidi Satish Chandra Reddy, Srinivas G Reddy
A Recommender System for efficient implementation of PrivacyPreserving Machine Learning Primitives based on FHE
International Symposium on Cyber Security Cryptology and Machine Learning
02/07/2020
Imtiyazuddin Shaik, Ajeetk Singh1, H Narumanchi, Nitesh Emmadi1, Rajan Ma