Contact Us
We are taking you to another website now.

Overview

The teams active in this research area work on design methods, technologies, and tools that positively influence both the theory and practice of cybersecurity and privacy, spanning the whole range of needs created by digital technologies.

Fields

This team’s research and innovation efforts cover the following five themes:

  • Trustworthy data management: This team works on maintaining the long-term integrity of data; protecting both data and computations on the cloud; optimizing protections for data in the light of regulatory concerns; and providing new data controls for openness and transparency

  • Privacy by design: The marquee project under this theme tries to balance utility and privacy by allowing the data principal to choose between the two. Another project tries to move these concerns to an earlier stage in the SDLC, making it easier to guarantee software that respects privacy and privacy regulations

  • Access control, authentication, and authorization: This team works to address access control limitations, while also devising ways to protect newer mechanisms that implement access control in a scalable manner

  • Combating internal threats: This research group works on detecting and eliminating internal threats that target system vulnerabilities and risks

  • Security of cyber-physical systems: This team works on resolving the security and privacy issues faced by devices that do not have a traditional interface and hence cannot employ the same protections as other machines

People & Patents

  • Research team: Led by Principal Scientist Sachin Lodha and Principal Scientist Sitaram Chamarty, the team includes Vijayanand Banahatti; Srinivasa Rao Chalamala; Praveen Gauravaram; Mangesh Gharote; Rajan M. A.; Vigneswaran R.; Rajidi Satish Chandra Reddy; Sumanta Sarkar; Manish Shukla; and Kumar Vidhani

  • Academic partners: Blavatnik Interdisciplinary Cyber Research Center, Tel Aviv University, Israel; Cybersecurity Cooperative Research Centre, Australia

  • Patents  This research group has received over 40 patents and has had its work published in over 20 journals and conferences
  • Publications since 2016
  1. Lightweight diffusion layer: Importance of Toeplitz matrices

    Fast Software Encryption

    23/01/2017

    Sumanta Sarkar, Habeeb Basha Syed,

  2. An integrated framework to measure the energy consumption of a parallel application on a computational grid

    International Journal of Computer Science and Network Security

    15/05/2016

    Rajan M A,

  3. Analysis of Toeplitz MDS Matrices

    Australasian Conference on Information Security and Privacy

    07/04/2017

    Sumanta Sarkar, Habeeb Basha Syed,

  4. Lightweight Design Choices for LED-like Block Ciphers

    International Conference on Cryptology

    05/10/2017

    Sumanta Sarkar, Habeeb Basha Syed,

  5. LIGHTER-R: Optimized Reversible Circuit Implementation for SBoxes

    International System-on-Chip Conference

    03/07/2019

    Sumanta Sarkar,

  6. Rotate to Protect

    Symposium on Usable Privacy and Security

    03/06/2016

    Harshal Tupsamudre, Akhil Dixit, Vijayanand Mahadeo Banahatti, Sachin Lodha, Manish Shukla,

  7. A User Study about Security Practices of Less-Literate Smartphone Users

    International Conference on Intelligent Human Computer Interaction

    19/10/2016

    Pankaj H Doke, Sylvan Lobo,

  8. Enterprise Digital Rights Management for Document Protection

    IEEE International Conference on Advanced Information Networking and Applications

    23/12/2016

    Rajidi Satish Chandra Reddy, Srinivas G Reddy,

  9. A Dynamic Delegation Model and Prototype for an Enterprise Context

    IEEE Conference on Open Systems

    24/09/2017

    Rajidi Satish Chandra Reddy, Srinivas G Reddy,

  10. Performance Analysis of Sorting of FHE Data: Integer-wise Comparison vs Bit-wise Comparison

    IEEE International Conference on Advanced Information Networking and Applications

    22/12/2016

    Harika Narumanchi, Nitesh Emmadi, Praveen Gauravaram,

  11. Homomorphic Encryption: Enabling Secure Computations on Encrypted Data

    White Papers

    28/08/2019

    Nitesh Emmadi, Rajan M A, Harika Narumanchi,

  12. Thermal Infrared Face Recognition: A Review

    International Conference on Computer Modelling and Simulation

    13/03/2017

    Krishna Rao, Srinivasa Rao Chalamala,

  13. A System for Handwritten and Printed Text Classification

    International Conference on Computer Modelling and Simulation

    09/03/2017

    Bala Mallikarjuna Rao Garlapati, Srinivasa Rao Chalamala,

  14. Cross Local Gabor Binary Pattern Descriptor with Probabilistic Linear Discriminant Analysis for Pose-Invariant Face Recognition

    International Conference on Computer Modelling and Simulation

    09/03/2017

    Santosh Kumar Jami, Krishna Rao, Srinivasa Rao Chalamala,

  15. A Fuzzy Approach to Mute Sensitive Information in Noisy Audio Conversations

    International Conference on Computational Linguistics and Intelligent Text Processing

    21/02/2019

    Imran Ahamad Sheikh, Sunil Kumar Kopparapu, Srinivasa Rao Chalamala, Bala Mallikarjuna Rao Garlapati,

  16. From Strings to Things: Knowledge-Enabled VQA Model That Can Read and Reason

    IEEE International Conference on Computer Vision

    22/07/2019

    Ajeet Kumar Singh,

  17. Biometric Template Protection Through Adversarial Learning

    IEEE International Conference on Consumer Electronics

    05/09/2018

    Santosh Kumar Jami, Srinivasa Rao Chalamala, Arun Kumar Jindal,

  18. Securing Face Templates using Deep Convolutional Neural Network and Random Projection

    IEEE International Conference on Consumer Electronics

    05/09/2018

    Arun Kumar Jindal, Srinivasa Rao Chalamala, Santosh Kumar Jami,

  19. Face Template Protection Using Deep Convolutional Neural Network

    Conference on Computer Vision and Pattern Recognition

    04/04/2018

    Arun Kumar Jindal, Srinivasa Rao Chalamala, Santosh Kumar Jami,

  20. OCR-VQA: Visual Question Answering by Reading Text in Images

    International Conference on Document Analysis and Recognition

    20/05/2019

    Ajeet Kumar Singh,

  21. Deep Embedding using Bayesian Risk Minimization with Application to Sketch Recognition

    Asian Conference on Computer Vision

    15/06/2018

    Ajeet Kumar Singh,

  22. Security Analysis of a Design Variant of Randomized Hashing

    Applications and Techniques in Information Security

    24/04/2017

    Praveen Gauravaram,

  23. Multi-objective Stable Matching with Ties

    IEEE International Conference on Industrial Engineering and Engineering Management

    01/08/2017

    Nitin Phuke, Mangesh Gharote, Sachin Lodha,

  24. Practical Deployability of Permissioned Blockchains

    Blockchain and Smart Contract Technologies

    23/06/2018

    Nitesh Emmadi, Vigneswaran, Srujana, Lakshmi Padmaja, Harika Narumanchi,

  25. Introduction to blockchain

    General Technical Topic

    14/12/2019

    Rajan M A,

  26. Practical Challenges in Blockchain

    General Technical Topic

    18/09/2019

    Vigneswaran,

  27. VeriBlock: A novel blockchain framework based on verifiable computing and trusted execution environment

    International Conference on COMmunication Systems and NETworkS

    16/12/2019

    Meena Singh Dilip Thakur, Lakshmi Padmaja, Rajan M A, Vigneswaran, Srujana, Batsayan Das,

  28. Practical Deployability of Permissioned Blockchains

    Blockchain and Smart Contract Technologies

    23/06/2018

    Nitesh Emmadi, Vigneswaran, Srujana, Lakshmi Padmaja, Harika Narumanchi,

  29. pFilter - Retrofitting Legacy Applications for Data Privacy

    ACM Conference on Computer and Communications Security

    16/09/2019

    Manish Shukla, Sachin Lodha, Vijayanand Mahadeo Banahatti, Gangadhara Reddy, Kumar Mansukhlal Vidhani,

  30. Force vs. Nudge: Comparing Users Pattern Choices on SysPal and TinPal

    ACM Conference on Computer and Communications Security

    16/09/2019

    Harshal Tupsamudre, Sukanya Vaddepalli, Vijayanand Mahadeo Banahatti, Sachin Lodha,

  31. PRAN: A Provenance Based Model and Prototype to Strengthen Authentication

    IEEE International Conference on Advanced Information Networking and Applications

    14/01/2019

    Rajidi Satish Chandra Reddy, Srinivas G Reddy

  32. A Recommender System for efficient implementation of PrivacyPreserving Machine Learning Primitives based on FHE

    International Symposium on Cyber Security Cryptology and Machine Learning

    02/07/2020

    Imtiyazuddin Shaik, Ajeetk Singh1, H Narumanchi, Nitesh Emmadi1, Rajan Ma

What’s your challenge?
Let’s work together to solve it.
More Like This
×

Thank you for downloading

Your opinion counts! Let us know what you think by choosing one option below.