MS Student in Computer Science - Graduate Research Assistant
Past: Software Engineer - Wi-Fi - Samsung Electronics
I am a Master of Science student in Computer Science at Arizona State University. I am pursuing my research under the supervision of Dr. Gail-Joon Ahn and Dr. Adam Doupé at The Laboratory of Security Engineering for Future Computing (SEFCOM). Before joining ASU, I have worked as a Software Engineer at Samsung Electronics. My research interests include cybersecurity, information assurance and SDN.
Courses taken during the undergraduate program: Programming in Java, Operating Systems, Embedded Systems, Network Security, Parallel Programming,
Data Structures and Algorithms and Software Design
Youngest member of the Wi-Fi device driver team. Constructed 802.11 protocol based control plane networking features of Wi-Fi Access Point. Implemented Open, WEP, WPA, WPA2 and 802.11w secured connection procedures at Linux control plane. Consistently optimized the features to improve throughput and latency metrics. Finally, delivered the software for existing Samsung Android phones. All these with extensive study of Wi-Fi specification and within the tight deadlines.
Courses taken during the graduate program: Automatic Binary Code/Software Analysis, Embedded Operating System Internals, Mobile Computing, Software Security,
Foundation of Algorithms, Data Mining, Knowledge Representation and Thesis
Designing a novel SDN-based adaptive security mechanism on ASU’s Science-DMZ network. Devising countermeasure generation algorithm on Elastic Search Cluster using attack graph with CVSS scores of compromised services. Results of this research are proving useful in blacklisting IPs performing brute force attacks and for hardening campus network servers.
Now looking for full-time opportunities in cybersecurity, SDN, NFV and information assurance
Performed intensive research of various proposed works on SDN-based firewalls.
This included academic works like FortNOX, FlowGuard and industry accepted advanced firewalls like Palo Alto firewalls.
The goal was to discover the challenges faced by these firewalls and their readiness for the production networks.
Process: Identified various metrics on which seven different firewalls were measured. Extended one of these work locally to evaluate challenges involved in networks which scale dynamically.
Results: The underlying challenges were discovered and firewalls were rated on different metrics. Proposed "network mapping" and "node caching" approaches to improve performance of firewall's conflict detection module. As a novel contribution, corrected the violation resolution approaches by introducing fine-granularity of flow rules. Proposed an "adaptive" firewall: process of detection and resolution made automated for a robust user experience.
Goal: To lure attackers to target an imitated version of production network (HoneyNet) and later analyze their methods
and intentions by employing a covert proxy (HoneyProxy).
Process: Design and develop an SDN based network of Honeypots which run dummy WEB and FTP services (potential target of these attackers). Go public with this imitated services. Prevent internal propagation of malware to production network by leveraging SDN's centralized view to install secured flow policies. Analyze the method and intentions of attacks. Do not leak the "honey" - prevent Honeypots from being fingerprinted by dynamically improving covert proxy. Results of this research proved useful in blacklisting IPs performing brute force attacks and for hardening campus network servers.
The project is part of the course “Embedded Operating System Internals”. The project aims to provide an understanding of internals of Linux and RTOS kernel architecture and implementing device drivers. Investigated Linux kernel source code including memory management, kernel synchronization, device driver design and trace or debug support. Programmed ioctls, syscall interface, static and dynamic probes, misc drivers, etc. Developed and tested the device driver software on the target platform (Galileo Gen 2).
Participated in a project based CTF game. Developed a Python vulnerability detection engine. Contributed to the defense framework to reverse engineer the binaries, patch the application/web vulnerabilities in real time. An automated TCP/IP attack re-launch mechanism from victim to the attacker: Built a Python based network daemon to impersonate the victim IP addresses using ARP spoofing and relaunch the attack from victim to attacker. Used extensive libraries from Python Scapy packet for Deep Packet Inspection and modification. The team won the iCTF competition.