Projects and Membership...
Research Projects (PI and Co-PI)
3. 6G Orchestration (June 2022 - December 2022), £ 34,000
Co-PI, Funded by Thales, UK.
2. Real-Time Non-GPS cooperative vehicular communication-based Navigation System
Funded by Skolkovo Foundation Russian (2016-)
1. Enabling technologies and their security in smart cities
Funded by ZU (2021-2022)
Summer Internships 2020
Comparative analysis of cryptographic protocols in IoT
Summer Internships 2019
Community detection in vehicular social networks
Vulnerable boxes
Summer Internships 2018
IOTA-based microtransactions (still active)
WebApp vulnerabilities (OWASP)
Banking Malware
Named Data Networking-based VANET (still active)
Summer Internships 2017
NDN-driven depth-based forwarding in underwater sensor networks (topic still active)
Interface ranking in Named Data Networking (topic still active)
Efficient CS management in Named Data Networking (Published in IEEE PIMRC 2018)
Supervised Research Projects (MS-SSNE)
[2019]
Containerized environment for malware analysis
Blockchain-based Public Key Infrastructure (PKI) (Paper under review)
Comparative analysis of distributed ledger technologies for smart contract development (Paper accepted in IEEE PIMRC 2019)
Open-source framework for security event monitoring visualization based on remote desktop protocol-related event logs
Passive scan on network processor CC3100
Location-based secret sharing protocol (Paper in preparation for IEEE WiMob 2019)
Licensing and software protection in Docker environment
Analysis of FIDO2 standard and implementation of the biometric Android FIDO key
[2018]
BFT Consensus in Blockchain
Exploring Shodan's Database
Privacy Analysis in Social Networks
Probabilistic Estimation of Honeypot Detection (Paper published in IEEE ICNC 2018)
IaaS and SaaS from Scratch
Machine Learning-based DDoS Mitigation in SDN (Paper published in IEEE WiMob 2018)
Trust Management in SDN (Paper to be submitted to IEEE IEMCON 2019)
Secure Telemetry in Sailfish OS
[2017]
Samsung Smart TV Security Overview
Security Analysis of Telegram Voice Calls
Backdooring Android Firmware
Using Buffer Overflow Vulnerabilities for Code Execution
Mobile Application Security Assessment Using OWASP Mobile Security Project
ARP Covert Channel
Spoofing Android Camera (Paper published in IEEE SNPD 2018)
[2016]
Mapping IP address to Accounts in Social Networks
WiFi-based Access Control Service
Security in Public Places: Identifying Drug Intoxication by the Pupil Size
Non-destructive Attacks through Physical Access to Devices
Forging Virtual Environments by Untrusted Cloud Providers
File System Based on Social Networks Media Storage
Graph Watermarking
Analysis of Neural Cryptography-based Authenticated Key Exchange Protocol with Secret Boundaries
Analysis of Resource Consumption for Malware Detection in Mobile Environment
Backdooring Asymmetric Crypto Algorithms
Analysis of Security Issues in Open-source Software
Analysis of Bitcoin Block-chain Database for Clustering Wallets
Membership of Societies
1. Senior Member, IEEE (ComSoc, VT)
2. Member, ACM (Professional)
2. Student Member of IEEE.
3. Student Member of IEICE
4. Member of KIISC
5. Member of KIPS