- Security, trust, and privacy of distributed systems [Dr. Hrishikesh Acharya, Dr. Mohan Dhawan, Prof. Anupam Joshi]
Networks play a very important role in Computer Science; the Internet and the World Wide Web are not only essential for functioning in modern society, but in fact provide a platform for new networks, such as peer-to-peer and social networks. The study of the rights and privileges of multiple users of a complex shared system, such as a network, is a very important. We focus on developing a solid understanding of a few closely related areas, as follows: Network policies, such as firewalls, and the irdesign and verification; Network tracing, i.e.topology reconstruction of networks; Design and analysis of secure network protocols; The interaction of agents in a network.
- Privacy & Anonymity [Dr. Sambuddho Chakravarty]
Our interest in in exploring and studying attacks in low latency anonymity preserving networks, defenses against them and ways to
identify potential adversaries. This area also overlaps with Network Anonymity, Privacy, and Network Security.
- Software security [Dr. Rahul Purandare, Mr. Sanjay Bahl, Dr. Mohan Dhawan]
Program analysis techniques have been employed in the past to ensure that programs do not violate safety properties. More recently, there has been a growing interest in the development of analysis techniques to address issues related to software security. Security properties and features often evolve with the software and the analysis techniques need to be efficient as well as adaptive to the changing environment and requirements. Dynamic program analysis is particularly attractive due to its high precision, scalability and adaptability.
- Multimedia security [Dr. A V Subramanyam]
Digital Multimedia Signal Processing for Multimedia Security and Forensics can function as a source of intelligence in establishing the authenticity of a test media. Images/Videos captured by CCTV or other devices are often used for investigations as well as evidences in a court of law in India. These CCTV videos/images can be used to identify perpetrators of the crime. Digital media forensics is also useful under broadcasting scenarios as well as social media information sharing. As digital media can be easily altered for many reasons, identification of fake media can reduce the biased social and political outlook in the society.
- Policy issues of cybersecurity [Dr. Anupam Joshi, Mr. Sanjay Bahl, Dr. PK]
Our interest is in studying the effects of security and privacy
policies on technology and people. We are also interested in studying
the techno-legal effects of security and privacy. Our interest is in
understanding the security and privacy perceptions of Indian citizens.
- Privacy & security in complex systems [Dr. Mohan Dhawan, Dr. PK]
With increase in usage of the Internet, there has been an exponential increase in the use of online social media on the Internet. Websites like Facebook, Google+, YouTube, Orkut, Twitter and Flickr have changed the way Internet is being used. There is a dire need to investigate, study and characterize privacy and security on online social media from various perspectives (computational, cultural, psychological). Real world scalable systems need to be built to detect and defend security and privacy issues on online social media. Our work derives techniques from Data Mining, Text Mining, Statistics, Network Science, Information Retrieval, Machine Learning, Complex networks.