Back close

Jevitha K. P.

Assistant Professor, School of Computing, Coimbatore

Qualification: M.Tech.
kp_jevitha@cb.amrita.edu
Jevitha KP's Googler Scholar Profile
Research Interest: Android Security, Computer Networks, Mobile Security, Web & Mobile Application Development, Web Security

Bio

Jevitha K. P. currently serves as Assistant Professor (Sr. Grd.) at School of Computing, Coimbatore Campus. Her areas of research include Web Security, Android Security, Web and Mobile Application Development. She also serves as Assistant Professor at TIFAC-CORE in Cyber Security, Coimbatore Campus.

 

Publications

Journal Article

Year : 2020

Finite-state model extraction and visualization from Java program execution

Cite this Research Publication : K.P. Jevitha, J. Swaminathan, B. Jayaraman, M. Sethumadhavan, “Finite-state model extraction and visualization from Java program execution”, Software: Practice and Experience, vol. 51, pp. 409-437, 2021. DOI: https://doi.org/10.1002/spe.2910

Publisher : Wiley

Year : 2017

Stride based analysis of the chrome browser extensions API

Cite this Research Publication : P. K. Akshay Dev and Jevitha, K. P., “Stride based analysis of the chrome browser extensions API”, Advances in Intelligent Systems and Computing, vol. 516, pp. 169-178, 2017.

Publisher : Advances in Intelligent Systems and Computing

Year : 2017

Prevention of PAC File Based Attack Using DHCP Snooping

Cite this Research Publication : K. R. Atul and Jevitha, K. P., “Prevention of PAC File Based Attack Using DHCP Snooping”, Communications in Computer and Information Science, vol. 746, pp. 195-204, 2017.

Publisher : Communications in Computer and Information Science

Year : 2016

Static analysis of Firefox OS privileged applications to detect permission policy violations

Cite this Research Publication : S. P and Jevitha, K. P., “Static analysis of Firefox OS privileged applications to detect permission policy violations”, International Journal of Control Theory and Applications, vol. 9, no. 7, pp. 3085-3093, 2016.

Publisher : International Journal of Control Theory and Applications, International Science Press, Volume 9, Issue 7, p.3085-3093 .

Year : 2016

An encryption technique to thwart android binder exploits

Cite this Research Publication : Ya Kaladharan, Mateti, Pb, and Jevitha, K. P., “An encryption technique to thwart android binder exploits”, Advances in Intelligent Systems and Computing, vol. 385, pp. 13-21, 2016.

Publisher : Advances in Intelligent Systems and Computing, Springer Verlag.

Year : 2015

An automata based approach for the prevention of NOSQL injections

Cite this Research Publication : S. Joseph and Jevitha, K. P., “An automata based approach for the prevention of NOSQL injections”, Communications in Computer and Information Science, vol. 536, pp. 538-546, 2015.


Publisher : Communications in Computer and Information Science

Year : 2014

Web Services Attacks and Security- A Systematic Literature Review

Cite this Research Publication : V. R. Mouli and Jevitha, K. P., “Web Services Attacks and Security- A Systematic Literature Review”, Procedia Computer Science, vol. 93, pp. 870-877, 2014.

Publisher : Procedia Computer Science, Elsevier.

Conference Paper

Year : 2019

Runtime Verification and Vulnerability Testing of Smart Contracts

Cite this Research Publication : M. Abraham and Jevitha, K. P., “Runtime Verification and Vulnerability Testing of Smart Contracts”, in Advances in Computing and Data Sciences, Singapore, 2019, vol. 1046, pp. 333-342.

Publisher : Advances in Computing and Data Sciences, Springer Singapore

Year : 2018

Verification of OAuth 2.0 Using UPPAAL

Cite this Research Publication : K. S. Jayasri, Jevitha, K. P., and Jayaraman, B., “Verification of OAuth 2.0 Using UPPAAL”, in Social Transformation – Digital Way, Singapore, 2018, vol. 836, pp. 58-67.

Publisher : Social Transformation – Digital Way, Springer Singapore, Volume 836, Singapore

Year : 2017

CBEAT: Chrome Browser Extension Analysis Tool

Cite this Research Publication : S. Singha Roy and Jevitha, K. P., “CBEAT: Chrome Browser Extension Analysis Tool”, in Security in Computing and Communications, Singapore, 2017, vol. 746, pp. 364-378.

Publisher : Security in Computing and Communications, Springer Singapore.

Year : 2009

Security-aware Software Development Life Cycle (SaSDLC) – Processes and tools

Cite this Research Publication : A. K. Talukder, Maurya, V. K., Santhosh, B. G., Jangam, E., Muni, S. V., Jevitha, K. P., Saurabh, S., and Pais, A. R., “Security-aware Software Development Life Cycle (SaSDLC) - Processes and tools”, in 2009 IFIP International Conference on Wireless and Optical Communications Networks, 2009.

Publisher : 2009 IFIP International Conference on Wireless and Optical Communications Networks

Conference Proceedings

Year : 2014

Prediction of Cross-Site Scripting Attack Using Machine Learning Algorithms

Cite this Research Publication : K. P. Jevitha and Vishnu, B. A., “Prediction of Cross-Site Scripting Attack Using Machine Learning Algorithms”, Proceedings of the 2014 International Conference on Interdisciplinary Advances in Applied Computing ICONIAAC '14 , 55 vol. ACM, New York, NY, USA, 2014.

Publisher : Proceedings of the 2014 International Conference on Interdisciplinary Advances in Applied Computing ICONIAAC '14

Book Chapter

Year : 2016

A Systematic Review of Security Measures for Web Browser Extension Vulnerabilities

Cite this Research Publication : J. Arunagiri, Rakhi, S., and Jevitha, K. P., “A Systematic Review of Security Measures for Web Browser Extension Vulnerabilities”, in Proceedings of the International Conference on Soft Computing Systems: ICSCS 2015, , vol. 2, P. L. Suresh and Panigrahi, K. Bijaya, Eds. New Delhi: Springer India, 2016, pp. 99–112.

Publisher : Proceedings of the International Conference on Soft Computing Systems: ICSCS 2015, , Springer India.

Year : 2016

Evaluating the Effectiveness of Conventional Fixes for SQL Injection Vulnerability

Cite this Research Publication : S. Joseph and Jevitha, K. P., “Evaluating the Effectiveness of Conventional Fixes for SQL Injection Vulnerability”, in Proceedings of 3rd International Conference on Advanced Computing, Networking and Informatics: ICACNI 2015, Volume 2, A. Nagar, Mohapatra, P. Durga, and Chaki, N., Eds. New Delhi: Springer India, 2016, pp. 417–426.

Publisher : Proceedings of 3rd International Conference on Advanced Computing, Networking and Informatics: ICACNI 2015.

Year : 2009

Security-aware Software Development Life Cycle (SaSDLC) – Processes and tools

Cite this Research Publication : A. K. Talukder, Maurya, V. K., Santhosh, B. G., Jangam, E., Muni, S. V., Jevitha, K. P., Saurabh, S., and Pais, A. R., “Security-aware Software Development Life Cycle (SaSDLC) - Processes and tools”, in International Conference on Wireless and Optical Communications Networks IFIP , 2009, pp. 1- 5.

Publisher : International Conference on Wireless and Optical Communications Networks IFIP

Patents

Year : 2014

Transparent system for mitigating web vulnerabilities and method thereof

Cite this Research Publication : K. P. Jevitha and Rajeev, M., “Transparent system for mitigating web vulnerabilities and method thereof, Application No. 106/CHE/2014, Filed on January 9”, 2014.

Admissions Apply Now