Ashok Kumar Mohan currently serves as Research Associate at TIFAC CORE in Cyber Security. His ares of interests are Cyber Forensics, Online Social Media Analysis.

Qualification:  M. Tech. in Cyber Security, Certified Ethical Cracker - InfySEC, Post-Graduate Certificate in Cyber Law-IGNOU and Red Hat Certified Technician.

Areas of  Research


Areas of  Research


Rumor Prediction in Social Media, Metadata Forensics, Slack Space Forensics and Wireless Security Audit

2016 Starting PhD coursework in Cyber Forensics under the guidance of Dr.Sethumadhavan M.     (Head, Centre for Cyber Security, AVV, Coimbatore)
2016 Research Project on FPGA based malware analysis using Honeypots for IBM
2015     Intrusion Prediction System (DRDO), Malware Analysis, IoT and Cyber Laws

OTP security (Sturdy - One Time Password) for bank sectors

2012 S6 Protocol (Sensing Shady Setups Spending Social Similarity) on Facebook Forensics

Guest Lectures/Mentorship


Guest Lectures/Mentorship


Hands on Workshop as resource person on X-Ways Forensics 18.6 Professional Edition on (29th February and 1st March 2016) at Cyber Forensics Research Lab (KLU), Krishnankovil (TN)

2015          Mentored Hack-a-thon event organized by Cyber Security and Privacy Foundation, (15th December) jointly organized by Learning Links India and U.S Consulate General, Chennai at PSG College of Technology, Coimbatore
2015 Guest Lecture on Cyber Forensics in Annual Tech Fest - Anokha at ASE, Coimbatore
2014 Invited lecture on National Level Ethical Hacking Workshop in Dr. N.G.P College, Coimbatore
2013 Tech Talk on Hacking - A Technological Threat in Cyber Defence Symposium held at ASE, Coimbatore

Trainings Delivered (Institutions/Government)

Year Trainings Delivered (Institutions/Government)

Faculty Development program on  Introduction to Practical VA/PT,  setting up of Honeypots, demonstration of Encase 7 and Paraben Bundle cyber forensic tools (13th August) for Kalasaingam university Members of the Staff and Research Scholars


Trained a team of 30 students as a preplacement activity on Ethical Hacking, Cyber Forencis, Network Security and OWASP secure coding, (22nd September 2015) Kalsaligam University(KLU), Krishnankovil (TN) and 9 of them got placed in Paladion Networks, Bangalore.
URL (under tab, Training Programmes organized)

2015 Facilitated two days Student Development Program on Cyber Security, (31st July, 1st August 2015) headed by Dr. Sethumadhavan M. (Head, Centre for Cyber Security, AVV) at KLN college of I.T, Madurai
2014 Given cyber security training for 150 senior police officers on Cybercrime Training Salem City and Rural Police Officers, (14 June 2014) under the guidance of Mr. A.Amalraj I.P.S., (Commissioner, Salem City) and Mr. S.Prabakaran I.P.S., (Asst., Commissioner Crime, Salem City) with HANS (Gujarat)

Volunteer Activities in Cyber Security

Category  Details


  • HANS India, Gujarat (
  • Global Vision NGO, Salem

Govt., Research Groups

  • NCDRC−National Cyber Defense Research Centre (


  • Rex Cyber Solutions, Chennai (


  • Cyber Forensics Laboratory, Kalasalingam University (





FAFE (Forensic Accounting and Fraud Examination #CQUAP8BYY6L4 - West Virginia University)

2015 Coursework on CEC (Certified Ethical Cracker - InfySEC)
2012 PGCCL (Post-Graduate Certificate in Cyber Law-IGNOU)
2011-2012 Coursework on CPCL(Certificate Program in Cyber Law-SYMBIOSIS) and ACISE(Advanced Certificate in Information Security-IGNOU)

DCL (Diploma in Cyber Laws)

2009 RHCT (Red Hat Certified Technician)
2008 Coursework on CCNA (Cisco Certified Network Associate) and MCP (Microsoft Certified Professional)
2007 Coursework on A+ and N+ (Hardware and Networking - IIHT)


Publication Type: Book Chapter
Year of Publication Publication Type Title
2015 Book Chapter A. Kumar Mohan and Gireesh, K. T., “Secure Seed-Based Sturdy OTP via Convenient Carry-on Device”, in Artificial Intelligence and Evolutionary Algorithms in Engineering Systems: Proceedings of ICAEES 2014, Volume 1, P. L. Suresh, Dash, S. Subhransu, and Panigrahi, K. Bijaya New Delhi: Springer India, 2015, pp. 447–455.[Abstract]

The Internet users for the purpose of easy memorizing select a weak password and reuse it along many Web sites vulnerable to password stealing and reuse due to rapid growth of cloud computing. Sturdy one-time password (S-OTP) provides with easy remembrance and prevention of password reuse using personal Android mobile phone without the necessity of sending an SMS and can be integrated into any original user authentication system without contradicting the overall security. Also, in the worst cases, if the mobile phones are stolen, it is made unfeasible by means of two-dimensional SHA3 and MD5 forward hashing with unique and secure hard-coded seed information from mobile device. More »»
Faculty Details


Faculty Email: