Qualification: 
M.Tech, B-Tech
r_santhya@cb.amrita.edu

Santhya R. currently serves as EC-Council Instructor at TIFAC-CORE in Cyber Security, Coimbatore Campus. 

Education

  • 2017: M.Tech in Cyber Security
    Amrita School of Engineering, Ettimadai, Coimabtore.
    Amrita Vishwa Vidyapeetham
  • 2015: B.Tech in Information Technology
    Kalaignar Karunanidhi Institute of Technology, Coimbatore.
    Anna University

Experience

  • Worked as a Junior Research Fellow for DeitY, TIFAC-CORE in Cyber Security, Amrita Vishwa Vidyapeetham, Coimbatore.
    Topic: Development of secure and authenticated encryption scheme for light weight application 
  • Worked as Vulnerability Analyst for Paramount Computer Systems, Coimbatore. (Six Months )
    Topic: Threat Intelligence

Guest Lectures/Mentorship

Year Lecture/Mentorship
November 7, 2019 Delivered a one-day session on "WiFi Security Audit for IoT Devices" at PSG College of Technology, Department of Information Technology, TEQIP –III, Sponsored Faculty Development Programme on Computing Paradigms for Emerging IoT Applications.
October 17, 2019 Delivered a one-day session on "Cybercrime: Mobile and Wireless" for Digital and Cyber Forensic Science graduates at Sree Saraswathi Thyagaraja College, Pollachi.
October 15, 2019 Guest lecture on "Big Data Security Analytics - Cyber Resilience" at Hindustan College of Technology, Coimbatore.
October 12, 2019 Mentored one day workshop at Kumaraguru College of Technology (KCT, Coimbatore), Department of Electronics & Communication Engineering on Cyber Safe - An Overview of Cyber Security".
September 21 - 22, 2019 Organized and Mentored a Two Day Hands-on Workshop cum Capture The Flag (CTF) Contest "Dig-For-Art’19" on Digital Forensics Artifacts for graVITas'19 (VIT TECHFEST - Haxxorz), organized by CSE department, VIT, Vellore and facilitated practical training for around 200 graduate students.
August 30, 2019 Delivered One Day Lecture in Faculty Development Programme at Government College of Technology(GCT, Coimbatore), Department of Information Technology on 'Cyber Security' - Securing Online Transactions" in the one week TEQIP III Sponsored (Under Twinning Activity).
August 27 - 28, 2019 Delivered Two Days Lecture in Faculty Development Programme at Government College of Technology(GCT, Coimbatore), Department of Information Technology on 'Cyber Security' in the one week TEQIP III Sponsored (Under Twinning Activity), Topics Covered : "Data Security, Cloud Security and Securing Mobile Devices".
August 18 - 19, 2019 Delivered two days Computer Security Workshop cum Certification Program on Certified Secure Computer User - CSCU for Department of CSE and ECE, Ramco Institute of Technology, Rajapalayam.
July 24, 2019 Guest Lecture on "Cyber Security" at Avinashilingam Institute for Home Science and Higher Education, Department of Physical Education in Seven Day B.P.Ed Leadership Training Camp.
July 10-12, 2019 Delivered a three days Computer Security Workshop cum Certification Program on Certified Secure Computer User - CSCU held at Department of Information Technology, SSN College of Engineering, Chennai and mentored computer science engineering students in passing the certification with distinction.
July 09, 2019 Handled Faculty Development Program (FDP) as a part of Teaching Learning Centre (Under PMMMNMTT, MHRD, Govt. of India) initiative on "Cyber Forensics and Crime Analysis" titled "Open Source Digital Forensic for Faculties” for the faculties, at Department of Computer Science &Engg, NSS College of Engg, Palakkad and other college’s faculties.
April 15 - 16, 2019 Delivered a two-day  "Certification Program on Certified Secure Computer User - CSCU" held at Kalaignar Karunanidhi Institute of Technology, Coimbatore and mentored around 70 engineering students in passing the certification with distinction.
March 29 - 31, 2019 Mentored 3 days workshop on "Introduction to Cyber Security" at Dr. T. Thimmaiah Institute of Technology (Dr.TTIT), Bangarpet, Bangalore.
March 24, 2019 Guest Lecture on "Introduction to Digital Forensic Investigation" at Vellore Institute of Technology (VIT), Vellore.
January 29, 2019 Guest Lecture on "Mobile Phone Security”, at Dr. G. R. Damodaran College of Science.
January 23, 2019 Guest Lecture on " Mobile Phone Security - on OS perspective”, at Computer Society of India( CSI ) Coimbatore Chapter - Monthly Meet.
March 20, 2019 Guest lecture on “Kali Linux, an Advanced Penetration Testing Linux distribution for Penetration Testing" for faculty members at Avinashilingam University for Women, Coimbatore.
February 21-22, 2019 Mentored the second version of Open Source Digital Forensics (OSDFv2) CTF with two days hands-on sessions on "Kickstarter to Digital Forensic Investigation" at Jeppiaar SRR Enggineering College, Chennai.
January 11, 2019 Invited talk on “Recent Research issues in Cyber Security” at PSGR Krishnammal College for Womens for National Workshop on Cyber Forensics and Cyber Security by CS(PG).
October 29, 2018 Invited talk on "Android Security”, at ISACA - Annual Cyber Security Summit on for ISACA Coimbatore Chapter.
March 23, 2018 Mentored a one-day hands-on workshop cum Capture The Flag (CTF) contest "Open Source Digital Forensics" on Digital Forensics Artifacts, organized by CSE department, Amrita Vishwa Vidyapeetham, and facilitated practical training for around 50 graduate students.
February 15-16, 2018 Organized and Mentored a two-day hands-on workshop cum Capture The Flag (CTF) contest "Dig-For-Art’18" on Digital Forensics Artifacts, powered by IT department, Karunya University and facilitated practical training for around 75 graduate students.
September 27-28, 2017 Organized and Mentored a two-day hands-on workshop cum Capture The Flag (CTF) contest "Dig-For-Art’17" on Digital Forensics Artifacts (link is external) at Cyber Forensics Laboratory, powered by IT department, Kalasalingam University and facilitated practical training for around 120 graduate students from nearby rural areas.

Volunteer Activities in Cyber Security

Category  Details
Rural Education

Anaadi Foundation - VIBE

Projects

  • Android App for Attendance Management with GeoTagging
    Development Kit: Android Studio, Emulator with Nougat 7.0 installed.
  • Android App for Image Capturing and Cloud Storage
    Development Kit: Android Studio, Emulator with Nougat 7.0 installed.
  • GeSIS: Android App for Firebase Cloud Sharing with GeoTag and its Vulnerability Assessment
  • Secure Code Audit of Android Aosp Source Code by Code Review Tools
  • Advanced Discovery Techniques of Similarity Constraints for Matching Dependencies

Publications

Publication Type: Journal Article

Year of Publication Title

2019

B. Vattikuntla and Santhya R, “IoT: Security Challenges and Mitigations”, International Journal of Recent Technology and Engineering (IJRTE), vol. 8, no. 1, 2019.[Abstract]


Nowadays, Internet of things (IoT) is one of the emerging domains which is growing exponentially. IoT is an idea that bridges the smart devices and let the devices to communicate with each other over the internet. IoT is an enormous system of associated gadgets – all of devices accumulate and share the information about how they are utilized and the situations in which they are working. IoT-based innovation will offer propelled dimensions of administrations and for all intents and purposes and it will change the manner in which individuals lead their day by day lives. IoT enhances machine-to-machine(M2M) communication that eliminates the need for human intervention. Smart homes, Smart Grids, Smart Cities, Earthquake detection, Healthcare, Smartphone detection, Radiation detection/hazardous gas detection, Water flow monitoring are some of the modern implementations in IoT. The future of IoT can only be assured if the security issues corresponding to IoT vulnerabilities and the mitigation techniques has been addressed. Since the IoT devices is been accessed remotely, there are many possibilities to flood the device and also results in many security issues. Hence it gives a path for the analysis of vulnerabilities in the IoT devices and evaluating the impact when the vulnerability is exploited. Based on the severity of the exploit, the mitigation techniques will be formulated. Many researchers have attempted to mention the security concerns specific to IoT layers and devices by implementing corresponding countermeasures. This paper presents a study of IoT security, IoT architecture, Security challenges, mitigation strategies for each layer of IoT, and the future work for IoT device security.

More »»

2018

Santhya R, “A Modern approach to identify the fake news using machine learning”, International Journal of Pure and Applied Mathematics, vol. 118, no. 20, pp. 3787-3795, 2018.[Abstract]


Information technology has been improvising day by day. Key reason is that the usage of internet is increasing every year. This increases the data size as per the wiki statistics, majority of the people are interested in using social medias, thus the social media especially like Facebook and Twitter has lots audience all over the world. Controlling and validating the information source in these social media are really toughest challenge. Recently social media is used as a platform to spread the rumor and fake information such as morphed videos and images that affects social status of many innocent victims. There are also many people who lost their life due to the social media rumors. Identifying and reporting the rumor source before it spreads virally is the toughest challenge in current social media sites. In this paper, we have proposed an architecture and design to identify the rumor sources using machine learning model. Our base idea is to collect the common features vectors from various fake news source dataset. Then we used machine learning algorithms to train our model to predict the rumor news. We have implemented and tested our model with twitter dataset for various cases along with empirical results

More »»

2018

Ashok Kumar Mohan, Dr. Nirmala Devi M., Dr. M. Sethumadhavan, and Santhya R, “A Selective Generation of Hybrid Random Numbers via Android Smart Phones”, International Journal of Pure and Applied Mathematics, vol. 118, no. 8, pp. 311-317, 2018.[Abstract]


The True Random Number Generator (TRNG) is an important module for countless cryptographically secure appliances. TRNG generation technique requires custom made hardware with quantum phenomena, which on the whole are expensive research components. A secure and sound TRNG design is anticipated at this time, which is based on the permutation of sensor feeds and combination of noise patterns from the peripherals of any Android smartphone. The source for this generator is the selected features from the in-built hardware components namely accelerometer, gyroscope, magnetometer, WiFi signal measure, cell tower information, GPS coordinates and battery thermal noise. Additionally, Process ID (PID) of the corresponding Android processes is given as key vector to augment the entropy and also addresses some of the security concern like confidentiality, integrity and availability of the authentic sources. . Hardware-Based Random Number Generator (HRNG) can be achieved by combing the source of the user, their corresponding parameters and the measure of imperfection.

More »»

2017

Santhya R, “Response Time Analysis for Querying Data on Order Preserved Encrypted Buckets”, International Journal of Control Theory and Applications, vol. 10, no. 19, 2017.

2015

Santhya R, “Investigations On Method Developed For Effective Discovery Of Functional Dependencies”, International Journal of Innovative Research in Science, Engineering and Technology (IJIRCCE), vol. 2, no. 10, 2015.

2014

Santhya R, “Certain Investigations On Securing Moving Data Objects”, International Journal of Innovative Research in Science, Engineering and Technology (IJIRSET), vol. 2, no. 10, 2014.

2014

Santhya R, “From Facebook to Safebook : Review on Methods For Social Network Data Protection”, International Advanced Research journal in Science, Engineering and Technology (IARJSET), vol. 1, no. 3, 2014.

2014

P. .Andrew, Deepika, K., Santhya R, .S.Balamurugan, P., and .Charanyaa, S., “Investigations on Methods Evolved for Protecting Sensitive Data ”, International Advanced Research Journal In Science, Engineering And Technology (IARJSET), vol. 1, no. 3, 2014.

2013

Santhya R, “Survey On Privacy Preserving Data Publishing Of Numerical Sensitive Data”, International Journal of Emerging Technology & Advanced Engineering , vol. 3, no. 10, 2013.[Abstract]


Breaching privacy of individual data and the measures to prevent the same from attackers has become the most interesting topic of research on the day. In this paper we have made a brief survey on various anonymization principles and practices, privacy preserving techniques beyond kanonymity. Principles designed inorder to prevent the proximity breaching of data are studied in depth. Concept of perturbation is investigated and practical applications are revealed. Certain attacks on anonymized data and certain approaches proposed in literature to prevent the same are also studied in detail

More »»

Certifications

Year Certifications
2019 CHFI (Computer Hacking Forensic Investigator, EC- Council India)
2019 ECSA (EC-Council Certified Security Analyst, EC- Council India)
2019 CSCU (Certified Secure Computer User, EC- Council India)
2018 CEI (Certified EC-Council Instructor, EC- Council India)
2018 CEH (Certified Ethical Hacker, EC-Council India)