PhD-Computer Science Candidate, Graduate Research Assistant, SPIES Research Group, TAMU
Graduate Research AssistantTexas A&M University- Dr. Nitesh Saxena ·
Threat of privacy and security violation
through voice-synthesis based Attacks
Exploring the area
of voice
biometrics (e.g., for logging into a mobile phone or a remote
banking service) and establishing a secure and anonymous voice for
privacy-preserving emotion and disease detection methodss. Voice
spoofing attacks may lead to the access of personal user data and identifying
patients with the disease can have serious privacy and security
implications.
Threat of Predatory Science to Medical AI
(MedAI) solutions
MedAI solutions are often heavily dependent on
scientific medical research literature as a primary data source that draws the
attacker’s attention as a potential target. If the input data is polluted, the
output of MedAI can be influenced based on growing predatory publications. Data poisoning attacks
can jeopardize the credibility of MedAI solutions, which may make their
real-life deployment questionable.
Evaluating privacy and security vulnerabilities
in Mobile apps as alternative intervention to assist underserved populations
Ubiquitous mobile phones can equip users through MMH apps to
supplement psychiatric treatment and manage their mental health. MMH apps may
assist with a broad range of psychological disorders with varying app designs
and functionality. However,
it also raises significant concerns with extended threat of sensitive patient information leakage. The absence of a transparent privacy
policy, exploitable flaws, dangerous permissions,
and storage of identifiable information pose a potential threat to the privacy
and security of the users.
Threat of
Magnetic Hard Disk Drives eavesdropping through read/write head vibrations
A close
investigation into if HDDs can in fact be used as a source for eavesdropping on
speech vibrations. As a foundation for our study, we utilize a methodology
using laser vibrometry to measure the subtle speech vibrations
induced on the read/write head. Experiments
evaluate the threat from live human speech spoken near an HDD,
expanding the scope of the attack to include most real-world speech settings
involving normal human conversations. Machine-rendered speech scenarios evaluate
different propagation media and degrees of speech loudness.
Graduate
Research AssistantUniversity
of Alabama-
Dr. Yang Xiao
UA GENI
Project- Research Lab W4-NET-: Contributed towards the UA GENI
project ‘GENI Experiments for Traffic Capture Capabilities and Security
Requirement Analysis’
MS-CS
Thesis: ‘ProtoGENI Security: Threats to resources and run-time interactions’ Discovered
the security threats to ProtoGENI resources and host machines. ProtoGENI is a prototype of GENI, ProtoGENI is a prototype of GENI, the NSF project to
develop future Internet. Experiments run on
federated testbed ‘emulab’ (The University of Utah) showed that ProtoGENI is vulnerable
to attacks affecting the availability and accessibility of ProtoGENI resources.
A compromised host machine can affect the functionality of ProtoGENI. An Attacker
can steal user credentials stored on the physical machine. Network experiments
can experience theresource outage because of
non-availability (hold by an attacker (s)) or non-usability (corrupted or
obsolete) of resources. The attacker can target the network exploiting default
SSH settings and open ports. Traffic-load can force system resources to
utilize its resources at best in concurrency which may lead to significant
delays in processes and loss of packets.
System Analyst Sr
Department
of Medicine- University of Alabama at Birmingham (UAB)
Managing concerning behaviors in patients prescribed opioids
for chronic pain: A Delphi study
Designed and developed the research database structure,
provided the configured frontend tool Qualtrics, customized to project
requirements. Managed the data collection and data analysis in four different
project phases to create project summary details assisting in interpreting the
study outcomes.
Duration of therapeutic coma and outcome of refractory status
epilepticus
Designed and developed research database in REDCap to capture all relevant study data and necessary details for
optimized data collection and meaningful information extraction.
created with
Website Builder Software .