Shalini Saini

PhD-Computer Science Candidate, Graduate Research Assistant, SPIES Research Group, TAMU

Current Research:

Graduate Research AssistantTexas A&M University- Dr. Nitesh Saxena ·       

Threat of privacy and security violation through voice-synthesis based Attacks
 
Exploring the area of voice biometrics (e.g., for logging into a mobile phone or a remote banking service) and establishing a secure and anonymous voice for privacy-preserving emotion and disease detection methodss. Voice spoofing attacks may lead to the access of personal user data and identifying patients with the disease can have serious privacy and security implications.        

Threat of Predatory Science to Medical AI (MedAI) solutions 
MedAI solutions are often heavily dependent on scientific medical research literature as a primary data source that draws the attacker’s attention as a potential target. If the input data is polluted, the output of MedAI can be influenced based on growing predatory publications. Data poisoning attacks can jeopardize the credibility of MedAI solutions, which may make their real-life deployment questionable.  

Evaluating privacy and security vulnerabilities in Mobile apps as alternative intervention to assist underserved populations 
Ubiquitous mobile phones can equip users through MMH apps to supplement psychiatric treatment and manage their mental health. MMH apps may assist with a broad range of psychological disorders with varying app designs and functionality. However, it also raises significant concerns with extended threat of sensitive patient information leakage. The absence of a transparent privacy policy, exploitable flaws, dangerous permissions, and storage of identifiable information pose a potential threat to the privacy and security of the users. 

Threat of Magnetic Hard Disk Drives eavesdropping through read/write head vibrations 
A close investigation into if HDDs can in fact be used as a source for eavesdropping on speech vibrations. As a foundation for our study, we utilize a methodology using laser vibrometry to measure the subtle speech vibrations induced on the read/write head. Experiments evaluate the threat from live human speech spoken near an HDD, expanding the scope of the attack to include most real-world speech settings involving normal human conversations. Machine-rendered speech scenarios evaluate different propagation media and degrees of speech loudness. 

Past Research:

Graduate Research AssistantUniversity of Alabama- 
Dr. Yang Xiao
 
UA GENI Project- Research Lab W4-NET-: Contributed towards the UA GENI project ‘GENI Experiments for Traffic Capture Capabilities and Security Requirement Analysis’ 

MS-CS Thesis: ‘ProtoGENI Security: Threats to resources and run-time interactions’ Discovered the security threats to ProtoGENI resources and host machines. ProtoGENI is a prototype of GENI, ProtoGENI is a prototype of GENI, the NSF project to develop future Internet. Experiments run on federated testbed ‘emulab’ (The University of Utah) showed that ProtoGENI is vulnerable to attacks affecting the availability and accessibility of ProtoGENI resources. A compromised host machine can affect the functionality of ProtoGENI. An Attacker can steal user credentials stored on the physical machine. Network experiments can experience theresource outage because of non-availability (hold by an attacker (s)) or non-usability (corrupted or obsolete) of resources. The attacker can target the network exploiting default SSH settings and open ports. Traffic-load can force system resources to utilize its resources at best in concurrency which may lead to significant delays in processes and loss of packets.                          

Professional Research:

System Analyst Sr       
Department of Medicine- University of Alabama at Birmingham (UAB) 
Managing concerning behaviors in patients prescribed opioids for chronic pain: A Delphi study 
Designed and developed the research database structure, provided the configured frontend tool Qualtrics, customized to project requirements. Managed the data collection and data analysis in four different project phases to create project summary details assisting in interpreting the study outcomes. 

Duration of therapeutic coma and outcome of refractory status epilepticus 
Designed and developed research database in REDCap to capture all relevant study data and necessary details for optimized data collection and meaningful information extraction.