Associate Professor, Department of Computer Science and Engineering, IIIT Delhi
About
Associate Professor at the Department of Computer Science and Engineering Department of Indraprastha Institute of Information Technology (IIIT Delhi) since June 2014.
Networks and Systems Security I/II CSE552/CSE554: Two part undergraduate/graduate course in security focussing on fundamentals of computer security, protocols, vuilnerabilities, exploits, mitigations, anonymity and ethical hacking. (W-19,W-21,W-22,W-23,M-23,W-24)
Security Engineering CSE553: Precursor to NSS-I/II focussing on mostly on the host security primitives. (W-15,W-16,W-17,W-20)
Network Anonymity and Privacy CSE749: A semester long course on privacy preserving technologies and (anti-)censorship studies. (M-18,M-16,M-15,M-14)
Operating Systems CS231: Undergraduate course in operating systems focussing on the basics along with in-depth programming involving Linux kernel.(M-22, M-21,M-20,M-19,W-18)
Computer Systems Management CS103: Undergraduate course in basics of computer systems, focussing on a bit of everything -- microprosessors, instruction set
and program execution, operating systems, compilers, computer networks etc.(M-18,M-17)
Publications
Peer-Reviewed Papers
K. Kanungo, V. Arora, R. Khatolia, A. Bari, M. Maity, A. Bhattacharya and S. Chakravarty. How Many Hands in the Cookie Jar? Examining Privacy Implications of Popular Apps in India. To appear in the Proceedings of IEEE European Security and Privacy Symposium (IEEE Euro S&P), July 2024, Vienna, Austria.
D. Gosain, K. Singh, R. Sharma, Jithin S, and S. Chakravarty. Out in the Open: On the Implementation of Mobile App Filtering in India. To appear in the Proceedings of Passive and Active Measurements Conference (PAM) , March 2024, Venue: Online.
P. Sharma, R. Sharma, K. Singh, M. Maity and S. Chakravarty. Dolphin: A Cellular Voice Based Internet Shutdown Resistance System. In the Proceedings of Privacy Enahancing Technologies and Systems (PoPETS), July 2023, Lausanne, Switzerland (and Online).
D. Gosain, A. Jaiswal, H. B. Acharya and S. Chakravarty. Telemetron: Measuring Network Capacity Between Off-Path Remote Hosts. In Proceedings of Local Computer Networks (LCN), October 2021, Venue: Online (due to pandemic).
P. Sharma, D. Gosain and S. Chakravarty.Camoufler: Accessing The Censored Web By Utilizing Instant Messaging Channels. In Proceedings of ACM Asia Computer and Communications Security (ASIACCS), June 2021. Venue: Online (due to pandemic).
D. Gosain, M. Mohindra and S.Chakravarty. Too Close for Comfort: Morasses of (Anti-) Censorship in the Era of CDNs. In Proceedings of Privacy Enhancing Technologies and Systems (PoPETS), July 2021. Venue: Online (due to pandemic).
P. Sharma, D. Gosain, H. Sagar, C. Kumar, A. Dogra, V. Naik, H. B. Acharya and S. Chakravarty.SiegeBreaker: An SDN Based Practical Decoy Routing System. In Proceedings of Privacy Enhancing Technologies and Systems (PoPETS), July 2020. Original venue: Montreal, CA; current venue: Online (due to pandemic).
P. Sharma, S. Choudhary, N. Hassija, M. Maity and S. Chakravarty. The Road Not Taken: Re-thinking the Feasibility of Voice Calling Over Tor. In Proceedings of Privacy Enhancing Technologies and Systems (PoPETS), July 2020. Original venue: Montreal, CA; current venue: Online (due to pandemic).
T. Yadav, A. Sinha, D. Gosain, P. Sharma and S. Chakravarty.Where The Light Gets In: Analyzing Web Censorship Mechanisms in India. In Proceedings of ACM Internet Measurements Conference (IMC), October 2018, Boston, MA, USA.
P. Sharma, C Kumar, A. Dogra, V. Naik, S. Chakravarty and H. B. Acharya. SiegeBreaker –- SDN Based Decoy Routing System (WIP). In Proceedings of Annual Computer Security Applications Conference (ACSAC), December 2017, Orlando, FL, USA.
D. Gosain, A. Agarwal, S. Charkavarty and H. B. Acharya. The Devil’s in The Details: Placing Decoy Routers in the Internet. In Proceedings of Annual Computer Security Applications Conference (ACSAC)
, December 2017, Orlando, FL, USA.
D. Gosain, A. Agarwal, S. Shekhawat, H. B. Acharya and S. Chakravarty.Mending Wall: On the Implementation of Censorship in India. In Proceedings of International Conference on Security and Privacy in Communication Networks (SecureComm), October 2017, Ontario, Canada (Recieved Best Student Paper Award).
H. B. Acharya, S. Chakravarty and D. Gosain. Few Throats to Choke: On the Current Structure of the Internet. In Proceedings of Local Computer Networks (LCN), October 2017, Singapore.
S. Chakravarty, G. Portokalidis, M.Polychronakis and A. D. Keromytis. Detection and Forensic Investigation of Eavesdropping in Anonymous Communication Networks. In the International Journal of Information Security (IJIS), vol. 14, issue 3, June 2015.
S. Chakravarty, V. Naik, H. B. Acharya and C. S. Tanwar. Towards Practical Decoy Routing Infrastructure. In Proceedings of 2nd Workshop on Security in Emerging Networking Technologies (SENT) (co-located with NDSS 2015), February 2015, San Diego, CA, USA.
S. Chakravarty, M. V. Barbera, G. Portokalidis, M.Polychronakis and A. D. Keromytis. On the Effectiveness of Traffic Analysis Against Anonymity Networks Using Flow Records. In Proceedings of Active and Passive Measurements (PAM), March 2014, Los Angeles, CA, USA.
S. Chakravarty, G. Portokalidis, M. Polychronakis and A. D. Keromytis. Detecting Traffic Snooping in Tor Using Decoys. In Proceedings of International Symposium on Recent Advances in Intrusion Detection (RAID), September 2011, Menlo Park, CA, USA.
S. Chakravarty, A. Stavrou, and A. D. Keromytis. Traffic Analysis Against Low-Latency Anonymity Networks Using Available Bandwidth Estimation. In Proceedings of the 15th European Symposium on Research in Computer Security (ESORICS), September 2010, Athens, Greece.
S. Chakravarty, A. Stavrou, and A. D. Keromytis. Identifying Proxy Nodes in a Tor Anonymization Circuit. In Proceedings of the 2nd IEEE/ACM Workshop on Security and Privacy in Telecommunications and Information Systems (SePTIS), December 2008, Bali, Indonesia.
A. Dutta, S. Chakravarty, K. Taniuchi, V. Fajardo, Y. Ohbha, D. Famolari, H. Schulzrinne. An Experimental Study of Location Assisted Proactive Handover. In Proceedings of IEEE Globecom Internet Protocol Symposium (GlobeComm), November 2007, Washington DC, USA.
Email:sambuddho@iiitd.ac.in Public key: Click here Phone: +911126907478 Address:
B503, R&D Building,
Indraprastha Institute of Information Technology Delhi (IIITD)
Okhla Phase III
New Delhi 110020
Working with me:
General guidelines: I would expect you to read and read a lot. Do not expect spoon feeding and easy grades. Expectations would be high for you to perform creatively, NOT quantitatively.
B.Tech /M.Tech students at IIIT Delhi must be prepared to register as IP/IS/Scholarly Paper/BTP/M.Tech thesis etc.
Non IIIT Delhi affiliates: Yes I accept summer interns/RAs etc. You need strong C/C++ programming skills. I am also open to working with you long term, provided you are willing to commit wholeheartedly to the research, and not just to outcomes. Do not bother applying if you only objective is to somehow get recommendation letters for applying to MS/PhD/SSB/UPSC/whatever else, without much efforts.