Saurabh Kumar

Saurabh Kumar
Verified
Saurabh verified their affiliation via an institutional email.
Verified
Saurabh verified their affiliation via an institutional email.
  • Doctor of Philosophy
  • Assistant Professor at Indian Institute of Technology Hyderabad

About

14
Publications
1,181
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
82
Citations
Current institution
Indian Institute of Technology Hyderabad
Current position
  • Assistant Professor

Publications

Publications (14)
Preprint
Full-text available
Smart Contracts (SCs) handle transactions in the Ethereum blockchain worth millions of United States dollars, making them a lucrative target for attackers seeking to exploit vulnerabilities and steal funds. The Ethereum community has developed a rich set of tools to detect vulnerabilities in SCs, including reentrancy (RE) and unhandled exceptions (...
Article
Full-text available
Due to the importance of Critical Infrastructure (CI) in a nation’s economy, they have been lucrative targets for cyber attackers. These critical infrastructures are usually Cyber-Physical Systems such as power grids, water, and sewage treatment facilities, oil and gas pipelines, etc. In recent times, these systems have suffered from cyber attacks...
Article
With wide adaptation of open-source Android into mobile devices by different device vendors, sophisticated malware are developed to exploit security vulnerabilities. As comprehensive security analysis on physical devices are impractical and costly, emulator driven security analysis has gained popularity in recent times. Existing dynamic analysis fr...
Conference Paper
Full-text available
With the large-scale adaptation of Android OS and ever-increasing contributions in the Android application space, Android has become the number one target of malware writers. In recent years, a large number of automatic malware detection and classification systems have evolved to tackle the dynamic nature of malware growth using either static or dy...
Conference Paper
Full-text available
Usage of the execution stack at run-time captures the dynamic state of programs and can be used to derive useful insights into the program behaviour. The stack usage information can be used to identify and debug performance and security aspects of applications. Binary run-time instrumentation techniques are well known to capture the memory access t...
Preprint
Full-text available
Due to the importance of Critical Infrastructure (CI) in a nation's economy, they have been lucrative targets for cyber attackers. These critical infrastructures are usually Cyber-Physical Systems (CPS) such as power grids, water, and sewage treatment facilities, oil and gas pipelines, etc. In recent times, these systems have suffered from cyber at...
Preprint
Full-text available
Smart contracts on Ethereum handle millions of U.S. Dollars and other financial assets. In the past, attackers have exploited smart contracts to steal these assets. The Ethereum community has developed plenty of tools to detect vulnerable smart contracts. However, there is no standardized data set to evaluate these existing tools, or any new tools...
Conference Paper
With the increased popularity and wide adoption as a mobile OS platform, Android has been a major target for malware authors. Due to unprecedented rapid growth in the number, variants, and diversity of malware, detecting malware on the Android platform has become challenging. Beyond the detection of a malware, classifying the family the malware bel...
Conference Paper
Over the past few years, Android has become one of the most popular operating systems for smartphones as it is open-source and provides extensive support for wide variety of applications. This has led to an increase in the number of malware targeting Android devices. The lack of robust security enforcement in Play Store along with the rapid increas...
Conference Paper
Sophisticated malware employs various emulation-detection techniques to bypass the dynamic analysis systems that are running on top of virtualized environments. Hence, a defense mechanism needs to be incorporated in emulation based analysis platforms to mitigate the emulation-detection strategies opted by malware. In this paper, first we design an...
Chapter
In today’s world of devices, smart phones, tablets, and wearable devices, are widely used for communication, photography, entertainment, monitoring health status, and many more applications. Applications installed in the smartphones provide useful services, but they may maliciously send sensitive information to a remote location for various purpose...
Conference Paper
In this paper we are proposing an effective encryption technique for high volume streaming data which has been sent over various communication links throughout the network. Applications requiring high volume of streaming data transmission include audio-video conferencing or Voice over Internet Protocol (VoIP) and Internet Protocol Television (IPTV)...

Network

Cited By