Post Job Free

Resume

Sign in

Security Information

Location:
United States
Posted:
June 30, 2015

Contact this candidate

Resume:

JAYA SURYA DONDAPATI

***** ********* ***, ******* ** 20148 Email: acqiul@r.postjobfree.com Phone: 571-***-****

OBJECTIVE

Actively Seeking an Internship/Full time which gives me an exposure to the current industrial scenario and an

opportunity to enhance the knowledge gained.

EDUCATION

George Mason University, Volgenau School of Engineering, VA

Master of Sciences [MS] - Networking and security, GPA 3.33 2014-2015

Jawaharlal Nehru Technological University, India.

Bachelor of Technology [BTech] - Electrical Engineering, GPA 3.4 2009-2013

PROJECTS

Android (4.3 Jelly Bean) Exploitation using Metasploit: Android being the most used platform in the majority

of the mobile devices basically runs on top of the ‘standard Linux kernel’. Two ways of exploiting the

vulnerabilities were found in the late 2014, where in the malicious payload is sent in the form of an http link and

it directly creates a connection between the exploit interface and the victim. And another one where in a remote

shell is executed on the android platform using an installed application, giving the hacker the root permissions.

This Exploitation can be done using the well-known Metasploit.

Backdoors of SSL/TLS: Today’s present day security that we are entrusted with still has persistent loopholes

in the implementation/Design of SSL/TLS. Timeline of attacks on SSL/TLS basically are dependent on Oracle

Based attacks, man in the middle attacks, Compression attacks, and Trojan injection through java script in the

header file. In Depth Comparison of the attacks of Beast, Crime, Lucky13, Heartbleed.

Implementation of Graduate student’s Plan of study, Using Petri nets: The Plan of study of a graduate

student should fulfill the degree requirements of the department and also in conjunction with his major of his/her

interest. (There are many choices in choosing the prerequisites, electives, core subjects which makes the

decision complicated) this scenario is solved using the colored Petri nets by assigning timely tokens, creating a

database, implantation of queues.

Manufacturing Process Of Turbo Generators: Detailed study about the Architecture and Designing procedure

i.e. Assembly of the Stator Core, Rotor Shaft, Clamping Plates, Rowell Transposition of Conductors in a timely

fashion to create the efficient output. In the above mentioned process, many techniques such as Blanking,

Notching, Varnishing, Compounding etc. are involved.

Power Enhancement In Distribution Network Using DSTATCOM: A Modified Implementation of

Instantaneous Power control scheme using DSTATCOM to Improve the Powerfactor and Reduce the Harmonic

compensation. This can be exploited with the constant power and sinusoidal current compensation.

RELATED COURSEWORK

Computer network architecture and protocol

Cryptography/ Computer network Security

Information security theory/Practice

Information security laboratory

Digital Media Forensics

Internet protocol Routing

SKILLS

Ability to program in C, Python and Perl (Object Oriented Programming).

Implementation of logical Designing in software tools like MATLAB, PSpice and CPN Tools.

Proficient in Microsoft Word, Adobe Photoshop and Illustrator.

EXTRA-CURRICULAR ACTIVITIES

Presented a paper in Birla Institute of Technology & Science Pilani, India.

Designed Posters for IGSA Indian night (Mason) and Potenzia (JNTU).

Volunteer in a non-government organization Nature’s Army (NARMY).



Contact this candidate