Post Job Free
Sign in

Service Project

Location:
State College, PA
Posted:
November 13, 2012

Contact this candidate

Resume:

S MITHA S UNDARESWARAN

*** ********* *****, #****, ***** College, PA 16801

814-***-**** abpnox@r.postjobfree.com

E DUCATION

The Pennsylvania State University, University Park, PA

Ph.D. in Information Sciences and Technology Expected Graduation: May 2013

The Pennsylvania State University, University Park, PA

M.S. in Electrical Engineering, 50 credits completed August 2006- August 2009

Jawaharlal Nehru Technological University, Hyderabad, AP, India

B.Tech. in Electronics and Communications Engineering Degree Received: May 2005

R ELATED E XPERIENCE

Microsoft Research Intern Summer 2011

Dr. Kevin Kane, eXtreme Computing Group, Microsoft Research.

Worked on policy management for Cloud services

Investigated a data brokerage service for Cloud computing

Leveraged data mining to present users with policy suggestions for the data uploaded on a Cloud computing

platform

Research Assistant Fall 2008 - Present

Dr. Anna Squicciarini, IST Department, The Pennsylvania State University.

Developing a prototype to test the reliability of Virtual Machines and detect any attacks in Clouds

Developed a brokerage system for Cloud Computing Services to aid in the selection of Cloud Service Providers,

distributed accountability and policy enforcement

Developed prototypes for detecting and preventing attacks such as XSS, SQL Injection, Gifar attacks on Web

Applications

Developed methods to ensure trust and privacy in context of social networks and other Web 2.0 platforms

Research Wage Payroll Summer 2008

Dr. Anna Squicciarini, IST Department, The Pennsylvania State University.

Developed a prototype to improve the evaluation times of XACML policies by Sun s PDP

Generated synthetic datasets for the evaluation of the prototype

P UBLICATIONS

Smitha Sundareswaran, Anna Squicciarini, and Dan Lin. A Brokerage-Based Approach for Cloud Service

Selection . 5th IEEE International Conference on Cloud Computing (CLOUD), June 2012.

Smitha Sundareswaran, and Anna Squicciairini. XSS-Dec: a hybrid solution to mitigate Cross-Site Scripting

attacks . 26th Annual WG 11.3 Conference on Data and Applications Security and Privacy (DBSec 12), July

2012

Smitha Sundareswaran, Anna Squicciarini, Dan Lin, and Shuo Huang. Ensuring Distributed Accountability for

Data Sharing in the Cloud . IEEE Transaction on Dependable and Secure Computing (TDSC), 2012.

Anna Squicciarini, Christopher Grif n, and Smitha Sundareswaran. Towards a Game Theoretical Model for

Identity Validation in Social Network Sites . Third IEEE International Conference on Information Privacy,

Security, Risk and Trust (PASSAT), October 2011.

Smitha Sundareswaran, Anna Squicciarini, and Ranjani Sundareswaran. JUiCE: Java-based Distributed

Content Protection . 35th IEEE Annual International Computer Software and Applications Conference

(COMPSAC), July 2011

Smitha Sundareswaran, Anna Squicciarini, Dan Lin, and Shuo Huang. Promoting Distributed Accountability in

the Cloud . 4th IEEE International Conference on Cloud Computing (CLOUD), July 2011.

Anna Squicciarini, Smitha Sundareswaran, Dan Lin, and Josh Wede. A3P: Adaptive Policy Prediction for

Shared Images on Content Sharing Sites . 22nd ACM Conference on Hypertext and Hypermedia, 2011. Ted

Nelson Newcomer Award

1

Smitha Sundareswaran, and Anna Squicciarini. DeCore: Detecting Content Repurposing Attacks on Clients

Systems . 6th International ICST Conference on Security and Privacy in Communication Networks

(SecureComm 2010), September, 2010.

Smitha Sundareswaran, and Anna Squicciarini. Image Repurposing for Gifar-Based Attacks . Seventh Annual

Collaboration, Electronic messaging, Anti-Abuse and Spam Conference (CEAS 2010), July, 2010.

Smitha Sundareswaran. Web-Traveler Policies for Content on Social Networks . Extended Abstract for Doctoral

Consortium. The 2010 International Symposium on Collaborative Technologies and Systems (CTS 2010), May,

2010.

Anna Squicciarini,Smitha Sundareswaran, and Dan Lin. Preventing Information Leakage from Indexing in the

Cloud . IEEE International Conference on Cloud Computing, July 2010.

Smitha Sundareswaran, and Anna Squicciarini. The threat of an image: Protecting from Gifar Attacks on Social

Network Sites . 2010 IST Graduate Symposium. February 2010

Said Marouf, Mohamed Shehab, Anna Squicciarini, and Smitha Sundareswaran. Adaptive Reordering &

Clustering Based Framework for Ef cient XACML Policy Evaluation . IEEE Transactions on Services

Computing, April, 2010.

Anna Squicciarini, Federica Paci, and Smitha Sundareswaran. PriMa: An Effective Privacy Protection

Mechanism for Social Networks . 5th ACM Symposium on InformAtion, Computer and Communication Security

(ASIACCS), April 2010.

Anna Squicciarini, and Smitha Sundareswaran. Web-Traveler Policies for Images on Social Networks . World

Wide Web Journal. Springer. Vol.12(4). Pages 461-484. 2009.

Smitha Sundareswaran, and Anna Squicciarini. Web-Traveler Policies for Images on Social Networks . 2009

IST Graduate Symposium (Best Paper Award). February 2009

Said Marouf, Mohamed Shehab, Anna Squicciarini, and Smitha Sundareswaran. Statistics & Clustering Based

Framework for Ef cient XACML Policy Evaluation . IEEE Symposium on Policy for Distributed Systems, IEEE.

July 2009.

R EVIEWING ACTIVITIES

External Reviewer (Conference) CSIIRW7 2011, ASIACCS 2010, ICSI 2010, ESORICS 2011, ASIACCS

2011, SACMAT 2012, PACIS 2012

External Reviewer (Journal) JBCS 2010, IDIS 2010, TDSC 2012, TKDE 2012

AWARDS

CCS Workshop Travel Grant: Travel grant for CCSW 2012 September 2012

Student Travel Award: IEEE Services 2012 Student Travel Award June 2012

Ted Nelson Newcomer Award: A3P: Adaptive Policy Prediction for Images in Content Sharing Sites.

Anna Squicciarini, Smitha Sundareswaran, Dan Lin, Josh Wede.

22nd ACM Conference on Hypertext and on Hypermedia (ACM HT) June 2011

Student Travel Award: CTS 2010 Travel Award July 2010

Student Travel Award: CEAS student author travel award 2010 June 2010

S ELECTED P RESENTATIONS S PEAKING E NGAGEMENTS

AND

Detecting Web Application Vulnerabilities Using Information Flow Analysis- Extended Analysis.

Presentation at Lions Lunch.

Pennsylvania State University. March 2011

Detecting Web Application Vulnerabilities Using Information Flow Analysis.

Invited Talk at Google, Pittsburgh. November 2010

Web-Traveler Policies for Images.

Invited Talk for the course Integration of Privacy and Security (SRA 472).

Pennsylvania State University. February 2009

2

R ESEARCH E XPERIENCE

Mitigating Attacks from Co-Resident VMs in the Cloud

Working on a prototype for mitigating attacks based on the co-residency of Virtual Machines in the Cloud

Investigate various information leakage attacks possible due to co-residency of a malicious Virtual Machine

Cloud Brokerage Services

Worked on a project for helping users choose the Cloud Service Providers most bene cial to them, based

on their requirements

Leveraged data mining and pattern recognition algorithms in conjunction with novel encoding techniques

to rank and choose the Cloud Service providers for users based on the request they submitted

Project will be extended by adding negotiation and SLA enforcement

Adaptive Policy Prediction for Online Image Sharing

Worked on a project for adaptively predicting the privacy settings of users in online photo sharing sites

such as Picasa, Facebook, Flickr

Utilized data mining and text mining algorithms in conjunction with content based image retrieval

algorithms to predict the settings for images of users based on their previous settings for similar images

Promoting Distributed Accountability for Data Sharing in the Cloud

Developed a framework for accountability for data usage in a distributed computing environment with

specialized middleware, and more speci cally for cloud computing environments

Investigated and leveraged features of Java and Object Oriented Programming to allow for a fully

distributed end-to-end accountability system to be deployed

Detecting Malicious Users through Digital Identity Management

Developed a prototype for protecting user information across multiple Social Networks

Examined linking the user s identity across multiple networks and using this information to identify fake

pro les which are used to perpetrate malicious activities

Social Botnets

Conducted research to aid predicting the spread of Botnets on Social Networks.

T ECHNICAL S KILLS

Languages/Programming: C#, C, Java, JavaScript SQL, PHP, XML, XACML, SAML, Powershell OS Kernel

Programming, Socket Programming with SSH

Protocols: TCP/IP, UDP/IP

Platforms: Windows Suite, Linux Ubuntu and SuSe, Mac OS X

Domain: Computer Networks, OOPS, Digital Communication, Networking Concepts

Software Engineering: XACML, Strong SDLC Concepts, Testing Methodologies

A DDITIONAL E XPERIENCE

Volunteer at State College Food Bank

Research committee member. 2011 IST Graduate Symposium. The Pennsylvania State University

Tele-Fund Raiser. Spring 2007. Penn State Of ce of Annual Giving, The Pennsylvania State University

3



Contact this candidate