S MITHA S UNDARESWARAN
*** ********* *****, #****, ***** College, PA 16801
814-***-**** ******@***.***
E DUCATION
The Pennsylvania State University, University Park, PA
Ph.D. in Information Sciences and Technology Expected Graduation: May 2013
The Pennsylvania State University, University Park, PA
M.S. in Electrical Engineering, 50 credits completed August 2006- August 2009
Jawaharlal Nehru Technological University, Hyderabad, AP, India
B.Tech. in Electronics and Communications Engineering Degree Received: May 2005
R ELATED E XPERIENCE
Microsoft Research Intern Summer 2011
Dr. Kevin Kane, eXtreme Computing Group, Microsoft Research.
Worked on policy management for Cloud services
Investigated a data brokerage service for Cloud computing
Leveraged data mining to present users with policy suggestions for the data uploaded on a Cloud computing
platform
Research Assistant Fall 2008 - Present
Dr. Anna Squicciarini, IST Department, The Pennsylvania State University.
Developing a prototype to test the reliability of Virtual Machines and detect any attacks in Clouds
Developed a brokerage system for Cloud Computing Services to aid in the selection of Cloud Service Providers,
distributed accountability and policy enforcement
Developed prototypes for detecting and preventing attacks such as XSS, SQL Injection, Gifar attacks on Web
Applications
Developed methods to ensure trust and privacy in context of social networks and other Web 2.0 platforms
Research Wage Payroll Summer 2008
Dr. Anna Squicciarini, IST Department, The Pennsylvania State University.
Developed a prototype to improve the evaluation times of XACML policies by Sun s PDP
Generated synthetic datasets for the evaluation of the prototype
P UBLICATIONS
Smitha Sundareswaran, Anna Squicciarini, and Dan Lin. A Brokerage-Based Approach for Cloud Service
Selection . 5th IEEE International Conference on Cloud Computing (CLOUD), June 2012.
Smitha Sundareswaran, and Anna Squicciairini. XSS-Dec: a hybrid solution to mitigate Cross-Site Scripting
attacks . 26th Annual WG 11.3 Conference on Data and Applications Security and Privacy (DBSec 12), July
2012
Smitha Sundareswaran, Anna Squicciarini, Dan Lin, and Shuo Huang. Ensuring Distributed Accountability for
Data Sharing in the Cloud . IEEE Transaction on Dependable and Secure Computing (TDSC), 2012.
Anna Squicciarini, Christopher Grif n, and Smitha Sundareswaran. Towards a Game Theoretical Model for
Identity Validation in Social Network Sites . Third IEEE International Conference on Information Privacy,
Security, Risk and Trust (PASSAT), October 2011.
Smitha Sundareswaran, Anna Squicciarini, and Ranjani Sundareswaran. JUiCE: Java-based Distributed
Content Protection . 35th IEEE Annual International Computer Software and Applications Conference
(COMPSAC), July 2011
Smitha Sundareswaran, Anna Squicciarini, Dan Lin, and Shuo Huang. Promoting Distributed Accountability in
the Cloud . 4th IEEE International Conference on Cloud Computing (CLOUD), July 2011.
Anna Squicciarini, Smitha Sundareswaran, Dan Lin, and Josh Wede. A3P: Adaptive Policy Prediction for
Shared Images on Content Sharing Sites . 22nd ACM Conference on Hypertext and Hypermedia, 2011. Ted
Nelson Newcomer Award
1
Smitha Sundareswaran, and Anna Squicciarini. DeCore: Detecting Content Repurposing Attacks on Clients
Systems . 6th International ICST Conference on Security and Privacy in Communication Networks
(SecureComm 2010), September, 2010.
Smitha Sundareswaran, and Anna Squicciarini. Image Repurposing for Gifar-Based Attacks . Seventh Annual
Collaboration, Electronic messaging, Anti-Abuse and Spam Conference (CEAS 2010), July, 2010.
Smitha Sundareswaran. Web-Traveler Policies for Content on Social Networks . Extended Abstract for Doctoral
Consortium. The 2010 International Symposium on Collaborative Technologies and Systems (CTS 2010), May,
2010.
Anna Squicciarini,Smitha Sundareswaran, and Dan Lin. Preventing Information Leakage from Indexing in the
Cloud . IEEE International Conference on Cloud Computing, July 2010.
Smitha Sundareswaran, and Anna Squicciarini. The threat of an image: Protecting from Gifar Attacks on Social
Network Sites . 2010 IST Graduate Symposium. February 2010
Said Marouf, Mohamed Shehab, Anna Squicciarini, and Smitha Sundareswaran. Adaptive Reordering &
Clustering Based Framework for Ef cient XACML Policy Evaluation . IEEE Transactions on Services
Computing, April, 2010.
Anna Squicciarini, Federica Paci, and Smitha Sundareswaran. PriMa: An Effective Privacy Protection
Mechanism for Social Networks . 5th ACM Symposium on InformAtion, Computer and Communication Security
(ASIACCS), April 2010.
Anna Squicciarini, and Smitha Sundareswaran. Web-Traveler Policies for Images on Social Networks . World
Wide Web Journal. Springer. Vol.12(4). Pages 461-484. 2009.
Smitha Sundareswaran, and Anna Squicciarini. Web-Traveler Policies for Images on Social Networks . 2009
IST Graduate Symposium (Best Paper Award). February 2009
Said Marouf, Mohamed Shehab, Anna Squicciarini, and Smitha Sundareswaran. Statistics & Clustering Based
Framework for Ef cient XACML Policy Evaluation . IEEE Symposium on Policy for Distributed Systems, IEEE.
July 2009.
R EVIEWING ACTIVITIES
External Reviewer (Conference) CSIIRW7 2011, ASIACCS 2010, ICSI 2010, ESORICS 2011, ASIACCS
2011, SACMAT 2012, PACIS 2012
External Reviewer (Journal) JBCS 2010, IDIS 2010, TDSC 2012, TKDE 2012
AWARDS
CCS Workshop Travel Grant: Travel grant for CCSW 2012 September 2012
Student Travel Award: IEEE Services 2012 Student Travel Award June 2012
Ted Nelson Newcomer Award: A3P: Adaptive Policy Prediction for Images in Content Sharing Sites.
Anna Squicciarini, Smitha Sundareswaran, Dan Lin, Josh Wede.
22nd ACM Conference on Hypertext and on Hypermedia (ACM HT) June 2011
Student Travel Award: CTS 2010 Travel Award July 2010
Student Travel Award: CEAS student author travel award 2010 June 2010
S ELECTED P RESENTATIONS S PEAKING E NGAGEMENTS
AND
Detecting Web Application Vulnerabilities Using Information Flow Analysis- Extended Analysis.
Presentation at Lions Lunch.
Pennsylvania State University. March 2011
Detecting Web Application Vulnerabilities Using Information Flow Analysis.
Invited Talk at Google, Pittsburgh. November 2010
Web-Traveler Policies for Images.
Invited Talk for the course Integration of Privacy and Security (SRA 472).
Pennsylvania State University. February 2009
2
R ESEARCH E XPERIENCE
Mitigating Attacks from Co-Resident VMs in the Cloud
Working on a prototype for mitigating attacks based on the co-residency of Virtual Machines in the Cloud
Investigate various information leakage attacks possible due to co-residency of a malicious Virtual Machine
Cloud Brokerage Services
Worked on a project for helping users choose the Cloud Service Providers most bene cial to them, based
on their requirements
Leveraged data mining and pattern recognition algorithms in conjunction with novel encoding techniques
to rank and choose the Cloud Service providers for users based on the request they submitted
Project will be extended by adding negotiation and SLA enforcement
Adaptive Policy Prediction for Online Image Sharing
Worked on a project for adaptively predicting the privacy settings of users in online photo sharing sites
such as Picasa, Facebook, Flickr
Utilized data mining and text mining algorithms in conjunction with content based image retrieval
algorithms to predict the settings for images of users based on their previous settings for similar images
Promoting Distributed Accountability for Data Sharing in the Cloud
Developed a framework for accountability for data usage in a distributed computing environment with
specialized middleware, and more speci cally for cloud computing environments
Investigated and leveraged features of Java and Object Oriented Programming to allow for a fully
distributed end-to-end accountability system to be deployed
Detecting Malicious Users through Digital Identity Management
Developed a prototype for protecting user information across multiple Social Networks
Examined linking the user s identity across multiple networks and using this information to identify fake
pro les which are used to perpetrate malicious activities
Social Botnets
Conducted research to aid predicting the spread of Botnets on Social Networks.
T ECHNICAL S KILLS
Languages/Programming: C#, C, Java, JavaScript SQL, PHP, XML, XACML, SAML, Powershell OS Kernel
Programming, Socket Programming with SSH
Protocols: TCP/IP, UDP/IP
Platforms: Windows Suite, Linux Ubuntu and SuSe, Mac OS X
Domain: Computer Networks, OOPS, Digital Communication, Networking Concepts
Software Engineering: XACML, Strong SDLC Concepts, Testing Methodologies
A DDITIONAL E XPERIENCE
Volunteer at State College Food Bank
Research committee member. 2011 IST Graduate Symposium. The Pennsylvania State University
Tele-Fund Raiser. Spring 2007. Penn State Of ce of Annual Giving, The Pennsylvania State University
3