Post Job Free
Sign in

Security Access Control

Location:
State College, PA
Posted:
January 22, 2013

Contact this candidate

Resume:

HAYAWARDH VIJAYAKUMAR Ph: 954-***-****

*** * ****** ** *** 4, STATE COLLEGE, ******@***.***.***

PA 16801 http://www.cse.psu.edu/~huv101/

EDUCATION

Ph. D., Computer Science and Engineering (Current, Expected Summer 2013)

The Pennsylvania State University, University Park

Current GPA: 3.8/4.0

Bachelor of Engineering, Computer Science and Engineering (May 2007)

Sri Venkateswara College of Engineering, Anna University. Chennai, India

First class with distinction (85%, 2nd in class of 66)

PROFESSIONAL EXPERIENCE

Summer Intern - Qualcomm Innovation (Quicinc), Raleigh, NC (May Aug 2010)

Worked as part of team optimizing Linux kernel for Google Chrome netbooks on

Qualcomm hardware. I developed software to probe and test graphic stack capabilities in a

black-box way, using which several driver bugs were discovered.

Research Assistant (Jan 2008 Current, under Dr. Trent Jaeger)

Working on computer security, operating systems and virtualization.

Summer Intern Hexaware Technologies, India (May July 2005)

Developed a teaching aid for Turing Machine in Java

RESEARCH

Operating Systems Security (Current):

Process Firewall: Linux kernel framework to protect processes against resource

access attacks by mapping network firewall concepts onto a process ([1]).

System-Based Vulnerability Testing: Simulate an attacker in the OS (Linux) and

detect if programs are vulnerable to name resolution attacks. We found 21 new

vulnerabilities across 17 programs in Ubuntu and Fedora distributions ([4]).

Locating system-wide attack surfaces: Instrument SELinux kernel access checks

to log process context when malicious input enters a program. We found 81 attack surface

points for the Trusted Computing Base in Ubuntu 10.04.2 ([6]).

Virtualization and Security Policy Analysis (Past):

Xen VMM: Creation of 'privileged' VMs into which specialized security functionality

can be offloaded, to keep the administrative VM small and secure

System Policy Analysis: How can we verify disjoint policies in multiple VMs

(SELinux) and VMM (XSM/Flask) enforce a coherent security goal ([10]).

Network Security and Distributed Systems (Past): Proposed a modification of shortest

path algorithm for distributed systems ([11]). Proposed an algorithmic enhancement to a

packet classification algorithm for faster update times ([12]).

SKILLS

Systems: Linux kernel (security/filesystems), Xen VMM, KVM, SELinux

Languages: C/Python (proficient), C++/Java (prior experience)

SECURITY BUGS REPORTED IN OPEN-SOURCE PROJECTS

Ubuntu init scripts (arbitrary file create vulnerability (CVE-2011-3151)), lightdm (privilege

escalation (CVE-2011-4406)), Icecat browser GNU version of Firefox (Untrusted library

search path), x2go VNC server/client (Untrusted library search path), mountall (Untrusted

search path)

AWARDS

USENIX Security 2009, 2012 Student Travel Grant.

Medal for being placed 6th in The 31st Annual ACM International Collegiate Programming

Contest - (ACM ICPC 2006), Asia Region.

Awarded scholarship in first semester of undergraduate study for outstanding performance.

HAYAWARDH VIJAYAKUMAR Ph: 954-***-****

129 N SPARKS ST APT 4, STATE COLLEGE, ******@***.***.***

PA 16801 http://www.cse.psu.edu/~huv101/

PUBLICATIONS

[1] Hayawardh Vijayakumar and Joshua Schiffman and Trent Jaeger, Process Firewalls:

Protecting Processes During Resource Access, In Proceedings of the 8th ACM European

Conference on Computer Systems (EUROSYS 2013), [acceptance rate: 17.9% (28/156)], To appear

[2] Hayawardh Vijayakumar and Trent Jaeger, The Right Files at the Right Time, In

Proceedings of the 5th IEEE Symposium on Configuration Analytics and Automation (SAFECONFIG

2012).

[3] Divya Muthukumaran and Sandra Rueda and Nirupama Talele and Hayawardh Vijayakumar and

Trent Jaeger and Jason Teutsch and Nigel Edwards, Transforming Commodity Security Policies to

Enforce Clark-Wilson Integrity, In Proceedings of the 28th Annual Computer Security Applications

Conference (ACSAC 2012), [acceptance rate: 19% (44/231)]

[4] Hayawardh Vijayakumar and Joshua Schiffman and Trent Jaeger, STING: Finding Name

Resolution Vulnerabilities in Programs, In Proceedings of the 21st USENIX Security Symposium

(USENIX Security 2012), [acceptance rate: 19.4% (43/222)]

[5] Joshua Schiffman and Hayawardh Vijayakumar and Trent Jaeger, Verifying System Integrity

by Proxy, In Proceedings of the 5th International Conference on Trust and Trustworthy Computing

(TRUST 2012)

[6] Hayawardh Vijayakumar and Guruprasad Jakka and Sandra Rueda and Joshua Schiffman and

Trent Jaeger, Integrity Walls: Finding Attack Surfaces from Mandatory Access Control Policies.,

In Proceedings of the 7th ACM Symposium on Information, Computer, and Communications Security

(ASIACCS 2012) [acceptance rate: 22% (35/159)]

[7] Hayawardh Vijayakumar and Joshua Schiffman and Trent Jaeger, A Rose by Any Other

Name or an Insane Root? Adventures in Name Resolution, In Proceedings of 7th European

Conference on Computer Network Defense (EC2ND 2011).

[8] Joshua Schiffman and Thomas Moyer and Hayawardh Vijayakumar and Trent Jaeger and

Patrick McDaniel, Seeding Clouds with Trust Anchors, In Proceedings of the 2010 ACM Workshop on

Cloud Computing Security (CCSW 2010)

[9] Divya Muthukumaran and Sandra Rueda and Hayawardh Vijayakumar and Trent Jaeger, Cut

Me Some Security, In Proceedings of the 3rd ACM Workshop on Assurable and Usable Security

Configuration (SAFECONFIG 2010)

[10] Sandra Rueda and Hayawardh Vijayakumar and Trent Jaeger, Analysis of Virtual Machine

System Policies, In Proceedings of the 14th ACM Symposium on Access Control Models and

Technologies (SACMAT 2009), [acceptance rate: 32% (24/75)]

[11] Thanukrishnan Srinivasan and R. Balakrishnan and S. A. Gangadharan and Hayawardh

Vijayakumar, A Scalable Parallelization of All-Pairs Shortest Path Algorithm for a High

Performance Cluster Environment, In Proceedings of the 13th IEEE International Conference on

Parallel and Distributed Systems (ICPADS 2007)

[12] Thanukrishnan Srinivasan and R. Balakrishnan and S. A. Gangadharan and Hayawardh

Vijayakumar, Supervised Grid-of-Tries: A Novel Framework for Classifier Management, In

Proceedings of the 8th International Conference on Distributed Computing and Networking (ICDCN

2006), [acceptance rate: 25.3% (62/245)]



Contact this candidate