Post Job Free
Sign in

Java Developer

Location:
Morrisville, NC, 27560
Posted:
June 23, 2016

Contact this candidate

Resume:

Shilpa Kumari

**** ****** ** ****** ******** l le, NC 27560 Contact: +1-845-***-**** / ********@******.****.*** Summary

M.S. in Computer Science, with excellent knowledge in software security, and is a Permanent Resident (Green card holder) of USA. Looking for full time opportunity in Software Development, Security and Testing. Education

Master of Science in Computer Science with GPA:3.94/4.0 at North Carolina Agricultural and Technical State University, USA from Aug 2014 through May 2016

Bachelor of Technology in Computer Science with CGPA: 7.6/10.0 at R.V.S. College of Engineering and Technology, India from 2006 through 2010

Skills

Security Tools : RATs, FlawFinder, CheckMarx, Microsoft Threat Modelling Tool Programming : Core Java (SE), C++, JSP, JSTL, SQL

Operating System : UNIX, Windows, Linux

Databases : MySQL

Platform : NetBeans

Academic Achievements

1. Shilpa Kumari, Xiaohong Yuan, “Demystifying Ad Fraud”, Women in Cyber Security Conference (WiCys), Dallas, 2016. The poster won second place in the student poster presentation. 2. Outstanding Graduate Researcher, North Carolina Agricultural and Technical State University, 2015- 2016

3. Outstanding Graduate Teaching Assistant, North Carolina Agricultural and Technical State University, 2015-2016

Work Experience

Graduate Teaching/Research Assistant, January 2016 – May 2016

Teaching assistant for Secure Software Engineering Class

Assisted research on security vulnerabilities that lead to online advertisement frauds References

1. Dr. Xiaohong Yuan, Professor, North Carolina A&T State University, Email : ******@****.***, Phone:

336-***-****

2. More references available on request

Academic Projects

Master’s Project:

Title: Demystifying Ad Fraud

Advisor: Dr. Xiaohong Yuan

Description: In this project, I developed a course module that can teach students about online ad servicing architecture, associated security vulnerabilities, and how they can be exploited. I built an infrastructure that can be used by students and other researchers for simulating ad frauds such as ad replacement fraud which involves advertisers, publishers, malicious resolvers and ad servers. Other:

Student Recruitment System: Developed a database system for a university to help managing records of prospective students, academic departments and programs, and administrative departments. JSP/JSTL was used for GUI and MySQL was used for database.

Secure Web Application: Developed a secure web application for Online Gadget Store. Implemented several security features such as password encryption, time-stamping, certificates for WWW, and SSL/TLS. Used JSP/JSTL for GUI, MySQL for database, and GlassFish for webserver.

Risk Management Framework: Applied Risk Management Framework on a software product. It involved understanding business context, identifying business and technical risks, synthesizing and ranking risks, defining risk mitigation strategy, and generating a complete validation plan.

Threat Modeling: Using STRIDE model, identified threats in a web application (tunestore). Additionally, used Microsoft Threat Modeling tool to identify the threats in same application. Compared the findings of aforementioned two approaches.

Static Code Review: Used RATs, FlawFinder and CheckMarx to scan a Java Application for security vulnerabilities such as buffer overflow, SQL injection etc.

Inter-process communication and synchronization: Implemented inter-process synchronization involved in reader-writer and dining-philosopher problem using two commonly used high-level mechanisms namely a) Semaphores, and b) Monitors in Java.

Hospital Management System: Employed different software development methods such as Structured Analysis, Object Oriented Analysis, and Agile method (Spiral Model) in developing a web application for Hospital Management System

Relevant Courses

Advanced Operating System (A), Formal Methods (A), Web Security (A-), Secure Software Engineering (A), Advanced Analysis of Algorithms (A), Information Privacy and Security (A-), Software Security Testing (A), Computer Database Management (A), Software Specification Analysis and Design (A)



Contact this candidate