plate 01 · elevation boston · 42.3398° N
Portrait of Het Rutul Joshi aham
subject of elevation

Het Rutul Joshi

Security researcher · systems engineer · hacker

Graduate student at Northeastern University. Architecting distributed systems, hunting network vulnerabilities, and dismantling tracking infrastructures — from securing ISRO's LIDAR sensors to exposing how smart TVs fingerprint the people who buy them.

1 Book chapter
1 Published patent
30+ Workshops & talks
1600+ Students mentored
Mukti Largest FOSS community in India
h = 159 a = 140 kalaśa śikhara garbhagṛha jagati
dwg
hero elevation
drawn
h. joshi
scale
1 : 1
date
2026 · 04
sheet
01 of 07

"Everything is hackable, even your toothbrush."

— Yours Truly :D
chapter i the conviction
plate 02 · origins founding · india

Beyond the syllabus.

My philosophy is simple: "Everything is hackable, even your toothbrush." True engineering doesn't happen in a textbook; it happens when you break a system down to its silicon and rebuild it.

This conviction led to founding Mukti — what began as small weekend hackathons grew into one of the largest student Free and Open Source Software communities in India. We scaled to a network of builders shipping real code, democratizing technology, and reclaiming our digital autonomy.

The mission was always the same: democratize access to real engineering knowledge — not the kind you get from a lecture, but the kind you earn by breaking things and rebuilding them better.

"I am a man and all that affects mankind concerns me."

— Bhagat Singh
chapter ii elevations · research trajectory
plate 03 · the research years isro · iit bombay

Defending the architecture.

i · 2025 — present · boston

Northeastern University, Boston

research apprentice · prof. david choffnes

Dissecting blackbox systems across major smart TV brands at the Mon(IoT)r Lab. Mapping exactly how embedded firmware fingerprints the people who buy them.

§ 2.3
ii · may 2024 — may 2025 · mumbai

Indian Institute of Technology, Bombay

security researcher · trust lab

Investigated the hidden topology of tunnel-based reverse proxies (like Ngrok) under Prof. Devashish Gosain at IITB's Trust Lab. Mapped their privacy implications and modeled their viability as Tor relays — lead author on the resulting paper.

§ 2.2
iii · apr — jun 2024 · bengaluru

Indian Space Research Organisation

systems & software security intern

Developed and secured a communication protocol for LIDAR sensor data on an embedded system. When you are writing code for aerospace hardware, failure means losing a satellite's eyes — memory safety and secure boot chains are not optional.

§ 2.1

"A ship in harbor is safe, but that is not what ships are built for."

— John A. Shedd
chapter iii transmission · teaching
plate 04 · transmission bangalore

To secure it is to teach it.

Understanding a system well enough to secure it means understanding it well enough to teach it.

iv · oct 2024 — jun 2025 · bangalore

Ramaiah Institute of Technology

teaching assistant · network security

Delivered lectures on Network Security and Data Communication Networks to 120+ students. From ARP poisoning to Snort IDS, from IPv6 MITM to SambaCry — built exercises that forced students to earn their understanding by breaking things first.

§ 3.1
intermezzo recognition
plate 05 · honors & distinctions the ledger

Honors & distinctions.

  1. i apprenticeship

    Khoury Graduate Apprenticeship

    Awarded at Northeastern University. Research focus on ACR systems, smart TV user privacy, and network fingerprinting.

    2025 — Present
  2. ii community

    Founder — Mukti FOSS Community

    One of the largest student open-source communities in India. 1,600+ students mentored, leading FOSS advocacy and engineering.

    2020 — Present
  3. iii research

    Lead Author — IIT Bombay Trust Lab

    Lead author on research investigating Ngrok reverse-proxy performance and Tor relay potential.

    2025
  4. iv speaker

    Top Speaker — FOSSMeet '24 & '25

    Workshops and talks on digital privacy, anonymity, and cybersecurity threats at NIT Calicut.

    2024 & 2025
  5. v patent

    CHARGE GUARD — Gov. of India

    Method for early detection of DDoS attacks. Kernel-level mitigation for EV charging infrastructure.

    published
  6. vi book chapter

    Cryptographic Bastions — CRC Press

    Co-authored with Neeraj Phadke. Cloud security, access control, and encryption primitives. Read ↗

    2024
chapter iv details · selected work
plate 06 · arsenal four details

Selected work.

project 01 · kavaach

Kavaach · OCPP testbed.

patent filed

The first de-facto OCPP testbed replicating real-world EV charging stations — SYN floods, billing exploits, and kernel-level mitigation benchmarks. Enabled academia to research cybersecurity solutions for EV charging networks.

topic
ev · ocpp
stack
python · rpi
year
2024
status
patent · gov. in
project 02 · sshread

SSHRead · a channel where no channel should exist.

under review

A novel class of covert communication that operates over a service already deployed on most of the internet — without establishing a session, without traversing the data plane, and without tripping the heuristics long tuned to catch it. The whitepaper proves the channel's existence, bounds its throughput under contemporary defences, and proposes mitigations on a surface most operators do not think to harden.

The specific mechanism, the encoding families it employs, and the precise mitigation path are withheld pending peer review. What the design establishes is unambiguous: security-by-logging — a trust assumption wired into nearly every production deployment of the underlying service — is substantially quieter than the community treats it as.

fig. 6.1 — channel topology · redacted see whitepaper
ENDPOINT A initiator no credential α [ redacted ] see whitepaper no session · no data plane · no signature ENDPOINT Ω reconstructs read-only access ω datum — the path through the middle is intentionally hidden.
status
under review
year
2025
venue
tbd
details
withheld
project 03 · netra

NETRA · automated incident response.

systems

A real-time Automated Incident Response System integrating threat detection, decentralized threat intelligence, and self-healing infrastructure — built atop PySpark and ZeroMQ.

topic
airs
stack
pyspark · 0mq
feature
post-quantum
status
built
project 04 · sanjay

Sanjay · malicious AP detector.

cli

A CLI tool to detect malicious or insecure Wi-Fi networks through active and passive scanning — identifies Evil Twin, Honeypot, and Deauth attacks using Scapy.

topic
wifi security
stack
python · bash
lib
scapy
status
shipped
colophon contact
plate 07 · contact the sanctum

Let's build something resilient.

Let's talk FOSS, system architecture, or anything security.