Northeastern University, Boston
Dissecting blackbox systems across major smart TV brands at the Mon(IoT)r Lab. Mapping exactly how embedded firmware fingerprints the people who buy them.
aham
Graduate student at Northeastern University. Architecting distributed systems, hunting network vulnerabilities, and dismantling tracking infrastructures — from securing ISRO's LIDAR sensors to exposing how smart TVs fingerprint the people who buy them.
"Everything is hackable, even your toothbrush."
— Yours Truly :D
My philosophy is simple: "Everything is hackable, even your toothbrush." True engineering doesn't happen in a textbook; it happens when you break a system down to its silicon and rebuild it.
This conviction led to founding Mukti — what began as small weekend hackathons grew into one of the largest student Free and Open Source Software communities in India. We scaled to a network of builders shipping real code, democratizing technology, and reclaiming our digital autonomy.
The mission was always the same: democratize access to real engineering knowledge — not the kind you get from a lecture, but the kind you earn by breaking things and rebuilding them better.
"I am a man and all that affects mankind concerns me."
— Bhagat Singh
Dissecting blackbox systems across major smart TV brands at the Mon(IoT)r Lab. Mapping exactly how embedded firmware fingerprints the people who buy them.
Investigated the hidden topology of tunnel-based reverse proxies (like Ngrok) under Prof. Devashish Gosain at IITB's Trust Lab. Mapped their privacy implications and modeled their viability as Tor relays — lead author on the resulting paper.
Developed and secured a communication protocol for LIDAR sensor data on an embedded system. When you are writing code for aerospace hardware, failure means losing a satellite's eyes — memory safety and secure boot chains are not optional.
"A ship in harbor is safe, but that is not what ships are built for."
— John A. Shedd
Understanding a system well enough to secure it means understanding it well enough to teach it.
Delivered lectures on Network Security and Data Communication Networks to 120+ students. From ARP poisoning to Snort IDS, from IPv6 MITM to SambaCry — built exercises that forced students to earn their understanding by breaking things first.
Awarded at Northeastern University. Research focus on ACR systems, smart TV user privacy, and network fingerprinting.
One of the largest student open-source communities in India. 1,600+ students mentored, leading FOSS advocacy and engineering.
Lead author on research investigating Ngrok reverse-proxy performance and Tor relay potential.
Workshops and talks on digital privacy, anonymity, and cybersecurity threats at NIT Calicut.
Method for early detection of DDoS attacks. Kernel-level mitigation for EV charging infrastructure.
Co-authored with Neeraj Phadke. Cloud security, access control, and encryption primitives. Read ↗
The first de-facto OCPP testbed replicating real-world EV charging stations — SYN floods, billing exploits, and kernel-level mitigation benchmarks. Enabled academia to research cybersecurity solutions for EV charging networks.
A novel class of covert communication that operates over a service already deployed on most of the internet — without establishing a session, without traversing the data plane, and without tripping the heuristics long tuned to catch it. The whitepaper proves the channel's existence, bounds its throughput under contemporary defences, and proposes mitigations on a surface most operators do not think to harden.
The specific mechanism, the encoding families it employs, and the precise mitigation path are withheld pending peer review. What the design establishes is unambiguous: security-by-logging — a trust assumption wired into nearly every production deployment of the underlying service — is substantially quieter than the community treats it as.
A real-time Automated Incident Response System integrating threat detection, decentralized threat intelligence, and self-healing infrastructure — built atop PySpark and ZeroMQ.
A CLI tool to detect malicious or insecure Wi-Fi networks through active and passive scanning — identifies Evil Twin, Honeypot, and Deauth attacks using Scapy.
Let's talk FOSS, system architecture, or anything security.