ISSN: 1383-7621. URL: http : / / www . sciencedirect.com/science

advertisement
Curriculum Vitae
M AHADEVAN G OMATHISANKARAN
Assistant Professor
Department of Computer Science and Engineering
University of North Texas
1155 Union Circle #311366
Denton, TX 76203
Phone: 940-565-4864
mgomathi@unt.edu
∼mgomathi
http://www.cse.unt.edu/
Degrees
Instituition
Major
Degree
Year(s)
REC Trichy, India
Electronics & Communication
B.E.
05/1998
Iowa State University
Computer Engineering
Ph.D.
05/2006
Professional Appointments
Title
University/Laboratory
Year(s)
Assistant Professor
University of North Texas
09/2009 – Present
Post Doc.
Princeton University
12/2007 – 08/2009
Research Scientist
Intel, Bangalore, India
07/2006 – 11/2007
Honors/Fellowships
IBM Ph.D. Fellowship
2004, 2005
Iowa State University Premium for Academic Excellence award
2002
REC Trichy Merit Scholarship
1994–1998
Journal Articles Published
1. Satyajeet Nimgaonkar, Mahadevan Gomathisankaran, and Saraju P. Mohanty. “TSV: A novel
energy efficient Memory Integrity Verification scheme for embedded systems”. In: Journal
of Systems Architecture 59.7 (2013), pp. 400 –411. ISSN: 1383-7621. URL: http : / / www .
sciencedirect.com/science/article/pii/S138376211300057X
2. Mahadevan Gomathisankaran, Kamesh Namuduri, and Akhilesh Tyagi. “HORNS: A Semi-perfectly
Secret Homomorphic Encryption System”. In: American Journal of Science and Engineering 2.1
(2013), pp. 17–23. ISSN: 2159-6913
Curriculum Vitae
1/9
M. Gomathisankaran
3. Satyajeet Nimgaonkar, Mahadevan Gomathisankaran, and SarajuP. Mohanty. “MEM-DnP: A
Novel Energy Efficient Approach for Memory Integrity Detection and Protection in Embedded
Systems”. English. In: Circuits, Systems, and Signal Processing (2013), pp. 1–24. ISSN:
0278-081X. URL: http://dx.doi.org/10.1007/s00034-013-9621-4
4. Satyajeet Nimgaonkar, Srujan Kotikela, and Mahadevan Gomathisankaran. “CTrust: A
framework for Secure and Trustworthy application execution in Cloud computing”. In: Academy
of Science and Engineering (ASE) Science Journal 1.4 (2012)., pp. 152–165
5. Mahadevan Gomathisankaran and Akhilesh Tyagi. “Relating Boolean gate truth tables
to one-way functions”. In: Integrated Computer-Aided Engineering 16.2 (January 2009).,
pp. 141–150. URL: http://dx.doi.org/10.3233/ICA-2009-0307
6. Mahadevan Gomathisankaran and Akhilesh Tyagi. “WARM SRAM : A Novel Scheme to Reduce
Static Leakage Energy in SRAM Arrays”. In: J. Low Power Electronics 2.3 (2006)., pp. 388–400.
URL : http://dx.doi.org/10.1166/jolpe.2006.091
7. Mahadevan Gomathisankaran and Akhilesh Tyagi. “Architecture Support for 3D Obfuscation”.
In: IEEE Trans. Computers 55.5 (2006)., pp. 497–507. URL: http://dx.doi.org/10.1109/TC.
2006.68
Conference/Workshop Articles Published
1. Patrick Kamongi, Srujan Kotikela, Mahadevan Gomathisankaran, and Krishna Kavi. “A
Methodology for Ranking Cloud System Vulnerabilities”. In: Proceedings of The Fourth
International Conference on Computing, Communication and Networking Technologies (ICCCNT’13).
In Press. 2013
2. Patrick Kamongi, Srujan Kotikela, Krishna Kavi, Mahadevan Gomathisankaran, and Anoop
Singhal. “VULCAN: Vulnerability Assessment Framework for Cloud Computing”. In: Software
Security and Reliability (SERE), 2013 IEEE 7th International Conference on. 2013, pp. 218–226.
URL : http://dx.doi.org/10.1109/SERE.2013.31
3. Kamesh Namuduri, Yan Wan, and Mahadevan Gomathisankaran. “Mobile ad hoc networks
in the sky: state of the art, opportunities, and challenges”. In: Proceedings of the second ACM
MobiHoc workshop on Airborne networks and communications. ANC ’13. Bangalore, India:
ACM, 2013, pp. 25–28. ISBN: 978-1-4503-2208-9. URL: http://doi.acm.org/10.1145/
2491260.2491265
4. S. Nimgaonkar, S. Kotikela, and M. Gomathisankaran. “CTrust: A Framework for Secure and
Trustworthy Application Execution in Cloud Computing”. In: Cyber Security (CyberSecurity),
2012 International Conference on. 2012, pp. 24–31. URL: http://dx.doi.org/10.1109/
CyberSecurity.2012.10
5. M. Gomathisankaran, K. Namuduri, and A. Tyagi. “HORNS: A semi-perfectly secret homomorphic
encryption system”. In: 2012 Third International Conference on Computing Communication
Networking Technologies (ICCCNT). 2012, pp. –. URL: http://dx.doi.org/10.1109/ICCCNT.
2012.6479590
6. Mahadevan Gomathisankaran and Akhilesh Tyagi. “A Novel Design of Secure and Private
Circuits”. In: 2012 IEEE Computer Society Annual Symposium on VLSI (ISVLSI). 2012, pp. 362
Curriculum Vitae
2/9
M. Gomathisankaran
–367
7. Srujan Kotikela, Krishna Kavi, and Mahadevan Gomathisankaran. “Vulnerability Assessment
in Cloud Computing”. In: The 2012 International Conference on Security & Management (SAM
2012). Ed. by. July 16 - 19, 2012, Las Vegas, Nevada, USA: CSREA Press, 2012, pp. 67–73
8. Kamesh Namuduri, Yan Wan, Mahadevan Gomathisankaran, and Ravi Pendse. “Airborne
network: a cyber-physical system perspective”. In: Proceedings of the first ACM MobiHoc
workshop on Airborne Networks and Communications. Airborne ’12. Hilton Head, South
Carolina, USA: ACM, 2012, pp. 55–60. ISBN: 978-1-4503-1290-5. URL: http://doi.acm.org/
10.1145/2248326.2248340
9. Srujan Kotikela, Satyajeet Nimgaonkar, and Mahadevan Gomathisankaran. “Virtualization
Based Secure Execution and Testing Framework”. In: Proceedings of The IASTED International
Conference Parallel and Distributed Computing and Systems (PDCS 2011). Ed. by T. Gonzalez.
ACTA Press, 2011, pp. 65–72
10. Satyajeet Nimgaonkar and Mahadevan Gomathisankaran. “Energy Efficient Memory Authentication
Mechanism in Embedded Systems”. In: Proceedings of the International Symposium on
Electronic System Design (ISED).. Kochi, India: IEEE Computer Society, 2011, pp. 248–253.
ISBN : 978-0-7695-4570-7. URL: http://doi.ieeecomputersociety.org/10.1109/ISED.2011.
34
11. Mahadevan Gomathisankaran, Akhilesh Tyagi, and Kamesh Namuduri. “HORNS : A homomorphic
encryption scheme for Cloud Computing using Residue Number System”. In: 45 th Annual
Conference on Information Sciences and Systems (CISS 2011). 2011, pp. 1–5. URL: http:
//dx.doi.org/10.1109/CISS.2011.5766176
12. Srujan Kotikela, Satyajeet Nimgaonkar, and Mahadevan Gomathisankaran. “POSTER: Virtualization
Based Security Framework (vBASE)”. in: Annual Computer Security Applications Conference
(ACSAC), Orlando, Florida. 2011
13. Mahadevan Gomathisankaran and Kamesh Namuduri. “Secure Embedded Platforms for
Networked Automotive Systems”. In: Workshop on Developing Dependable and Secure Automotive
Cyber-physical Systems from Components. Troy, MI, 2011
14. Jeffrey S. Dwoskin, Mahadevan Gomathisankaran, Yu-Yuan Chen, and Ruby B. Lee. “A
framework for testing hardware-software security architectures”. In: Proceedings of the 26th
Annual Computer Security Applications Conference. ACSAC ’10. Austin, Texas: ACM, 2010,
pp. 387–397. ISBN: 978-1-4503-0133-6. URL: http : / / doi . acm . org / 10 . 1145 / 1920261 .
1920318
15. Mahadevan Gomathisankaran, Gayatri Mehta, and Kamesh Namuduri. “Power, performance
and security optimized hardware design for H.264”. In: Proceedings of the Sixth Annual
Workshop on Cyber Security and Information Intelligence Research. New York, NY, USA: ACM,
2010, pp. 62–1. URL: http://doi.acm.org/10.1145/1852666.1852735
16. Mahadevan Gomathisankaran and Ruby Lee. “Tantra : A Fast PRNG Algorithm and its
Implementation”. In: Proceedings of the 2009 International Conference on Security & Management,
SAM 2009, July 13-16, 2009, Las Vegas Nevada, USA, 2 Volumes. Ed. by Hamid R Arabnia and
Kevin Daimi. CSREA Press, 2009, pp. 593–598
17. Mahadevan Gomathisankaran and Ruby B Lee. “Maya: A Novel Block Encryption Function”.
Curriculum Vitae
3/9
M. Gomathisankaran
In: Preproceedings of International Workshop on Coding and Cryptography May 10–15, 2009,
Ullensvang, Norway (WCC 2009). Lofthus, Norway, 2009
18. Mahadevan Gomathisankaran, Ka-Ming Keung, and Akhilesh Tyagi. “REBEL - Reconfigurable
Block Encryption Logic”. In: SECRYPT. ed. by Eduardo Fernández-Medina, Manu Malek, and
Javier Hernando. INSTICC Press, 2008, pp. 312–318. ISBN: 978-989-8111-59-3
19. Mahadevan Gomathisankaran and Akhilesh Tyagi. “Relating Boolean gate truth tables to
one-way functions”. In: 2008 IEEE International Conference on Electro/Information Technology.
IEEE, 2008, pp. 1–6. ISBN: 978-1-4244-2030-8. URL: http://dx.doi.org/10.1109/EIT.2008.
4554258
20. Mahadevan Gomathisankaran and Akhilesh Tyagi. “Arc3D : A 3D Obfuscation Architecture”.
In: High Performance Embedded Architectures and Compilers. Springer, 2005, pp. 184–199.
URL : http://dx.doi.org/10.1007/11587514_13
21. Mahadevan Gomathisankaran and Akhilesh Tyagi. “TIVA : Trusted Integrity Verification
Architecture”. In: DRMTICS : Technologies, Issues, Challenges and Systems, First International
Conference, DRMTICS 2005, Sydney, Australia, October 31 - November 2, 2005, Revised Selected
Papers. Ed. by Reihaneh Safavi-Naini and Moti Yung. Springer, 2005, pp. 13–31. URL:
http://dx.doi.org/10.1007/11787952_2
22. Mahadevan Gomathisankaran and Akhilesh Tyagi. “WARM SRAM : A Novel Scheme to Reduce
Static Leakage Energy in SRAM Arrays”. In: IEEE Compute Society Annual Symposium on
VLSI (ISVLSI). IEEE Computer Society, 2004, pp. 105–114. URL: http://dx.doi.org/10.
1109/ISVLSI.2004.1339516
Patents
1. Mahadevan Gomathisankaran and Akhilesh Tyagi. REBEL: REconfigurable Block Encryption
Logic for Cyber Security. Iowa State University, Patent Pending (Ref. No: ISURF 3404). 2006.
URL : http://www.techtransfer.iastate.edu/documents/7e3741202920328680.pdf
Theses
1. Mahadevan Gomathisankaran. “Secure execution environments through reconfigurable lightweight
cryptographic components”. PhD thesis. Ames, IA: Iowa State University, 2006. URL: http:
//archives.ece.iastate.edu/archive/00000241/01/thesis.pdf
Technical Reports
1. Jeffrey Dwoskin, Mahadevan Gomathisankaran, and Ruby Lee. Framework for Design Validation
of Security Architectures. Tech. rep. CE-L2008-013. Princeton University, 2008
2. Mahadevan Gomathisankaran and Akhilesh Tyagi. How to Hide Secrets from Operating System:
Architecture Level Support for Dynamic Address Trace Obfuscation. Tech. rep. Iowa State
University, 2004. URL: http://archives.ece.iastate.edu/archive/00000101/01/aslpos.
pdf
Curriculum Vitae
4/9
M. Gomathisankaran
3. Mahadevan Gomathisankaran and Arun Somani. Efficient Energy Saving Scheme for On Chip
Caches. Tech. rep. Iowa State University, 2002. URL: http://archives.ece.iastate.edu/
archive/00000111/01/isca03_paper_144_v2.pdf
Research Grants
1. FRP: Sensor Fusion Research for Net-Centric Applications (Collaborative proposal with ASU)
Agency: NSF (Subcontract to ASU)
Collaborators: Dr. Krishna Kavi ( Co-PI )
Funding Amount: $25,000
Funding Period: 07/01/2012 — 06/30/2014
Yearly Effort: Summer 0.09 months
2. FRP: Risk Assessment Techniques for Off-line and On-line Security Evaluation of Cloud
Computing (Collaborative proposal with MUST)
Agency: NSF
Collaborators: Dr. Krishna Kavi ( Co-PI )
Funding Amount: $89,467
Funding Period: 08/01/2013 — 07/31/2015
Yearly Effort: Summer 0.15 months
3. Secure Policy Engine in Hypevisor using Hardware Trust Mechanisms
Agency: Net-Centric I/UCRC Project funded by Samsung
Collaborators: Dr. Krishna Kavi ( Co-PI )
Funding Amount: $35,000
Funding Period: 10/15/2013 — 10/14/2014
Yearly Effort: 0.00 months
4. Workshop on Airborne Networks and Communications
Agency: NSF
Collaborators: Dr. Kamesh Namuduri ( PI ), Dr. Yan Wan ( Co-PI )
Funding Amount: $26,206
Funding Period: 07/01/2013 – 11/30/2013
Yearly Effort: Summer 0.01 months
Instructional Assignments
1. CSCE 4550/5550 Introduction to Computer Security — Fall 2009, Fall 2011, Fall 2012
Short Description:
The aim of this course is to introduce the concepts and principles of computer security - including
program, OS and network security - security threats and countermeasures against them; to
implement some basic computer security applications and to gain hands on experience.
2. CSCE 4610/5610 Computer Systems Architecture — Spring 2010
Short Description:
Curriculum Vitae
5/9
M. Gomathisankaran
The purpose of this course is to provide students with a solid foundation in computer systems
architecture. This course is generally considered as a foundation to further study and research
in computer systems. We survey several different approaches to designing a single CPU that
can aid in building a parallel processor. We investigate instruction level parallelism, branch
prediction techniques, various cache organization, multithreaded architectures, cache coherency
and their impact on parallel processing.
3. CSCE 5933 Trusted and Secure Computing — Fall 2010
Short Description: The purpose of this course is to introduce graduate students to the latest
developments in the field of trusted and secure computing platforms. This is an advanced
course and requires knowledge of computer systems architecture, operating systems and applied
cryptography.
4. CSCE 5050 Introduction to Cryptography — Spring 2011, Spring 2012
Short Description:
The aim of this course is to educate graduate students about the fundamentals of cryptography.
Cryptography is the fundamental building block of any computer security solution. This course
will introduce various cryptographic algorithms and their applications. The knowledge gained
from this course will enable students to apply these cryptographic algorithms in a better way to
design secure systems.
5. CSCE 2610 Assembly Language and Computer Organization — Spring 2011, Fall 2011
Short Description:
Principles of computer systems organization, instruction sets, computer arithmetic, data and
control paths, memory hierarchies, and assembly language.
6. CSCE 6933 Advanced Topics in Trusted and Secure Computing — Fall 2012, Spring 2014
Short Description:
Advanced topics about designing trusted and secure computing systems. Tamper evident and
tamper resistant architectures. Industrial platforms like Intel Trusted Execution Technology,
Trusted Platform Module, ARM TrustZone. Academic solutions like XOM, AEGIS, Arc3D.
7. CSCE 4930/5933 Applications of Cryptography — Spring 2013, Spring 2014
Short Description:
The aim of this course is to introduce students to concepts of cryptography and its applications.
Cryptography is the fundamental building block of any computer security solution. The
knowledge gained from this course will enable students to apply these cryptographic algorithms
in a better way to design security solutions.
8. CSCE 3612 Embedded Systems Design — Fall 2013
Short Description:
The aim of this course is to introduce students to Computer systems designed as embedded
computing elements and micro-controllers. Embedded systems design using System specification
such as UML or other high-level abstract models. Issues and constraints on embedded computing
systems, including power, performance, memory and size.
Curriculum Vitae
6/9
M. Gomathisankaran
9. CSCE 4930/5933 Advanced Information Systems Security — Fall 2013
Short Description:
This course is to augment the CNSS 4011 & 4013 security certification curriculum. In this
course we cover topics that map to the Advanced level of the CNSS curriculum. The topics
covered in this course are necessary to prepare our students for the National Collegiate Cyber
Defense Competition (CCDC).
New Preparations and/or Revisions
1. Proposed a new graduate level course Trusted and Secure Computing in the Computer Science
and Engineering Department. The syllabus of this course was accepted by the Graduate
Committee.
2. Proposed a new graduate level course Introduction to Cryptography (CSCE 5050) in the
Computer Science and Engineering Department. The syllabus of this course was accepted
by the Graduate Committee. This course has been accepted by the University Committee to be
added to the catalog.
3. Proposed a new under-graduate level course Applications of Cryptography (CSCE 4050) in the
Computer Science and Engineering Department. The syllabus of this course was accepted by
the Undergraduate Committee. This course will be offered in Spring 2013. This course has been
accepted by the University Committee to be added to the catalog.
4. Proposed a new under-graduate and graduate level course Advanced Information Systems
Security in the Computer Science Department. The syllabus of this course was accepted by both
the Undergraduate and Graduate Committees. This course is being taught in Fall 2013.
5. Redesigned the lab materials for the Introduction to Computer Security (CSCE 4550/5550)
course to provide a better hands on experience for the students. The new lab infrastructure uses
virtualization technology and enables students’ to access their lab content anywhere anytime.
Undergraduate Student Advising
2013 Mentored two Senior Design teams (one Computer Engineering and one BAIT) working on
project “TruID” which is a password less authentication system. One of the two teams presented
their work in the Hi-TEC 2013 conference.
Doctoral Student Advising
1. Satyajeet Nimgaonkar, Ph.D., Expected Graduation: Summer 2014, Research Readiness: Spring
2011, Degree Plan in File.
2. Srujan Kotikela, Ph.D., Expected Graduation: Spring 2015, Degree Plan in File.
3. Patrick Kamongi, Ph.D., Expected Graduation: Spring 2016.
Doctoral Committee
1. Patrick Burke
Curriculum Vitae
7/9
M. Gomathisankaran
2.
3.
4.
5.
Eric Ayeh
Oghenekahro (Karo) Okobiah
Tomislav Janjuisic (Graduated: June 2013)
Tomyo Maeshiro
Masters Student Graduated
1. Yernat Yestekov, M.S. (Thesis), Graduated: Summer 2013, Thesis Title: Design and Analysis of
Novel Verifiable Voting Schemes.
Masters Student Advising
1. Mohan Tarigopula, M.S., Expected Graduation: Spring 2015
2. Tawfiq Shah, M.S. (Thesis), Expected Graduation: Fall 2014
Masters Committee
1. Mahesh Gautam (Graduated: May 2013)
2. Anthony Hansen (Graduated: May 2014)
Synergistic Activities
2013 Delivered an Invited Talk at the MUST Computer Science Department Seminar Series.
2013 Delivered an Invited Talk at the UTA Computer Science and Engineering Department Colloquium
Series.
2013 Session Chair for The Seventh International Conference on Security and Reliability (SERE)
2013.
2013 Co-organized AIAA Workshop on Airborne Networks and Communications.
2011 Delived an Invited Talk at the UT Dallas Computer Science Department Colloquium series.
2012 Co-organized the workshop Security on the move and in the cloud at UNT. UNT in collaboration
with the Convergence Technology Center at Collin College, hosted a 1-day workshop on Security
issues related to mobile device platforms and applications, Social Media and the Cloud. The
conference is intended for Community College and University Faculty Members and Students
as well as Industry Professionals interested in discussing new trends in security as well address
issues in the mobile space, the rise of Social Media and Cloud Computing and Storage.
2012 Organizing Chair of a special session on Secure embedded systems at the ISVLI 2012 conference.
2008 Mahadevan Gomathisankaran. Secure Embedded Systems. IEEE International Conference
Electro/Information Technology (EIT) 2008, Iowa State University, Ames, IA. 2008. URL:
http://viper.eng.iastate.edu/gmdev/pubs/eit08-tutorial.pdf
Curriculum Vitae
8/9
M. Gomathisankaran
Professional Service
Editorial Board
Information Security Journal: A Global Perspective
International Journal of Information and Network Security
ASE Science Journal
Program Chair/Session Chair
IEEE Computer Society Annual Symposium on VLSI
2012, 2014
International Conference on Software Security and Reliability (SERE)
2013
International Conference on Information Technology (ICIT)
2014
Technical Program Committee Member
International Symposium on Electronic System Design (ISED)
2010, 2011
International Conference on Computer Communication Networks (ICCN)
2011
International Conference on Computing, Communication and Networking
Technologies (ICCCNT)
2012
ACM MobiHoc Workshop on Airborne Networks and Communications
2012
IEEE Computer Society Annual Symposium on VLSI
2012, 2014
Reviewer
IEEE Transactions on VLSI
Journal of Low Power Electronics
Transactions on Information Forensics & Security
High-Performance and Embedded Architecture and Compilers (HiPEAC)
Curriculum Vitae
9/9
2010
M. Gomathisankaran
Download