Curriculum Vitae M AHADEVAN G OMATHISANKARAN Assistant Professor Department of Computer Science and Engineering University of North Texas 1155 Union Circle #311366 Denton, TX 76203 Phone: 940-565-4864 mgomathi@unt.edu ∼mgomathi http://www.cse.unt.edu/ Degrees Instituition Major Degree Year(s) REC Trichy, India Electronics & Communication B.E. 05/1998 Iowa State University Computer Engineering Ph.D. 05/2006 Professional Appointments Title University/Laboratory Year(s) Assistant Professor University of North Texas 09/2009 – Present Post Doc. Princeton University 12/2007 – 08/2009 Research Scientist Intel, Bangalore, India 07/2006 – 11/2007 Honors/Fellowships IBM Ph.D. Fellowship 2004, 2005 Iowa State University Premium for Academic Excellence award 2002 REC Trichy Merit Scholarship 1994–1998 Journal Articles Published 1. Satyajeet Nimgaonkar, Mahadevan Gomathisankaran, and Saraju P. Mohanty. “TSV: A novel energy efficient Memory Integrity Verification scheme for embedded systems”. In: Journal of Systems Architecture 59.7 (2013), pp. 400 –411. ISSN: 1383-7621. URL: http : / / www . sciencedirect.com/science/article/pii/S138376211300057X 2. Mahadevan Gomathisankaran, Kamesh Namuduri, and Akhilesh Tyagi. “HORNS: A Semi-perfectly Secret Homomorphic Encryption System”. In: American Journal of Science and Engineering 2.1 (2013), pp. 17–23. ISSN: 2159-6913 Curriculum Vitae 1/9 M. Gomathisankaran 3. Satyajeet Nimgaonkar, Mahadevan Gomathisankaran, and SarajuP. Mohanty. “MEM-DnP: A Novel Energy Efficient Approach for Memory Integrity Detection and Protection in Embedded Systems”. English. In: Circuits, Systems, and Signal Processing (2013), pp. 1–24. ISSN: 0278-081X. URL: http://dx.doi.org/10.1007/s00034-013-9621-4 4. Satyajeet Nimgaonkar, Srujan Kotikela, and Mahadevan Gomathisankaran. “CTrust: A framework for Secure and Trustworthy application execution in Cloud computing”. In: Academy of Science and Engineering (ASE) Science Journal 1.4 (2012)., pp. 152–165 5. Mahadevan Gomathisankaran and Akhilesh Tyagi. “Relating Boolean gate truth tables to one-way functions”. In: Integrated Computer-Aided Engineering 16.2 (January 2009)., pp. 141–150. URL: http://dx.doi.org/10.3233/ICA-2009-0307 6. Mahadevan Gomathisankaran and Akhilesh Tyagi. “WARM SRAM : A Novel Scheme to Reduce Static Leakage Energy in SRAM Arrays”. In: J. Low Power Electronics 2.3 (2006)., pp. 388–400. URL : http://dx.doi.org/10.1166/jolpe.2006.091 7. Mahadevan Gomathisankaran and Akhilesh Tyagi. “Architecture Support for 3D Obfuscation”. In: IEEE Trans. Computers 55.5 (2006)., pp. 497–507. URL: http://dx.doi.org/10.1109/TC. 2006.68 Conference/Workshop Articles Published 1. Patrick Kamongi, Srujan Kotikela, Mahadevan Gomathisankaran, and Krishna Kavi. “A Methodology for Ranking Cloud System Vulnerabilities”. In: Proceedings of The Fourth International Conference on Computing, Communication and Networking Technologies (ICCCNT’13). In Press. 2013 2. Patrick Kamongi, Srujan Kotikela, Krishna Kavi, Mahadevan Gomathisankaran, and Anoop Singhal. “VULCAN: Vulnerability Assessment Framework for Cloud Computing”. In: Software Security and Reliability (SERE), 2013 IEEE 7th International Conference on. 2013, pp. 218–226. URL : http://dx.doi.org/10.1109/SERE.2013.31 3. Kamesh Namuduri, Yan Wan, and Mahadevan Gomathisankaran. “Mobile ad hoc networks in the sky: state of the art, opportunities, and challenges”. In: Proceedings of the second ACM MobiHoc workshop on Airborne networks and communications. ANC ’13. Bangalore, India: ACM, 2013, pp. 25–28. ISBN: 978-1-4503-2208-9. URL: http://doi.acm.org/10.1145/ 2491260.2491265 4. S. Nimgaonkar, S. Kotikela, and M. Gomathisankaran. “CTrust: A Framework for Secure and Trustworthy Application Execution in Cloud Computing”. In: Cyber Security (CyberSecurity), 2012 International Conference on. 2012, pp. 24–31. URL: http://dx.doi.org/10.1109/ CyberSecurity.2012.10 5. M. Gomathisankaran, K. Namuduri, and A. Tyagi. “HORNS: A semi-perfectly secret homomorphic encryption system”. In: 2012 Third International Conference on Computing Communication Networking Technologies (ICCCNT). 2012, pp. –. URL: http://dx.doi.org/10.1109/ICCCNT. 2012.6479590 6. Mahadevan Gomathisankaran and Akhilesh Tyagi. “A Novel Design of Secure and Private Circuits”. In: 2012 IEEE Computer Society Annual Symposium on VLSI (ISVLSI). 2012, pp. 362 Curriculum Vitae 2/9 M. Gomathisankaran –367 7. Srujan Kotikela, Krishna Kavi, and Mahadevan Gomathisankaran. “Vulnerability Assessment in Cloud Computing”. In: The 2012 International Conference on Security & Management (SAM 2012). Ed. by. July 16 - 19, 2012, Las Vegas, Nevada, USA: CSREA Press, 2012, pp. 67–73 8. Kamesh Namuduri, Yan Wan, Mahadevan Gomathisankaran, and Ravi Pendse. “Airborne network: a cyber-physical system perspective”. In: Proceedings of the first ACM MobiHoc workshop on Airborne Networks and Communications. Airborne ’12. Hilton Head, South Carolina, USA: ACM, 2012, pp. 55–60. ISBN: 978-1-4503-1290-5. URL: http://doi.acm.org/ 10.1145/2248326.2248340 9. Srujan Kotikela, Satyajeet Nimgaonkar, and Mahadevan Gomathisankaran. “Virtualization Based Secure Execution and Testing Framework”. In: Proceedings of The IASTED International Conference Parallel and Distributed Computing and Systems (PDCS 2011). Ed. by T. Gonzalez. ACTA Press, 2011, pp. 65–72 10. Satyajeet Nimgaonkar and Mahadevan Gomathisankaran. “Energy Efficient Memory Authentication Mechanism in Embedded Systems”. In: Proceedings of the International Symposium on Electronic System Design (ISED).. Kochi, India: IEEE Computer Society, 2011, pp. 248–253. ISBN : 978-0-7695-4570-7. URL: http://doi.ieeecomputersociety.org/10.1109/ISED.2011. 34 11. Mahadevan Gomathisankaran, Akhilesh Tyagi, and Kamesh Namuduri. “HORNS : A homomorphic encryption scheme for Cloud Computing using Residue Number System”. In: 45 th Annual Conference on Information Sciences and Systems (CISS 2011). 2011, pp. 1–5. URL: http: //dx.doi.org/10.1109/CISS.2011.5766176 12. Srujan Kotikela, Satyajeet Nimgaonkar, and Mahadevan Gomathisankaran. “POSTER: Virtualization Based Security Framework (vBASE)”. in: Annual Computer Security Applications Conference (ACSAC), Orlando, Florida. 2011 13. Mahadevan Gomathisankaran and Kamesh Namuduri. “Secure Embedded Platforms for Networked Automotive Systems”. In: Workshop on Developing Dependable and Secure Automotive Cyber-physical Systems from Components. Troy, MI, 2011 14. Jeffrey S. Dwoskin, Mahadevan Gomathisankaran, Yu-Yuan Chen, and Ruby B. Lee. “A framework for testing hardware-software security architectures”. In: Proceedings of the 26th Annual Computer Security Applications Conference. ACSAC ’10. Austin, Texas: ACM, 2010, pp. 387–397. ISBN: 978-1-4503-0133-6. URL: http : / / doi . acm . org / 10 . 1145 / 1920261 . 1920318 15. Mahadevan Gomathisankaran, Gayatri Mehta, and Kamesh Namuduri. “Power, performance and security optimized hardware design for H.264”. In: Proceedings of the Sixth Annual Workshop on Cyber Security and Information Intelligence Research. New York, NY, USA: ACM, 2010, pp. 62–1. URL: http://doi.acm.org/10.1145/1852666.1852735 16. Mahadevan Gomathisankaran and Ruby Lee. “Tantra : A Fast PRNG Algorithm and its Implementation”. In: Proceedings of the 2009 International Conference on Security & Management, SAM 2009, July 13-16, 2009, Las Vegas Nevada, USA, 2 Volumes. Ed. by Hamid R Arabnia and Kevin Daimi. CSREA Press, 2009, pp. 593–598 17. Mahadevan Gomathisankaran and Ruby B Lee. “Maya: A Novel Block Encryption Function”. Curriculum Vitae 3/9 M. Gomathisankaran In: Preproceedings of International Workshop on Coding and Cryptography May 10–15, 2009, Ullensvang, Norway (WCC 2009). Lofthus, Norway, 2009 18. Mahadevan Gomathisankaran, Ka-Ming Keung, and Akhilesh Tyagi. “REBEL - Reconfigurable Block Encryption Logic”. In: SECRYPT. ed. by Eduardo Fernández-Medina, Manu Malek, and Javier Hernando. INSTICC Press, 2008, pp. 312–318. ISBN: 978-989-8111-59-3 19. Mahadevan Gomathisankaran and Akhilesh Tyagi. “Relating Boolean gate truth tables to one-way functions”. In: 2008 IEEE International Conference on Electro/Information Technology. IEEE, 2008, pp. 1–6. ISBN: 978-1-4244-2030-8. URL: http://dx.doi.org/10.1109/EIT.2008. 4554258 20. Mahadevan Gomathisankaran and Akhilesh Tyagi. “Arc3D : A 3D Obfuscation Architecture”. In: High Performance Embedded Architectures and Compilers. Springer, 2005, pp. 184–199. URL : http://dx.doi.org/10.1007/11587514_13 21. Mahadevan Gomathisankaran and Akhilesh Tyagi. “TIVA : Trusted Integrity Verification Architecture”. In: DRMTICS : Technologies, Issues, Challenges and Systems, First International Conference, DRMTICS 2005, Sydney, Australia, October 31 - November 2, 2005, Revised Selected Papers. Ed. by Reihaneh Safavi-Naini and Moti Yung. Springer, 2005, pp. 13–31. URL: http://dx.doi.org/10.1007/11787952_2 22. Mahadevan Gomathisankaran and Akhilesh Tyagi. “WARM SRAM : A Novel Scheme to Reduce Static Leakage Energy in SRAM Arrays”. In: IEEE Compute Society Annual Symposium on VLSI (ISVLSI). IEEE Computer Society, 2004, pp. 105–114. URL: http://dx.doi.org/10. 1109/ISVLSI.2004.1339516 Patents 1. Mahadevan Gomathisankaran and Akhilesh Tyagi. REBEL: REconfigurable Block Encryption Logic for Cyber Security. Iowa State University, Patent Pending (Ref. No: ISURF 3404). 2006. URL : http://www.techtransfer.iastate.edu/documents/7e3741202920328680.pdf Theses 1. Mahadevan Gomathisankaran. “Secure execution environments through reconfigurable lightweight cryptographic components”. PhD thesis. Ames, IA: Iowa State University, 2006. URL: http: //archives.ece.iastate.edu/archive/00000241/01/thesis.pdf Technical Reports 1. Jeffrey Dwoskin, Mahadevan Gomathisankaran, and Ruby Lee. Framework for Design Validation of Security Architectures. Tech. rep. CE-L2008-013. Princeton University, 2008 2. Mahadevan Gomathisankaran and Akhilesh Tyagi. How to Hide Secrets from Operating System: Architecture Level Support for Dynamic Address Trace Obfuscation. Tech. rep. Iowa State University, 2004. URL: http://archives.ece.iastate.edu/archive/00000101/01/aslpos. pdf Curriculum Vitae 4/9 M. Gomathisankaran 3. Mahadevan Gomathisankaran and Arun Somani. Efficient Energy Saving Scheme for On Chip Caches. Tech. rep. Iowa State University, 2002. URL: http://archives.ece.iastate.edu/ archive/00000111/01/isca03_paper_144_v2.pdf Research Grants 1. FRP: Sensor Fusion Research for Net-Centric Applications (Collaborative proposal with ASU) Agency: NSF (Subcontract to ASU) Collaborators: Dr. Krishna Kavi ( Co-PI ) Funding Amount: $25,000 Funding Period: 07/01/2012 — 06/30/2014 Yearly Effort: Summer 0.09 months 2. FRP: Risk Assessment Techniques for Off-line and On-line Security Evaluation of Cloud Computing (Collaborative proposal with MUST) Agency: NSF Collaborators: Dr. Krishna Kavi ( Co-PI ) Funding Amount: $89,467 Funding Period: 08/01/2013 — 07/31/2015 Yearly Effort: Summer 0.15 months 3. Secure Policy Engine in Hypevisor using Hardware Trust Mechanisms Agency: Net-Centric I/UCRC Project funded by Samsung Collaborators: Dr. Krishna Kavi ( Co-PI ) Funding Amount: $35,000 Funding Period: 10/15/2013 — 10/14/2014 Yearly Effort: 0.00 months 4. Workshop on Airborne Networks and Communications Agency: NSF Collaborators: Dr. Kamesh Namuduri ( PI ), Dr. Yan Wan ( Co-PI ) Funding Amount: $26,206 Funding Period: 07/01/2013 – 11/30/2013 Yearly Effort: Summer 0.01 months Instructional Assignments 1. CSCE 4550/5550 Introduction to Computer Security — Fall 2009, Fall 2011, Fall 2012 Short Description: The aim of this course is to introduce the concepts and principles of computer security - including program, OS and network security - security threats and countermeasures against them; to implement some basic computer security applications and to gain hands on experience. 2. CSCE 4610/5610 Computer Systems Architecture — Spring 2010 Short Description: Curriculum Vitae 5/9 M. Gomathisankaran The purpose of this course is to provide students with a solid foundation in computer systems architecture. This course is generally considered as a foundation to further study and research in computer systems. We survey several different approaches to designing a single CPU that can aid in building a parallel processor. We investigate instruction level parallelism, branch prediction techniques, various cache organization, multithreaded architectures, cache coherency and their impact on parallel processing. 3. CSCE 5933 Trusted and Secure Computing — Fall 2010 Short Description: The purpose of this course is to introduce graduate students to the latest developments in the field of trusted and secure computing platforms. This is an advanced course and requires knowledge of computer systems architecture, operating systems and applied cryptography. 4. CSCE 5050 Introduction to Cryptography — Spring 2011, Spring 2012 Short Description: The aim of this course is to educate graduate students about the fundamentals of cryptography. Cryptography is the fundamental building block of any computer security solution. This course will introduce various cryptographic algorithms and their applications. The knowledge gained from this course will enable students to apply these cryptographic algorithms in a better way to design secure systems. 5. CSCE 2610 Assembly Language and Computer Organization — Spring 2011, Fall 2011 Short Description: Principles of computer systems organization, instruction sets, computer arithmetic, data and control paths, memory hierarchies, and assembly language. 6. CSCE 6933 Advanced Topics in Trusted and Secure Computing — Fall 2012, Spring 2014 Short Description: Advanced topics about designing trusted and secure computing systems. Tamper evident and tamper resistant architectures. Industrial platforms like Intel Trusted Execution Technology, Trusted Platform Module, ARM TrustZone. Academic solutions like XOM, AEGIS, Arc3D. 7. CSCE 4930/5933 Applications of Cryptography — Spring 2013, Spring 2014 Short Description: The aim of this course is to introduce students to concepts of cryptography and its applications. Cryptography is the fundamental building block of any computer security solution. The knowledge gained from this course will enable students to apply these cryptographic algorithms in a better way to design security solutions. 8. CSCE 3612 Embedded Systems Design — Fall 2013 Short Description: The aim of this course is to introduce students to Computer systems designed as embedded computing elements and micro-controllers. Embedded systems design using System specification such as UML or other high-level abstract models. Issues and constraints on embedded computing systems, including power, performance, memory and size. Curriculum Vitae 6/9 M. Gomathisankaran 9. CSCE 4930/5933 Advanced Information Systems Security — Fall 2013 Short Description: This course is to augment the CNSS 4011 & 4013 security certification curriculum. In this course we cover topics that map to the Advanced level of the CNSS curriculum. The topics covered in this course are necessary to prepare our students for the National Collegiate Cyber Defense Competition (CCDC). New Preparations and/or Revisions 1. Proposed a new graduate level course Trusted and Secure Computing in the Computer Science and Engineering Department. The syllabus of this course was accepted by the Graduate Committee. 2. Proposed a new graduate level course Introduction to Cryptography (CSCE 5050) in the Computer Science and Engineering Department. The syllabus of this course was accepted by the Graduate Committee. This course has been accepted by the University Committee to be added to the catalog. 3. Proposed a new under-graduate level course Applications of Cryptography (CSCE 4050) in the Computer Science and Engineering Department. The syllabus of this course was accepted by the Undergraduate Committee. This course will be offered in Spring 2013. This course has been accepted by the University Committee to be added to the catalog. 4. Proposed a new under-graduate and graduate level course Advanced Information Systems Security in the Computer Science Department. The syllabus of this course was accepted by both the Undergraduate and Graduate Committees. This course is being taught in Fall 2013. 5. Redesigned the lab materials for the Introduction to Computer Security (CSCE 4550/5550) course to provide a better hands on experience for the students. The new lab infrastructure uses virtualization technology and enables students’ to access their lab content anywhere anytime. Undergraduate Student Advising 2013 Mentored two Senior Design teams (one Computer Engineering and one BAIT) working on project “TruID” which is a password less authentication system. One of the two teams presented their work in the Hi-TEC 2013 conference. Doctoral Student Advising 1. Satyajeet Nimgaonkar, Ph.D., Expected Graduation: Summer 2014, Research Readiness: Spring 2011, Degree Plan in File. 2. Srujan Kotikela, Ph.D., Expected Graduation: Spring 2015, Degree Plan in File. 3. Patrick Kamongi, Ph.D., Expected Graduation: Spring 2016. Doctoral Committee 1. Patrick Burke Curriculum Vitae 7/9 M. Gomathisankaran 2. 3. 4. 5. Eric Ayeh Oghenekahro (Karo) Okobiah Tomislav Janjuisic (Graduated: June 2013) Tomyo Maeshiro Masters Student Graduated 1. Yernat Yestekov, M.S. (Thesis), Graduated: Summer 2013, Thesis Title: Design and Analysis of Novel Verifiable Voting Schemes. Masters Student Advising 1. Mohan Tarigopula, M.S., Expected Graduation: Spring 2015 2. Tawfiq Shah, M.S. (Thesis), Expected Graduation: Fall 2014 Masters Committee 1. Mahesh Gautam (Graduated: May 2013) 2. Anthony Hansen (Graduated: May 2014) Synergistic Activities 2013 Delivered an Invited Talk at the MUST Computer Science Department Seminar Series. 2013 Delivered an Invited Talk at the UTA Computer Science and Engineering Department Colloquium Series. 2013 Session Chair for The Seventh International Conference on Security and Reliability (SERE) 2013. 2013 Co-organized AIAA Workshop on Airborne Networks and Communications. 2011 Delived an Invited Talk at the UT Dallas Computer Science Department Colloquium series. 2012 Co-organized the workshop Security on the move and in the cloud at UNT. UNT in collaboration with the Convergence Technology Center at Collin College, hosted a 1-day workshop on Security issues related to mobile device platforms and applications, Social Media and the Cloud. The conference is intended for Community College and University Faculty Members and Students as well as Industry Professionals interested in discussing new trends in security as well address issues in the mobile space, the rise of Social Media and Cloud Computing and Storage. 2012 Organizing Chair of a special session on Secure embedded systems at the ISVLI 2012 conference. 2008 Mahadevan Gomathisankaran. Secure Embedded Systems. IEEE International Conference Electro/Information Technology (EIT) 2008, Iowa State University, Ames, IA. 2008. URL: http://viper.eng.iastate.edu/gmdev/pubs/eit08-tutorial.pdf Curriculum Vitae 8/9 M. Gomathisankaran Professional Service Editorial Board Information Security Journal: A Global Perspective International Journal of Information and Network Security ASE Science Journal Program Chair/Session Chair IEEE Computer Society Annual Symposium on VLSI 2012, 2014 International Conference on Software Security and Reliability (SERE) 2013 International Conference on Information Technology (ICIT) 2014 Technical Program Committee Member International Symposium on Electronic System Design (ISED) 2010, 2011 International Conference on Computer Communication Networks (ICCN) 2011 International Conference on Computing, Communication and Networking Technologies (ICCCNT) 2012 ACM MobiHoc Workshop on Airborne Networks and Communications 2012 IEEE Computer Society Annual Symposium on VLSI 2012, 2014 Reviewer IEEE Transactions on VLSI Journal of Low Power Electronics Transactions on Information Forensics & Security High-Performance and Embedded Architecture and Compilers (HiPEAC) Curriculum Vitae 9/9 2010 M. Gomathisankaran