Research
Privacy-Preserving Threat Actor Clustering Pipeline
Provisional Patent FilingAbstract
Developing a threat intelligence system that correlates threat actor identities across platforms (Telegram, dark web forums, paste sites) using behavioral fingerprinting: temporal pattern analysis, writing style analysis, and operational security patterns, while maintaining privacy constraints. Implements clustering algorithms to track threat actor campaigns without compromising individual privacy.
Key Contributions
- ▸Cross-platform identity correlation across Telegram, dark web forums, and paste sites
- ▸Behavioral fingerprinting via temporal pattern analysis and writing style analysis
- ▸Privacy-preserving clustering: tracks campaigns without exposing individual identities
Post-Quantum Cryptography for Wireless Standards
VIT Research ProjectAbstract
Investigated vulnerabilities in RSA, ECC, and AES under quantum threat models using Shor's and Grover's algorithms. Evaluated post-quantum cryptographic algorithms including lattice-based schemes (Kyber, Dilithium), hash-based schemes (SPHINCS+), and code-based schemes for wireless standards. Analyzed performance trade-offs for quantum-resistant algorithms in resource-constrained IoT and mobile environments.
Key Contributions
- ▸Modeled quantum attacks on RSA, ECC, and AES using Shor's and Grover's algorithms
- ▸Benchmarked Kyber, Dilithium, and SPHINCS+ for wireless communication standards
- ▸Analyzed implementation trade-offs for IoT and mobile resource-constrained environments