Research

Security Research

Privacy-Preserving Threat Actor Clustering Pipeline

Provisional Patent Filing

Abstract

Developing a threat intelligence system that correlates threat actor identities across platforms (Telegram, dark web forums, paste sites) using behavioral fingerprinting: temporal pattern analysis, writing style analysis, and operational security patterns, while maintaining privacy constraints. Implements clustering algorithms to track threat actor campaigns without compromising individual privacy.

Key Contributions

  • Cross-platform identity correlation across Telegram, dark web forums, and paste sites
  • Behavioral fingerprinting via temporal pattern analysis and writing style analysis
  • Privacy-preserving clustering: tracks campaigns without exposing individual identities

Post-Quantum Cryptography for Wireless Standards

VIT Research Project

Abstract

Investigated vulnerabilities in RSA, ECC, and AES under quantum threat models using Shor's and Grover's algorithms. Evaluated post-quantum cryptographic algorithms including lattice-based schemes (Kyber, Dilithium), hash-based schemes (SPHINCS+), and code-based schemes for wireless standards. Analyzed performance trade-offs for quantum-resistant algorithms in resource-constrained IoT and mobile environments.

Key Contributions

  • Modeled quantum attacks on RSA, ECC, and AES using Shor's and Grover's algorithms
  • Benchmarked Kyber, Dilithium, and SPHINCS+ for wireless communication standards
  • Analyzed implementation trade-offs for IoT and mobile resource-constrained environments