Conference Papers
Permanent URI for this collectionhttps://idr.nitk.ac.in/handle/123456789/28506
Browse
3 results
Search Results
Item Evaluation of Recurrent Neural Networks for Detecting Injections in API Requests(Institute of Electrical and Electronics Engineers Inc., 2021) Reddy, S.A.; Rudra, B.Application programming interfaces (APIs) are a vital part of every online business. APIs are responsible for transferring data across systems within a company or to the users through the web or mobile applications. Security is a concern for any public-facing application. The objective of this study is to analyze incoming requests to a target API and flag any malicious activity. This paper proposes a solution using sequence models to identify whether or not an API request has SQL, XML, JSON, and other types of malicious injections. We also propose a novel heuristic procedure that minimizes the number of false positives. False positives are the valid API requests that are misclassified as malicious by the model. © 2021 IEEE.Item Analysis of Magnitude of Threats for V2X Authentication Schemes Under Quantum Powered Adversary(Springer Science and Business Media Deutschland GmbH, 2023) Sawant, S.V.; Rudra, B.The Internet has revolutionized the way we communicate. We are now able to connect to anyone across the globe with little or no effort. This revolution has empowered various technological inventions. The Internet has fixed numerous challenges that were difficult to address before. Today, even Vehicular Communication is possible due to the Internet. From providing situational vigilance to taking sound decisions, vehicles have traveled a smart journey. These technological marvels were possible due to the remarkable progress in the computational power of devices. Now, with the world moving towards quantum computing, we stare at future with an ocean of possibilities. Such capabilities in the hands of adversaries can lead to unpleasant consequences. Hence, it is important to determine whether our existing systems are safe against such powerful adversaries. Also, it is equally important to develop techniques that can defend vehicles from adversaries. In this paper, we have listed out various authentication schemes against quantum adversaries and presented our observations. © 2023, The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd.Item Secure Decentralized Carpooling Application Using Blockchain and Zero Knowledge Proof(Science and Technology Publications, Lda, 2024) Goel, S.; Sawant, S.V.; Rudra, B.Blockchain extends its reach far beyond cryptocurrencies such as Bitcoin, encompassing a broader spectrum of applications. It acts as a transparent, distributed, and unchangeable ledger where every participant in the network possesses a copy of the blockchain. This decentralized system secures all data and transactions through encryption, ensuring reliability. The key components of blockchain-based applications include Smart Contracts, which house the application’s logic and operate on the blockchain. In traditional carpooling systems, centralized authorities like Uber or Ola control the entire process, collecting and managing data from both drivers and riders. However, by leveraging blockchain and smart contracts, a more secure and private carpooling system can be established, allowing riders and drivers to connect directly without intermediaries. Blockchain applications encounter challenges, primarily related to scalability and privacy. Every node in the system processing transactions limits scalability. Moreover, the practice of publishing all data at each node for processing raises privacy concerns. To tackle these issues, an approach using non-interactive proofs for off-chain computations can enhance efficiency. This approach verifies correctness without exposing private data, thus improving privacy. ZoKrates, a toolbox, simplifies this process by providing a domain-specific language (DSL), compiler, and generators for proofs and verification of Smart Contracts, streamlining complex zero-knowledge proof tasks and promoting their adoption. © 2024 by SCITEPRESS – Science and Technology Publications, Lda.
