Home
Hobby
Links
Email
Pictures

Narasimha Karpoor Shashidhar

Contact Information

Department of Computer Science

Sam Houston State University

Huntsville, TX 77341

Email: karpoor@shsu.edu

Phone: (936) 294 - 1591

Fax: (419) 730 - 8903

Cell: (860) 748 - 8903

http://www.shsu.edu/~nks001/

Education

Ph.D. Computer Science and Engineering June 2010

University of Connecticut, Storrs, CT

Thesis: Efficient Steganography with Provable Security Guarantees

Advisor: Dr. Alexander Russell

M.S. Computer Science and Engineering December 2004

University of Connecticut, Storrs, CT

Advisor: Dr. Alexander Russell

B.E. Electronics and Communication May 2001

University of Madras, Madras, India

Graduated First Class with Distinction

Teaching Experience

Graduate Courses: (Fall 2007-Present)

  • Modern Cryptography and Steganography
  • Introduction to Malware and Computer Security
  • Risk Assessment and Financial System Security
  • Disaster Recovery
  • Special Topics: Virtualization
  • Operating Systems
  • Data Structures and Algorithms in Java
  • Web Services in Java
  • Technologies in E-Commerce

Undergraduate: (Fall 2004-Present)

  • Introduction to Algorithms
  • Introduction to Digital Forensics and Information Assurance
  • Modern Cryptography
  • Introduction to Computing
  • Object Oriented Prog. in Java
  • Digital Logic Design
  • Probabilistic Analysis of Computer Systems

Research Interests

Cryptography, Information Hiding and Steganography, Combinatorial Optimization, Distributed Computing, Peer-to-Peer Networks, Sensor Networks and Computing Education

Recent Publications

  • Detecting Phishing Emails the Natural Language Way. R. Verma, N. Shashidhar, and N Hossain. 17th European Symposium on Research in Computer Security (ESORICS 2012), Institute of Informatics and Telematics of National Research Council (CNR), Pisa, Italy, September 10th -12th 2012. (Acceptance Rate: 19%)
  • Two-pronged phish snagging. R. Verma, N. Shashidhar, and N Hossain. 7th International Conference on Availability, Reliability and Security (ARES 2012), University of Economics in Prague, Czech Republic, August 20th - 24th, 2012. (Acceptance Rate: 26%)
  • Economical and Robust VoIP Infrastructure for Disaster Recovery Communication. L. Carvajal and N. Shashidhar. International Conference on Disaster Management (ICDM 2012), Peshawar, Pakistan, June 30, 2012.
  • Implementing a Standardized Method of Storing Asset Information. A. Mendoza and N. Shashidhar. International Conference on Disaster Management (ICDM 2012), Peshawar, Pakistan, June 30, 2012.
  • Disaster Recovery Planning in a Museum Environment. C. Hale, N. Shashidhar. International Conference on Disaster Management (ICDM 2012), Peshawar, Pakistan, June 30, 2012.

  • Key-Efficient Steganography. A. Kiayias, A. Russell and N. Shashidhar. 14th Information Hiding Conference, May 15-18, 2012, Berkeley, California.
  • Scalable Resource Discovery in Bandwidth Bounded Networks. C. Kari, N. Shashidhar and K. Sotirios. 8th Annual International Conference on Computer Science and Information Systems, 21-24 May 2012, Athens, Greece.
  • Efficient Steganography with provable Security Guarantees. A. Kiayias, Y. Raekow, A. Russell and N. Shashidhar. [Accepted for publication, Journal of Cryptology], Preprint on arXiv:0909.3658v1 [cs.CR], March 2012.
  • Managing Software Development Risk with the OODA Loop. N. Amsden and N. Shashidhar. International Journal of Soft Computing and Software Engineering (JSCSE), March 2012.
  • Scalable Secure MJPEG Video Streaming. Lei Chen, Narasimha Shashidhar, and Qingzhong Liu. 8th International Symposium on Frontiers of Information Systems and Network Applications (FINA-2012), in conjunction with the 26th IEEE International Conference on Advanced Information Networking and Applications (AINA-2012), Fukuoka, Japan, March 26-30, 2012. (Acceptance rate: 29.4%)
  • A Phishing Model and Its applications to Evaluating Phishing Attacks. N. Shashidhar and L. Chen. 2011 International Cyber Resilience Conference, August 1-2, 2011, Perth, Western Australia. (Acceptance rate: 34%)
  • Security in Wireless Metropolitan Area Networks. Lei Chen, Narasimha Shashidhar, Shengli Yuan, and Ming Yang. To appear in Wireless Network Security: Theories and Applications, Springer (U.S.) and Higher Education Press (China), 2012 (editors: Lei Chen, Jiahuang Ji, and Zihong Zhang).
  • Taking Total Control of Voting Systems: Firmware Manipulations on an Optical Scan Voting Terminal. S. Davtyan, S. Kentros, A. Kiayias, L. Michel, N. Nicolaou, A. Russell, See, N. Shashidhar and A. Shvartsman. 2009 ACM Symposium on Applied Computing (SAC 2009), Honolulu, Hawaii, March 9-12, 2009.
  • Randomized Work-Competitive Scheduling for Cooperative Computing on k-partite Task Graphs. C. Kari, A. Russell and N. Shashidhar. The Seventh IEEE International Symposium on Networking Computing and Applications, (NCA 2008), July 10-12, 2008, Cambridge, Massachusetts.
  • Pre-Election Testing and Post-Election Audit of Optical Scan Voting Terminal Memory Cards. S. Davtyan, S. Kentros, A. Kiayias, L. Michel, N. Nicolaou, A. Russell, See, N. Shashidhar and A. Shvartsman. USENIX/ACCURATE Electronic Voting Workshop (EVT 2007), July 28-29, 2008, San Jose, CA.
  • Tampering with Special Purpose Trusted Computing Devices: A Case Study in Optical Scan E-Voting. S. Davtyan, A. Kiayias, L. Michel, A. Russell, A. See, N. Shashidhar and A. Shvartsman. 23rd Annual Computer Security Applications Conference (ACSAC 2007), December 10-14, 2007, Miami Beach, Florida.
  • An Authentication and Ballot Layout Attack against an Optical Scan Voting Terminal. A. Kiayias, L. Michel, A. Russell, A. See, N. Shashidhar and A. Shvartsman. 16th USENIX Security Symposium, 2007 USENIX/ACCURATE Electronic Voting Technology Workshop (EVT 2007), August 6, 2007. Boston, MA.

Work in progress

  • QR Code Steganography. D. Ohana and N. Shashidhar. [Submitted to the Journal of Networks]. Jan 2012.
  • Randomized Work-Competitive Scheduling for Cooperative Computing on k-partite Task Graphs. C. Kari, A. Russell and N. Shashidhar. [Submitted to the Journal of Network and Computer Applications]. (Under Review) Feb 2012.

Editorial Boards

conference and Program Committees

  • Editor, Journal of Networks, 2011 - Present
  • IEEE Symposium on Industrial Electronics and Applications, ISIEA 2012, TPC member
  • International Conference on Computing, Networking and Communications, ICNC 2012, TPC

  • PCSSNSE, ICNC 2012, Workshop on Pervasive Communication Security, Social Networking and Social Engineering, Chair
  • 25th International Conference on Industrial, Engineering & Other Applications of Applied Intelligent Systems, IEA/AIE 2012, TPC member
  • Special Session: Data Mining and Computational Intelligence for Digital Forensics and Information Assurance, TPC member
  • Seventh International Conference on Systems and Networks Communications ICSNC 2012, TPC member
  • ICN 2013, The Twelfth International Conference on Networks, GlobeNet 2013, TPC member
  • NSF Transforming Undergraduate Education in Science (TUES), Panelist, 2011.

Honors and Awards

  • Public Service Award, Office of the Secretary of the State of Connecticut, 2009.
    • Awarded for substantial contribution towards ensuring the integrity and accuracy of Connecticut state's Voting Equipment
  • Graduate PreDoctoral Fellowship, Univ. of Connecticut, 2004, 2008 & 2009
  • Recognition for significant contribution to the success of SHSU students, Office of the Vice President for Student Services, Sam Houston State University, SHSU, December 2011.
  • Graduate Fellowship, Pace University, 2001
  • Elevator Pitch Competition Winner, Business Plan Competition 2012, Wolff Center for Entrepreneurship (WCE) at the University of Houston.

Funding

  • Faculty Enhancement Research Grant, ERG 2012, June 2012 - July 2013.
    • Granting Agency: Faculty Research Council, SHSU, $15,000
    • Title: Secure Patch Distribution over Peer-to-Peer Networks
  • Pending Patents: Comprehensive Natural Language Based Phishing Detection Scheme.

Graduate Teaching Certificate

  • Graduate Certificate in College Instruction
  • Awarded by the Graduate School and the Institute for Teaching and Learning, University of Connecticut, 2009
  • Courses and Workshops Attended, ITL, University of Connecticut
    • Advanced Issues in Teaching and Learning, Spring 2009
    • Teaching and Learning Issues in Engineering, Spring 2009
    • Summer Institute in College Instruction, Summer 2008
    • Teaching and Learning Fundamentals, Spring 2008
    • Reflections on Teaching Practices, Fall 2008

Technical Skills

  • Programming Languages: C, C++ , Java, Matlab
  • Software: LATEX, Adobe Suite: Captivate, Dreamweaver
  • Operating Systems: Linux/Unix, Mac OS, Windows
  • Digital Forensics: Forensic Toolkit, Password Recovery Toolkit, Registry Viewer, FTK Imager
  • Digital Forensics Certifications:
    • AccessData Certified Examiner
    • AccessData Mobile Examiner

Professional membership

  • Association for Computing Machinery (ACM)
  • Society for Industrial and Applied Mathematics (SIAM)
  • Institute of Electrical and Electronics Engineers (IEEE)

N. K. Shashidhar Last Updated: July 2012