VENKATA SAI CHARAN PUTREVU

VENKATA SAI CHARAN PUTREVU

Prime Ministers Research Fellow | C3i Research Fellow | Cyber Security Researcher and Technology Enthusiast, currently pursuing Ph.D. in CSE @ Indian Institute of Technology Kanpur (IITK)

Indian Institute of Technology Kanpur

Biography

Venkata Sai Charan Putrevu is a Postdoctoral Scholar in the Department of Electrical and Computer Engineering at New York University , hosted by Prof. Ramesh Karri . He completed his Ph.D. in the Department of Computer Science and Engineering at IIT Kanpur, under the supervision of Prof. Sandeep Kumar Shukla. His research intersects Computer Security, Malware Analysis, and Software Engineering, with a specific emphasis on addressing contemporary cybersecurity challenges, including Advanced Persistent Threats (APTs) and their attribution, along with the early detection of Crypto Ransomware.

Before joining IIT Kanpur, he completed his Master’s in Cybersecurity from TIFAC-CORE in Cybersecurity at Amrita Vishwa Vidyapeetham. Additionally, he gained industry experience as a Software Engineer at Cisco Systems (Bangalore) and worked as a research intern at Dell (RSA).

Interests
  • Cyber Security
  • Computer System Security
  • Malware Analysis
  • Advanced Persistent Threat
  • Ransomware
  • Threat Intelligence
Education
  • Ph.D. in Computer Science and Engineering, 2019 - 2024

    Indian Institute of Technology, Kanpur (CGPA - 9.0 / 10.0)

  • M.Tech in Cyber Security, 2017 - 2019

    TIFAC-CORE in Cyber Security, Amrita Vishwa Vidyapeetham (CGPA - 8.3 / 10.0)

  • B.Tech in Computer Science and Engineering, 2012 - 2016

    Acharya Nagarjuna University (CGPA - 8.9 / 10.0)

  • Higher Secondary School Certificate, 2010 - 2012

    State Board of Intermediate Education (CGPA - 9.3 / 10.0)

  • Secondary School Certificate (Standard X), 2010

    State Board of Secondary Education (CGPA - 9.16 / 10.0)

Experience

 
 
 
 
 
New York University
Postdoctoral Fellow
August 2024 – Present New York
Working as Postdoctoral fellow at NYU Center for Cyber Security NYU-CCS.
 
 
 
 
 
UP State Institute of Forensic Sciences
Visiting Faculty
UP State Institute of Forensic Sciences
August 2023 – December 2023 Lucknow
CTPGDCS SI P1 - Essentials of Cyber Security and Cyber Warfare.
 
 
 
 
 
Indian Institute Of Technology, Kanpur
Prime Minister Research Fellow
Indian Institute Of Technology, Kanpur
May 2021 – May 2023 Kanpur
  • PMRF Tutor for NPTEL Course : Problem Solving Through Programming In C (Aug 2022 - Oct 2022)
  • PMRF Online Course : Advanced Persistent Threats-Attribution & Detection (2021)
 
 
 
 
 
Indian Institute Of Technology, Kanpur
Teaching Assistant
Indian Institute Of Technology, Kanpur
August 2019 – January 2024 Kanpur
  • CS987 (e-Masters) : Advanced Critical Infrastructure Security (Sep 2023- Dec 2023)
  • ESC 111/2 : Fundamentals of Computing - I/II (Mar 2023 - July 2023)
  • CS 658: Malware Analysis and Intrusion Detection (Jan 2022 - May 2022)
  • CS 631: Cyber Security Of Critical Infrastructures ( Aug 2021- Dec 2021)
  • CS 628: Computer System Security (Jan 2021-June 2021)
  • CS 455: Software Engineering (Jan 2020-June 2020)
 
 
 
 
 
Indian Institute Of Technology, Kanpur
Reviewer/Sub-Reviewer
Indian Institute Of Technology, Kanpur
August 2022 – January 2024 Kanpur
  • Computers and Security Journal
  • CSCML-2023 : The International Symposium on Cyber Security, Cryptology and Machine Learning (CSCML)
  • ACM SAC 2023: The ACM/SIGAPP Symposium On Applied Computing
 
 
 
 
 
Yazali Farmers Producer Company
Intern
Yazali Farmers Producer Company
April 2019 – July 2019 Bengaluru
This particular FPO is working to make agriculture profitable in villages using advanced technology, there by supporting sustainable economy with high happiness index and creating self sustained and self reliant villages.
 
 
 
 
 
DELL-RSA
Research Intern
DELL-RSA
January 2018 – January 2019 Bengaluru
RSA Archer which is an eGRC platform which provides an efficient, collaborative enterprise governance, risk and compliance solutions
 
 
 
 
 
CISCO Systems India Pvt Ltd -Z
Software Developer - N7k Team
CISCO Systems India Pvt Ltd -Z
January 2016 – January 2017 Bengaluru
Practically worked on protocols like OSPF, BFD, GRE, OTV, ACL on Nexus 7000 &7700 data centre switches.

Patents

SYSTEM AND METHOD FOR KERNEL-LEVEL ACTIVE DARKNET MONITORING IN A COMMUNICATION NETWORK
Filed in India and US; Indian Patent Application No-202314036144(GRANTED) & US Patent Application No-18/322,626.
VENKATA SAI CHARAN PUTREVU,
Gowtham R,
Sandeep K Shukla
P. Mohan Anand
Hrushikesh Chunduri
SYSTEM AND METHOD FOR ADAPTIVE MASKING-BASED DECEPTION ORCHESTRATION
Filed in India and US; Indian Patent Application No-202411006680 & US Patent Application No-63/627,859
VENKATA SAI CHARAN PUTREVU,
Subhasis Mukhopadhyay,
Subhajit Manna,
Nanda Rani,
Ansh Vaid,
Hrushikesh Chunduri,
P. Mohan Anand,
Sandeep Kumar Shukla
SYSTEM FOR EARLY DETECTION AND TERMINATION OF RANSOMWARE AND METHOD THEREOF
Filed in India and US; Indian Patent Application No-202311051892 & US Patent Application No-63/517,119
Anand, P. M
VENKATA SAI CHARAN PUTREVU,
Hrushikesh CNV,
Shukla, S. K
Honeypots serve as a valuable deception technology, enabling security teams to gain insights into the behaviour patterns of attackers and investigate cyber security breaches. However, traditional honeypots prove ineffective against advanced adversaries like APT groups due to their evasion tactics and awareness of typical honeypot solutions. This paper emphasises the need to capture these attackers for enhanced threat intelligence, detection, and protection. To address this, we propose the design and deployment of a customized honeypot network based on adaptive camouflaging techniques. Our work focuses on orchestrating a behavioral honeypot network tailored for three APT groups, with strategically positioned attack paths aligning with their Tactics, Techniques, and Procedures, covering all cyber kill chain phases.
Cyber Threat Intelligence(CTI) plays an indispensable role in providing evidence-based knowledge to plan defensive strategies against advanced cyber attacks. Most threat intelligence data originate from security researchers, vendor blogs, list of threat indicators, and commercial cyber security firms. However, as attack surfaces become more dynamic and threat actors shift towards organization/sector-specific attacks, generic threat information is no longer adequate to safeguard against these targeted attacks. In such scenarios, darknet data can be an invaluable source of threat information at the enterprise level as in darknet, the traffic is destined for a range of unused IP addresses. As these IP addresses are unused, the traffic destined for them is considered suspicious and can serve as a valuable source for threat intelligence. Darknet monitoring is done in either active or passive mode. Passive darknet monitoring gives generic information without active engagement with the attacker devices. So, we developed a novel method for gathering threat intelligence via active darknet monitoring by designing a kernel-level darknet sensor that engages incoming traffic by establishing a 3-way handshake. We called it DARK-KERNEL in our previous work. This work aims to implement DARK-KERNEL as a Service (DKaaS) for organization-level threat intelligence. To achieve this, we deploy the DARK-KERNEL by assigning four unused public IP addresses. We gather 37 days of traffic and provide a comprehensive analysis of captured data using Security Onion and several automated scripts. In addition, we highlight a few attacks to define the effectiveness of DKaaS. Finally, we propose a novel framework that integrates DKaaS with a customizable Security Orchestration and Response (SOAR) engine to deploy behavioral honeypots to lure sophisticated attackers.
This research article critically examines the potential risks and implications arising from the malicious utilization of large language models(LLM), focusing specifically on ChatGPT and Google's Bard. Although these large language models have numerous beneficial applications, the misuse of this technology by cybercriminals for creating offensive payloads and tools is a significant concern. In this study, we systematically generated implementable code for the top-10 MITRE Techniques prevalent in 2022, utilizing ChatGPT, and conduct a comparative analysis of its performance with Google's Bard. Our experimentation reveals that ChatGPT has the potential to enable attackers to accelerate the operation of more targeted and sophisticated attacks. Additionally, the technology provides amateur attackers with more capabilities to perform a wide range of attacks and empowers script kiddies to develop customized tools that contribute to the acceleration of cybercrime. Furthermore, LLMs significantly benefits malware authors, particularly ransomware gangs, in generating sophisticated variants of wiper and ransomware attacks with ease. On a positive note, our study also highlights how offensive security researchers and pentesters can make use of LLMs to simulate realistic attack scenarios, identify potential vulnerabilities, and better protect organizations. Overall, we conclude by emphasizing the need for increased vigilance in mitigating the risks associated with LLMs. This includes implementing robust security measures, increasing awareness and education around the potential risks of this technology, and collaborating with security experts to stay ahead of emerging threats.
Even though machine learning and signature-based detection methods for ransomware have been proposed, they often fail to achieve very accurate detection. Ransomware that evades detection moves to the execution phase after initial access and installation. Due to the catastrophic nature of a ransomware attack, it is crucial to detect in its early stages of execution. If there is a method to detect ransomware in its execution phase early enough, then one can kill the processes to stop the ransomware attack. However, early detection with dynamic API call analysis is not an ideal solution, as the contemporary ransomware variants use low-level system calls to circumvent the detection methods. In this work, we use hardware performance counters (HPC) as features to detect the ransomware within 3-4 seconds - which may be sufficient, at least in the case of ransomware that takes longer to complete its full execution.
It is crucial to restrain ransomware activity before it causes significant damage or spreads further throughout the system. In this regard, we propose RTR-Shield a novel rule based tool to detect and block crypto ransomware activity in its early stage of execution. The tool primarily relies on two monitoring blocks - Registry Activity Monitoring Block (RAMB) and File Trap Monitoring Block (FTMB). RAMB is derived based on forensic analysis of registry modifications performed by 27 recent ransomware families within the first 10 s of payload execution. We also reveal the common keys and values that a ransomware modifies in its pre-encryption phase.

Recent Talks

Advanced persistent Threat attribution using Zachman Ontology — Case Study on Indian Sea ports

European Interdisciplinary Cyber Security Conference, Stavanger, Norway.

June 15, 2023
Talks
AI, Academic and APTs

C3i Hub Knowledge Sharing Session

April 28, 2023
Talks
A Threat Model for Target Specific APT Attacks — misusing ML services

Center for Cyber Security Systems and Networks, Amrita Vishwa Vidyapeetham, Amritapuri

March 4, 2023
Talks
A Threat Model for Target-Specific APT Attacks - Misusing ML Services

ATAL Faculty Development Program by AICTE @ Amrita Vishwa Vidyapeetham, Coimbatore

February 27, 2023
Talks
Advanced Persistent Threats — Attribution and Detection

IIT(ISM)-Dhanbad on the occasion of Cyber Jagruktha Diwas

November 6, 2021
Talks
Advanced Persistent Threats — Impact on Indian Cyber space

IIT(ISM)-Dhanbad on the occasion of Cyber Jagrukta Diwas

January 7, 2022
Talks
State sponsored Cyber attacks — Looking at Indian Context

Indian Port Association (IPA, which works under the supervisory control of Ministry of Ports, Shipping and Waterways) on the occasion of Cyber Jagurukta Diwas organized by C3i Hub

April 5, 2023
Talks

Accomplishments

Awarded the “Prime Minister’s Research Fellowship” — granted to selected research scholars in premier institutes across India for conducting research in cutting-edge science and technology domains, with a focus on national priorities
Jan 2021
Awarded C3i Hub Research Fellowship
June 2023
Best Student Paper Award for “A Comprehensive API Call Analysis for Detecting Windows-Based Ransomware” @ IEEE International Conference on Cyber Security and Resilience (2022)
July 2022
DELL “Inspire Award” for Unmatched Quality performance in TeamHercules @ DELL-RSA, Bangalore (2019)
April 2019
Completed Certified Ethical Hacker Certification(CEHV9) in 2018 - Cert.No - ECC8034951627
2018
Zonal Winner of IBNC (Indian Biggest Networking championship) from Andhra Pradesh zone (2015)
2015

Contact

For further queries please contact me over an email