Amritraj .

Amritraj .

Mableton, Georgia, United States
8K followers 500+ connections

About

Senior software engineer interested in system and decentralized application architecture.

Activity

Join now to see all activity

Experience

Education

  • Kennesaw State University Graphic

    Kennesaw State University

    4.0

    -

    Activities and Societies: Global Learning Fee Committee (GLFC), Upsilon Pi Epsilon (UPE) - Computing Honor Society, IEEE Computer Society, Graduate Students Association (GSA), International Students Association (ISA), Association for Computing Machinery (ACM)

  • -

    -

  • -

Licenses & Certifications

Volunteer Experience

Publications

  • Immutable and Secure IP Address Protection Using Blockchain

    Springer, Cham

    IP addresses can be passed on to new recipients even with a damaged reputation score. It takes a lot of effort to defend a network against storing IP address data using current required practices. A blockchain network offers a decentralized, immutable ledger to record IP data which ensures that the data will not be tampered with and the data is trustworthy. Master nodes and digital IDs are two ways the blockchain can be used to preserve a digital identity. Master nodes can act as a mediator and…

    IP addresses can be passed on to new recipients even with a damaged reputation score. It takes a lot of effort to defend a network against storing IP address data using current required practices. A blockchain network offers a decentralized, immutable ledger to record IP data which ensures that the data will not be tampered with and the data is trustworthy. Master nodes and digital IDs are two ways the blockchain can be used to preserve a digital identity. Master nodes can act as a mediator and store the entire blockchain to improve the validity of the blockchain. Digital IDs can make it easier to verify an identity on the blockchain. In this chapter, we explore how blockchain technology can preserve user’s digital identity more effectively. This chapter also offers a sample program that can be used to store and retrieve information with the use of the Solidity language used on the Ethereum network. Data pertaining to IP addresses is added to a solidity contract with several methods offered for reading data. The IP address data ends up more secure than if it was simply stored in a central database.

    Other authors
    See publication
  • Public Blockchain Scalability: An Examination of Sharding and Segregated Witness

    Springer, Cham

    Recently, public and permissionless blockchains such as Bitcoin and Ethereum have been facing a formidable challenge in the form of scalability which has hindered their expected growth. Both Bitcoin and Ethereum can process fewer than 20 transactions per second, which is significantly lower than their centralized counterpart such as VISA which can process approximately 1700 transactions per second. In realizing this hindrance for wide range adoption of blockchains for building advanced and…

    Recently, public and permissionless blockchains such as Bitcoin and Ethereum have been facing a formidable challenge in the form of scalability which has hindered their expected growth. Both Bitcoin and Ethereum can process fewer than 20 transactions per second, which is significantly lower than their centralized counterpart such as VISA which can process approximately 1700 transactions per second. In realizing this hindrance for wide range adoption of blockchains for building advanced and large scalable systems, the blockchain community has proposed several solutions including Sharding and Segregated Witness (SegWit). Although these proposals are innovative, they still suffer from the blockchain trilemma of scalability, security, and decentralization. Moreover, at this time, little is known or discussed regarding factors related to design choices, feasibility, limitations, and other issues in adopting these solutions in public and permissionless blockchains. Hence, this paper provides the first comprehensive state-of-the-art review of sharding and segregated witness in public and permissionless blockchains, identifying current advancements, highlighting their limitations and discussing possible remedies for the overall improvement of the blockchain domain.

    Other authors
    See publication
  • Sidechain technologies in blockchain networks: An examination and state-of-the-art review

    Journal of Network and Computer Applications (JNCA)

    In the last decade, blockchain has emerged as one of the most influential innovations in software architecture and technology. Ideally, blockchains are designed to be architecturally and politically decentralized, similar to the Internet. In recent times, however, blockchain-based systems have faced stumbling blocks in the form of challenges related to scalability, privacy, security, etc. Several new methods have been proposed both by the research and professional communities to mitigate these…

    In the last decade, blockchain has emerged as one of the most influential innovations in software architecture and technology. Ideally, blockchains are designed to be architecturally and politically decentralized, similar to the Internet. In recent times, however, blockchain-based systems have faced stumbling blocks in the form of challenges related to scalability, privacy, security, etc. Several new methods have been proposed both by the research and professional communities to mitigate these challenges. One such recent advancement proposed is the use of sidechains. A sidechain is a secondary blockchain connected to the main blockchain with a two-way peg. Sidechains may have their own consensus protocols, which could be completely different from the mainchain's protocol. Theoretically, a sidechain can add new functionalities, improve privacy, and security of traditionally vanilla blockchains. To this date, however, little is known or discussed regarding factors related to design choices, feasibility, limitations and other issues in adopting the sidechain technology. Moreover, there is a lack of studies discussing how and where it can effectively be integrated into blockchains to remedy current issues in a clear context. Hence, this paper provides the first comprehensive review of the state-of-the-art sidechains and platforms, identifying current advancements and analyzing their impact from various viewpoints, highlighting their limitations and discussing possible remedies for the overall improvement of the blockchain domain.

    Other authors
    See publication
  • Blockchain Smart Contracts Formalization: Approaches and Challenges to Address Vulnerabilities

    ScienceDirect - Computers & Security

    Blockchain as a distributed computing platform enables users to deploy smart contracts for a wealth of next-generation decentralized applications without involving a trusted third-party. The advantages of smart contracts do, however, come at a price. As with most technologies, there are potential security threats, vulnerabilities and various other issues associated with smart contracts. Writing secure and safe smart contracts can be extremely difficult due to various business logics, as well as…

    Blockchain as a distributed computing platform enables users to deploy smart contracts for a wealth of next-generation decentralized applications without involving a trusted third-party. The advantages of smart contracts do, however, come at a price. As with most technologies, there are potential security threats, vulnerabilities and various other issues associated with smart contracts. Writing secure and safe smart contracts can be extremely difficult due to various business logics, as well as platform vulnerabilities and limitations. Formal methods have recently been advocated to mitigate these vulnerabilities. This paper aims to provide a first-time study on current formalization research on all smart contract-related platforms on blockchains, which is scarce in the literature. To this end, a timely and rigorous systematic review to examine the state-of-the-art research and achievements published between 2015 and July 2019 is provided. The results indicate that the most common formalization technique is theorem proving, which is most often used to verify security properties relating to smart contracts, while other techniques such as symbolic execution and model checking were also frequently used. These techniques were most commonly used to verify the functional correctness of smart contracts. From the language and automation point of views, there were 12 languages (domain specific/specification/general purpose) proposed or used for the formalization of smart contracts on blockchains, while 15 formal method-specific automated tools/frameworks were identified for mitigating various vulnerabilities of smart contracts. From the results of this work, we further highlight three open issues for future research in this emerging domain including: formal testing, automated verification of smart contracts, and domain specific languages (DSLs) for Ethereum. These issues suggest the need for additional, in-depth future research.

    Other authors
    See publication
  • Measuring Team Members’ Contributions in Software Engineering Projects using Git-driven Technology

    IEEE Xplore

    Software engineering is inherently a human-centric and collaborative process and this reflects in its teaching programs, as most of the courses comprise projects and team efforts. In order to fairly evaluate students, there is the problem of quantifying the amount of work contributed to the team development project by each of its members. Most commonly, in order to estimates student contributions, instructors use arbitrary and subjective judgment derived from observations and evaluations. The…

    Software engineering is inherently a human-centric and collaborative process and this reflects in its teaching programs, as most of the courses comprise projects and team efforts. In order to fairly evaluate students, there is the problem of quantifying the amount of work contributed to the team development project by each of its members. Most commonly, in order to estimates student contributions, instructors use arbitrary and subjective judgment derived from observations and evaluations. The currently used process is not a complete picture and is time consuming since it requires numerous observations and extensive paperwork's review. Emerging decentralized systems (such as git) and their widespread applications in all realms of development which capitalize on team-aware metrics, are worthwhile and can provide a solution to the problem. In this work we support a solution that utilizes git-driven technology, and its related features, to measure a team member's contributions objectively, based not only upon the completion of the project, but also at any time during progression development. Such performance assessment could generate more productive team-based learning with higher-quality graduates for better meeting software industry's expectations.

    Other authors
    See publication
  • Empirical Vulnerability Analysis of Automated Smart Contracts Security Testing on Blockchains

    ACM Digital Library

    The emerging blockchain technology supports decentralized computing paradigm shift and is a rapidly approaching phenomenon. While blockchain is thought primarily as the basis of Bitcoin, its application has grown far beyond cryptocurrencies due to the introduction of smart contracts. Smart contracts are self-enforcing pieces of software, which reside and run over a hosting blockchain. Using blockchain-based smart contracts for secure and transparent management to govern interactions…

    The emerging blockchain technology supports decentralized computing paradigm shift and is a rapidly approaching phenomenon. While blockchain is thought primarily as the basis of Bitcoin, its application has grown far beyond cryptocurrencies due to the introduction of smart contracts. Smart contracts are self-enforcing pieces of software, which reside and run over a hosting blockchain. Using blockchain-based smart contracts for secure and transparent management to govern interactions (authentication, connection, and transaction) in Internet-enabled environments, mostly IoT, is a niche area of research and practice. However, writing trustworthy and safe smart contracts can be tremendously challenging because of the complicated semantics of underlying domain-specific languages and its testability. There have been high-profile incidents that indicate blockchain smart contracts could contain various code-security vulnerabilities, instigating financial harms. When it involves security of smart contracts, developers embracing the ability to write the contracts should be capable of testing their code, for diagnosing security vulnerabilities, before deploying them to the immutable environments on blockchains. However, there are only a handful of security testing tools for smart contracts. This implies that the existing research on automatic smart contracts security testing is not adequate and remains in a very stage of infancy. With a specific goal to more readily realize the application of blockchain smart contracts in security and privacy, we should first understand their vulnerabilities before widespread implementation. Accordingly, the goal of this paper is to carry out a far-reaching experimental assessment of current static smart contracts security testing tools, for the most widely used blockchain, the Ethereum and its domain-specific programming language, Solidity, to provide the first body of knowledge for creating more secure blockchain-based software.

    Other authors
    See publication
  • Smart Contract Programming Languages on Blockchains: An Empirical Evaluation of Usability and Security

    Springer Lecture Notes in Computer Science (LNCS)

    Blockchain is a promising infrastructural technology that is finding its way into a growing number of domains like big data, finance, and medical. While blockchain has come to be thought of primarily as the foundation for Bitcoin, it has evolved far beyond underpinning the virtual currency. As it becomes progressively popular, the need for effective programming means would be more demanding. Blockchain programming as a core means provides accounts of the ‘code is law’ that specifies agreements…

    Blockchain is a promising infrastructural technology that is finding its way into a growing number of domains like big data, finance, and medical. While blockchain has come to be thought of primarily as the foundation for Bitcoin, it has evolved far beyond underpinning the virtual currency. As it becomes progressively popular, the need for effective programming means would be more demanding. Blockchain programming as a core means provides accounts of the ‘code is law’ that specifies agreements between parties and allows its stakeholders to still trust the platform to execute the agreed-upon contract (known as smart contract) as expected. Although it seems straightforward in theory, it is hardly the case when it comes to real-life situations. There have been several instances that show smart contracts are riddled with issues and vulnerabilities in code, causing damages. What’s for sure is lacking is that the existing languages are not living up to the point to be able to unleash the full potential of the blockchain, as often have resulted in buggy code with a steep learning curve for developers. This denotes that the current research on contract development is not sufficient and is still in a stage of infancy. In order to advance the state of the research in this area, an evaluation of the current state-of-the-art practices in a thorough and experimental manner is required. Thus, the objective of this paper is to give a comprehensive analysis of such domain-specific programming practices from critical points of usability and security to provide a working guideline for newcomers and researchers.

    Other authors
    See publication

Courses

  • Emerging Software Engineering Processes

    SWE 6733

  • Ethical Hacking: Network Security and Penetration Testing

    IT 6843

  • Formal Methods in Software Engineering

    SWE 6883

  • Graduate Internship

    CSE 6983

  • Master's Thesis

    SWE 7803

  • Mathematical Structures for Computer Science

    CS 5070

  • Object Oriented Analysis and Design

    SWE 6743

  • Requirements Engineering

    SWE 6613

  • Software Architecture

    SWE 6653

  • Software Engineering

    SWE 6623

  • Software Project Planning and Management

    SWE 6633

  • Software Quality Engineering and Assurance

    SWE 6673

Projects

  • ONLINE PIZZA DELIVERY SYSTEM

    -

    - Designed and Developed an online Pizza Restaurant System – Mom and Pop’s Pizza Restaurant System.

    - A user can create an account by registering on the system, edit personal information, view offers and news, Order and customize various pizzas as they want and track their orders.

    - An administrator can log into the system and view recent orders, recent new customers, search customer information, post latest offers and news, update offers, remove offers, search pending orders…

    - Designed and Developed an online Pizza Restaurant System – Mom and Pop’s Pizza Restaurant System.

    - A user can create an account by registering on the system, edit personal information, view offers and news, Order and customize various pizzas as they want and track their orders.

    - An administrator can log into the system and view recent orders, recent new customers, search customer information, post latest offers and news, update offers, remove offers, search pending orders, search customer orders and update customer orders.

    - Produced complete Software Requirements Specification document and a User Manual for the System.

    See project
  • SOFTWARE DEVELOPMENT TRACKING SYSTEM

    -

    - Designed and Developed a software that keeps track of other software projects. For each project, it receives a list of functional and non-functional requirements (as input, in addition to owner's name, etc.) and allows the user to view the total expended hours by requirements analysis, designing, coding, testing, project management (by each of the requirement entered).

    - Produced a Quick plan and Comprehensive plan as part of project management documentation.

    Other creators
    See project
  • APPLICATION OF OPTIMIZATION ALGORITHMS ON PROBLEMS IN ELECTRICAL POWER SYSTEMS

    -

    - Designed a System to solve the Unit Commitment and Relay Coordination Problem of up to 14 variables in an Electrical Power System based on the Firefly and Cuckoo Search algorithm.

    - Also, Completed an Undergraduate Thesis on the Final Project.

Honors & Awards

  • Dean's 4.0 Club - Spring 2019

    College of Computing and Software Engineering at Kennesaw State University

  • Outstanding Graduate Student

    College of Computing and Software Engineering at Kennesaw State University

  • Dean's 4.0 Club - Fall 2018

    College of Computing and Software Engineering at Kennesaw State University

  • 2018 Upsilon Pi Epsilon Scholarship Award

    Upsilon Pi Epsilon - International Honor Society for the Computing and Information Disciplines

    Received a 1000$ Scholarship award from Upsilon Pi Epsilon (UPE) for excellence in academics and extra-curricular activities.

  • Dean's 4.0 Club - Spring 2018

    College of Computing and Software Engineering at Kennesaw State University

  • Inducted into Upsilon Pi Epsilon (UPE) - Computing Honor Society

    Upsilon Pi Epsilon KSU Chapter

  • Dean's 4.0 Club - Fall 2017

    College of Computing and Software Engineering at Kennesaw State University

Languages

  • English

    Native or bilingual proficiency

  • Hindi

    Native or bilingual proficiency

Organizations

  • International Students Association

    Executive Board Member - Treasurer

    - Present

    The International Student Association’s (ISA) mission is to encourage intercultural, educational, social, and global exchange among diverse students attending Kennesaw State University. ISA plans and implements programs that provide opportunities for students, faculty, and staff to engage in global learning, which enriches the entire Kennesaw State University community. My Responsibilities: - Act as a custodian of the ISA funds. - Responsible for maintaining yearly budget binder. -…

    The International Student Association’s (ISA) mission is to encourage intercultural, educational, social, and global exchange among diverse students attending Kennesaw State University. ISA plans and implements programs that provide opportunities for students, faculty, and staff to engage in global learning, which enriches the entire Kennesaw State University community. My Responsibilities: - Act as a custodian of the ISA funds. - Responsible for maintaining yearly budget binder. - Responsible for distribution of funds and submission of receipts - Responsible for requesting funding for events in a timely manner - Make the balance available at each ISA executive board meeting. - Prepare an annual and quarterly budget report. - Serve as Student Activities Budget Advisory Committee (SABAC) representative. - Chair the Fundraising Committee - Co-Chair the Sports Committee

  • Upsilon Pi Epsilon - Computer Honor Society

    Treasurer

    - Present

    Upsilon Pi Epsilon (UPE) was founded as an honor society at Texas A&M University in 1967, at the request of the Computing Science students. Most of the original concept and design of UPE is the result of the effort of these students who were highly motivated with the desire to recognize outstanding scholastic and professional achievements in the Computing and Information Disciplines UPE is a non-profit corporation under 501(c)3 of the IRS Code; is a member of the Association of College Honor…

    Upsilon Pi Epsilon (UPE) was founded as an honor society at Texas A&M University in 1967, at the request of the Computing Science students. Most of the original concept and design of UPE is the result of the effort of these students who were highly motivated with the desire to recognize outstanding scholastic and professional achievements in the Computing and Information Disciplines UPE is a non-profit corporation under 501(c)3 of the IRS Code; is a member of the Association of College Honor Societies (ACHS); the International Federation of Engineering Education Societies (IFEES); and is recognized as the honor society for the computing and information disciplines by the ACM and the IEEE-CS My Responsibilities: • Collect all dues and assessments and issue, with the assistance of the Secretary, notices of special assignments. • I am also in charge of all funds of the chapter and am responsible for paying all bills presented against the chapter which are approved for payment.

  • Association for Computing Machinery (ACM) at KSU

    Member

    - Present

    The Kennesaw Association of Computing Machinery (ACM) is an organization that is all about bringing together computing educators, students, and professional to inspire dialog share resources, and address the field’s challenges. As the world’s largest computing society, the goal of our organization is to promote and expand student's understanding of computing and help our peers to develop in their chosen field. To do this, the KSU ACM promotes projects, research, and programming competitions…

    The Kennesaw Association of Computing Machinery (ACM) is an organization that is all about bringing together computing educators, students, and professional to inspire dialog share resources, and address the field’s challenges. As the world’s largest computing society, the goal of our organization is to promote and expand student's understanding of computing and help our peers to develop in their chosen field. To do this, the KSU ACM promotes projects, research, and programming competitions such as ACM-ICPC (The world oldest, largest, and most prestigious programming contest). Additionally, we host lectures series and workshops to help introduce students to not only new developments in computing but also new developments in long-standing systems.

  • IEEE Computer Society

    Member

    - Present

    Serving more than 60,000 members, the IEEE Computer Society is the trusted information, networking, and career-development source for a global community of technology leaders that includes researchers, educators, software engineers, IT professionals, employers, and students. The goal of IEEE-CS at KSU is to aid student research projects, promote events related to the field of computation, and support the professional growth of its members.

  • Global Learning Fee Committee (GLFC)

    Graduate Student Representative

    -

    Kennesaw State University recognizes that a global education is essential to student success in today’s complex and interdependent world. In 2007, the KSU student body recommended and approved a Global Learning Fee (GLF) to be instituted for the purpose of providing education abroad scholarships. As a result, students pay a $11 per term international fee that feeds into the Global Learning Scholarship Fund. Currently, eligible students may recieve a $1,000 scholarship each academic…

    Kennesaw State University recognizes that a global education is essential to student success in today’s complex and interdependent world. In 2007, the KSU student body recommended and approved a Global Learning Fee (GLF) to be instituted for the purpose of providing education abroad scholarships. As a result, students pay a $11 per term international fee that feeds into the Global Learning Scholarship Fund. Currently, eligible students may recieve a $1,000 scholarship each academic year. KSU degree-seeking undergraduate and graduate students in good academic standing are eligible for Global Learning Scholarships. Awards will made until the funds are depleted for the year. The scholarships can be used for these credit education abroad experiences: - short-term programs - internships and exchanges - international research - credit programs The Division of Student Affairs administers the fee and the Global Learning Fee Committee (GLFC) acts as an advisory committee to the Vice President of Student Affairs on policy and budgetary matters. The GLFC consists mostly of students joined by faculty and staff. My Responsibilities: • Member of the advisory board to the Vice President of student affairs. • Review and recommend policies for the Education Abroad program at Kennesaw State University. • Recommend Global Learning Fee (GLF) Scholarship award amounts and conditions. • Act as a voting member for recommendations, policies and scholarship awards. • Supervise and manage scholarship funds for the fiscal year 2018-2019.

  • Graduate Students Association (GSA)

    Member

    -

    Graduate Student Association (GSA) assists graduate students in their academic pursuits and in balancing school related activities, work and family. GSA welcomes graduate students from all disciplines for the chance to network and share resources necessary to do well both inside and outside of the classroom. Many of our meetings have guest lectures and provide opportunities for students and faculty to attend conferences, whether local or international. We also provide funding for such trips.

More activity by Amritraj

View Amritraj’s full profile

  • See who you know in common
  • Get introduced
  • Contact Amritraj directly
Join to view full profile

Other similar profiles

Explore top content on LinkedIn

Find curated posts and insights for relevant topics all in one place.

View top content

Others named Amritraj . in United States

Add new skills with these courses