Ram Shankar Siva Kumar 🦝
Seattle, Washington, United States
8K followers
500+ connections
About
I work on the intersection of machine learning and security. At Microsoft, I founded the…
Articles by Ram Shankar
Activity
-
AI Red Team 🩷 GPT 5.5 For weeks, before the rest of the world got access to GPT 5.5, Microsoft AI Red Team assessed the security posture of this…
AI Red Team 🩷 GPT 5.5 For weeks, before the rest of the world got access to GPT 5.5, Microsoft AI Red Team assessed the security posture of this…
Shared by Ram Shankar Siva Kumar 🦝
-
Want to know how an AI Safety paper is conceptually related to previous work? Giorgio Severi has an answer!
Want to know how an AI Safety paper is conceptually related to previous work? Giorgio Severi has an answer!
Shared by Ram Shankar Siva Kumar 🦝
-
1 in 29 papers from #ICLR -- one of the three premier academic AI venues -- has atleast one hallucinated reference, questioning scientific integrity…
1 in 29 papers from #ICLR -- one of the three premier academic AI venues -- has atleast one hallucinated reference, questioning scientific integrity…
Shared by Ram Shankar Siva Kumar 🦝
Experience
Education
Publications
-
Security + Big Data: The Business, Challenges and How to Win the Race
Microsoft Internal
Rated 4/5 stars by Barry Briggs, Lead of Microsoft IT Technology Office
Comment by Dan Fowler, General Manager, Business and Information Architecture:
'Well written facts based paper.They have clearly identified an opportunity for either Microsoft as a product, or MSIT or MCS.' -
S-SPAN: Secure Smart Posters in Android using NFC
13th IEEE International Symposium on a World of Wireless, Mobile and Multimedia Networks (WoWMoM), June 2012
Jason Wu, Lin Qi, Nishant Kumar, Ram Shankar Siva Kumar, and Patrick Tague, "S-SPAN: Secure Smart Posters in Android using NFC", 13th IEEE International Symposium on a World of Wireless, Mobile and Multimedia Networks (WoWMoM), June 2012. (demo)
Other authorsSee publication
Courses
-
Engineering Technology and Innovation Management
19684
-
Fundamental of Telecommunications
14746
-
Introduction to Computer Security
18730
-
Machine Learning
10601
-
Managerial and Engineering Economics
19681
-
Mobile Security
18639
-
Network Security
18731
-
Organization Design and Implementation
94700
-
Policy of Wireless Systems and Internet
18630
-
Rapid Prototyping of Computer Systems
18745
-
Secure Software Systems
18732
-
Strategy and Management of Technical Innovation
19682
-
Telecommunication Policy and Management
19712
-
Web Application Development
15600
Projects
-
Security Analysis of Accountable Internet Protocol (AIP)
- Present
Analyzing the security of the Accountable Internet Protocol (AIP) under the supervision of Professor Jon Peha and Professor Sirbu, as part of the eXpressive Internet Architecture (XIA) group.
-
Rapid Malware Analysis Using Machine Learning Principles
- Present
•Rapidly clustered malware based on PE header features, using a combination of dimensionality reduction and clustering algorithms (K-means, K-means ++, K-medoids, Hierarchical clustering). Also investigated the idea of bi-clustering using Bregman Co-clustering
•Achieved an overall test accuracy of 89.91% (54 features,3934 samples,10-fold cross validation)
Other creators -
Securing NFC based Smart Posters
- Present
•Analyzed the different attacks on Active-Passive (phone-tags) pairing that are possible on the Near Field Communication technology.
•Built a smart poster mobile application that prevented Tag Spoofing, Tag Cloning and provided a framework for authentication in Android Nexus S mobile phones.
Other creators -
Mitigation of Denial Of Service Attacks in Next Generation Networks
-
• Analyzed the Distributed-Denial of Service attacks in SCION (Scalability, Control and Isolation in Next Generation Networks) framework.
• Modeled mitigation mechanisms using a combination of SIFF (Stateless Internet Flow Filter) capabilities and Portcullis computational puzzle techniques. Results show that not only are the attacks are no longer possible, but also includes notion of message integrity.
-
SSL and TCP/IP attack Implementation
-
Attacked a full protocol TCP/IP stack by performing a SYN prediction exploit and timing attack. Played a Man-In-the-Middle attack between a client and a server and retrieved data
Languages
-
English
Native or bilingual proficiency
-
French
Limited working proficiency
Explore top content on LinkedIn
Find curated posts and insights for relevant topics all in one place.
View top content