Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Prajit Kumar Das is active.

Publication


Featured researches published by Prajit Kumar Das.


international conference on mobile systems, applications, and services | 2014

Demo: FaceBlock: privacy-aware pictures for google glass

Roberto Yus; Primal Pappachan; Prajit Kumar Das; Eduardo Mena; Anupam Joshi; Tim Finin

Proceedings of the 12th Annual International Conference on Mobile Systems, Applications, and Services


advances in social networks analysis and mining | 2016

CyberTwitter: using Twitter to generate alerts for cybersecurity threats and vulnerabilities

Sudip Mittal; Prajit Kumar Das; Varish Mulwad; Anupam Joshi; Tim Finin

In order to secure vital personal and organizational system we require timely intelligence on cybersecurity threats and vulnerabilities. Intelligence about these threats is generally available in both overt and covert sources like the National Vulnerability Database, CERT alerts, blog posts, social media, and dark web resources. Intelligence updates about cybersecurity can be viewed as temporal events that a security analyst must keep up with so as to secure a computer system. We describe CyberTwitter, a system to discover and analyze cybersecurity intelligence on Twitter and serve as a OSINT (Open-source intelligence) source. We analyze real time information updates, in form of tweets, to extract intelligence about various possible threats. We use the Semantic Web RDF to represent the intelligence gathered and SWRL rules to reason over extracted intelligence to issue alerts for security analysts.


conference on computer communications workshops | 2017

App behavioral analysis using system calls

Prajit Kumar Das; Anupam Joshi; Tim Finin

System calls provide an interface to the services made available by an operating system. As a result, any functionality provided by a software application eventually reduces to a set of fixed system calls. Since system calls have been used in literature, to analyze program behavior we made an assumption that analyzing the patterns in calls made by a mobile application would provide us insight into its behavior. In this paper, we present our preliminary study conducted with 534 mobile applications and the system calls made by them. Due to a rising trend of mobile applications providing multiple functionalities, our study concluded, mapping system calls to functional behavior of a mobile application was not straightforward. We use Weka tool with manually annotated application behavior classes and system call features in our experiments, to show that using such features achieves mediocre F1-measure at best. Thus leading to the conclusion that system calls were not sufficient features for mobile application behavior classification.


Mobile Computing and Communications Review | 2013

ACM HotMobile 2013 poster: an energy efficient semantic context model for managing privacy on smartphones

Prajit Kumar Das; Dibyajyoti Ghosh; Anupam Joshi; Tim Finin

We describe a method to carry out energy efficient privacy preservation on a mobile smartphone. Our work is based on a study of an Android smartphones component-wise energy consumption pattern and is based on a three-fold approach to ensure efficient execution of privacy policies, based on user and app context modeled using semantic web technologies.


color imaging conference | 2016

Capturing Policies for Fine-Grained Access Control on Mobile Devices

Prajit Kumar Das; Anupam Joshi; Tim Finin

As of 2016, there are more mobile devices than humans on earth. Today, mobile devices are a critical part of our lives and often hold sensitive corporate and personal data. As a result, they are a lucrative target for attackers, and managing data privacy and security on mobile devices has become a vital issue. Existing access control mechanisms in most devices are restrictive and inadequate. They do not take into account the context of a device and its user when making decisions. In many cases, the access granted to a subject should change based on the context of a device. Such fine-grained, context-sensitive access control policies have to be personalized too. In this paper, we present a system i.e. Mithril that uses policies represented in Semantic Web technologies and captured using user feedback, to handle access control on mobile devices. We present an iterative feedback process to capture user specific policy. We also present a policy violation metric that allows us to decide when the capture process is complete.


PrivOn'14 Proceedings of the 2nd International Conference on Society, Privacy and the Semantic Web - Policy and Technology - Volume 1316 | 2014

A semantic context-aware privacy model for faceblock

Primal Pappachan; Roberto Yus; Prajit Kumar Das; Tim Finin; Eduardo Mena; Anupam Joshi


ieee international conference on smart computing | 2016

Context-Sensitive Policy Based Security in Internet of Things

Prajit Kumar Das; Sandeep Nair Narayanan; Nitin Kumar Sharma; Anupam Joshi; Karuna Pande Joshi; Tim Finin


international semantic web conference | 2013

Energy efficient sensing for managing context and privacy on smartphones

Prajit Kumar Das; Anupam Joshi; Tim Finin


PrivOn'14 Proceedings of the 2nd International Conference on Society, Privacy and the Semantic Web - Policy and Technology - Volume 1316 | 2014

Semantics for privacy and shared context

Roberto Yus; Primal Pappachan; Prajit Kumar Das; Tim Finin; Anupam Joshi; Eduardo Mena


Ph.D. Dissertation | 2017

Context-Dependent Privacy and Security Management on Mobile Devices

Prajit Kumar Das

Collaboration


Dive into the Prajit Kumar Das's collaboration.

Top Co-Authors

Avatar
Top Co-Authors

Avatar

Tim Finin

University of Maryland

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Roberto Yus

University of Zaragoza

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Researchain Logo
Decentralizing Knowledge