Arati Baliga is a Researcher and Adjunct Professor at the Department of Computer Science and Engineering at the NYU Polytechnic School of Engineering. She teaches courses that are part of the NYU ePoly Online Graduate Program. Her expertise and interests are in mobile, systems and network security. Previously, she was a Security Researcher at the AT&T Security Research Center where she worked on building carrier based defenses against mobile malware.
Arati obtained her Ph.D from the Department of Computer Science at Rutgers University. Her dissertation work on stealth malware detection won the outstanding paper award at the Annual Computer Security and Applications Conference (ACSAC 2008).
Rutgers University, 2009
Ph.D., Computer Science
- Triton: A Carrier based Approach for Detecting and Mitigating Mobile Malware”, Arati Baliga, Jeffrey Bickford, Neil Daswani, In the Journal of Cyber Security and Mobility, Vol 3, Issue 2, Apr. 2014.
- Detecting Kernel-level Rootkits using Data Structure InvariantsArati Baliga, Vinod Ganapathy and Liviu Iftode, In the IEEE Transactions on Dependable and Secure Computing, 2010
- Automated Containment of Rootkit Attacks, Arati Baliga, Xiaoxin Chen and Liviu Iftode, In the Elsevier Journal on Computers and Security, Vol. 27, Issues 7-8, Pages 323-334, Dec. 2008.
- Secure, Pseudonymous and Auditable Communication in Vehicular Ad Hoc Networks (Invited paper)Pandurang Kamat, Arati Baliga and Wade Trappe, In the Wiley Inter Science Journal of Security and Communication Networks, Special Issue on Security and Privacy Preservation in Vehicular Communications, Vol. 1, Issue 3, Pages 233-244, Jun. 2008.
- "Opening Up the Last Frontiers for Securing the Future Wireless Internet," Wade Trappe, Arati Baliga and Radha Poovendran, in Emerging Wireless Technologies and the Future Mobile Internet, Dipankar Raychaudhuri and Mario Gerla, editors. Cambridge University Press, May 2011, Chapter 9, pages 242 – 282.
- "Systemic Threats to Kernel Data: Attacks and Defense Techniques," Arati Baliga, Pandurang Kamat, Vinod Ganapathy and Liviu Iftode, in The Handbook of Research on Advanced Operating Systems and Kernel Applications: Techniques and Technologies, Yair Wiseman and Song Jiang, editors. Information Science Reference (IGI Global), Sep. 2009, Chapter 3, pages 46-70.
- "An efficient Security Framework for Mobile WiMAX," Mete Rodoper, Arati Baliga, Edward Jung and Wade Trappe, in ACM Symposium on Applied Computing (SAC), 2012.
- “Monitoring Data Structures using Hardware Transactional Memory”, Shakeel Butt, Vinod Ganapathy, Arati Baliga and Mihai Christodorescu, in the Second International Conference on Runtime Verification (RV), 2011.
- “VPMN - Virtual Private Mobile Network - Towards Mobility-as-a-Service”, Arati Baliga, Xu Chen, Baris Coskun, Gustavo De Los Reyes, Seungjoon Lee, Suhas Mathur, and Jacobus Van der Merwe, in the Second International Workshop on Mobile Cloud Computing & Services, held in conjunction with MobiSys 2011.
- "Reactive Onboard Regulation of Cognitive Radios," Yu Zhang, Arati Baliga and Wade Trappe, in the Workshop on Data Security and Privacy in Wireless Networks, 2010.
- "Rootkits on Smartphones: Attacks, Implications and Opportunities," Jeffrey Bickford, Ryan O'hare, Arati Baliga, Vinod Ganapathy and Liviu Iftode, in the Workshop on Mobile Computing Systems and Applications, Annapolis, MD, Feb. 2010.
- "Automatic Inference and Enforcement of Kernel Data Structure Invariants," Arati Baliga, Vinod Ganapathy and Liviu Iftode, in the 24th Annual Computer Security and Applications Conference (ACSAC), Anaheim, CA, Dec. 2008, Outstanding Student Paper Award.
- "On Covert Collaboration," Arati Baliga and Joe Kilian, in the ACM Multimedia and Security Workshop (ACM MMSec), Dallas, TX, Sep. 2007.
- "A Web based Covert File System ," Arati Baliga, Joe Kilian and Liviu Iftode, in the 11th Workshop on Hot Topics in Operating Systems (HotOS), San Diego, CA, May 2007.
- "Lurking in the Shadows: Identifying Systemic Threats to Kernel Data", Arati Baliga, Pandurang Kamat and Liviu Iftode, in the IEEE Symposium on Security and Privacy (IEEE S&P), Oakland, CA, May 2007.
- "An Identity-based Security Framework for VANETs", Pandurang Kamat, Arati Baliga and Wade Trappe, in the Third ACM International Workshop on Vehicular Ad Hoc Networks (VANET), held in Conjunction with MOBICOM, Los Angeles, CA, USA, Sep. 2006.
- Mobile Security
- Systems Security
- Network Security
- AT&T Labs Key Contributor Award for key contributions to research, 2011.
- AT&T Labs Key Contributor Award for key contributions to research, 2010.
- Outstanding Student Paper Award for the paper “Automatic Inference and Enforcement of Kernel Data Structure Invariants”, at the 24th Annual Computer Security and Applications Conference (ACSAC), Anaheim, CA, Dec. 2008.
- Google Anita Borg Scholarship Finalist award, 2007.
System for Proximity based Ad-Hoc Data Sharing Across Devices wit, (Patent # 8,824,964, issued Sep 2, 2014)
A system for transferring data between devices with user via a short range wireless communication system is disclosed. The system may include a first device configured to activate an intuitive interface on the first device having a system for proximity based ad-hoc data sharing between the first device with an intuitive interface and at least a second device with an intuitive interface. Once, the first device is determined to be within range of a second device with proximity based ad-hoc data sharing, data may be received by the intuitive interface on the first device and data may be sent from the intuitive interface on the first device to an intuitive interface on the second device using an intuitive interface on the first device without relying on an external communication network. The data may be transferred with a single click to the receiving device in a paste-to format.
Peer-To-Peer (P2P) Botnet Tracking At Backbone Level, (US Patent # 8,627,473, issued Jan 7, 2014)
A method, computer-readable medium, and system for analyzing backbone traffic to determine compromised hosts from among hosts on a network are provided. The backbone traffic includes data flows. Each of the data flows is analyzed to determine peer-to-peer data flows from among the data flows. Each of the peer-to-peer data flows is one of the data flows having a source address and a destination address that are each unassociated with a domain name. The peer-to-peer data flows are analyzed to determine the compromised hosts from among the hosts. Each of the compromised hosts is interconnected with another of the compromised hosts via at least one of the peer-to-peer data flows.
Mobile Malicious Software Mitigation, (US patent # 8,695,095, issued Apr 8, 2014.)
Mitigation of malicious software in wireless networks and/or on mobile devices is provided. A mobile malicious software mitigation component is provided that obtains an internet protocol address that is exhibiting malicious software behavior, a profile of the malicious software behavior, and a time of the malicious software behavior. The malicious software mitigation component can determine an identity of a mobile device that was assigned the internet protocol address during the time it was exhibiting malicious software behavior, and transmit the profile to the mobile device. In addition, the malicious software mitigation component determine if the duration of the assignment of the internet protocol address to the mobile device is sufficient for positive identification.