February 2, 2017,Published by: Admin

Profile of Samir Kelekar

Samir Kelekar is a passionate technologist. He has about 30 years experience in academics and IT industry combined. He has a BTech from Indian Institute of Technology, Bombay ( 1983) in Electrical Engineering, Master's from Clemson University, SC, USA (1987) in Computer Engineering and PhD from Columbia University, New York (1994) in Electrical Engineering. His PhD was in the area of computer networking, and a number of papers came out of it. Links to papers are given at the end.

He worked for a while at the Naval Postgraduate School, Monterey, California and returned to India in 1995. In India, he worked for companies such as Motorola, Alcatel, startups such as Sanware, Narus etc. He owns 3 allocated US patents in the area of mobile security. One of the patents got a six figure dollar offer from one of the top patent companies of the world. Links to patents are given at the end.

For Narus, a Silicon Valley startup he developed world's first skype detection software ( using IP traffic monitoring). He has worked on numerous product ideas as also ran a startup as a founder.

Currently, he spends time consulting in the area of security. He has consulted and/or trained for banks ( Canara Bank), ISPs ( MTN, Iran), startups ( Redbus, Nivaata), telecom product companies ( Tecnotree), security companies ( Indusface), others ( GE Healthcare TCS), as well as number of academic institutes. He has found security holes in many portals, and mobile apps.

Samir is also active socially and is an activist. He is passionate about issues such as free speech, and democracy. He comes from Goa.

US Patent Pending 15/396698 : Method and apparatus for detecting a change in security status of a target

January 2, 2017 Filed

ABSTRACT

A computer implemented method for detecting vulnerability status of a target having interfaces and ports is provided. The method comprises tracking the occurrence of an event including at least one of a network interface becoming active and/or inactive, start and/or stop of a client network service using a port on an active network interface, start and/or stop of a server network service running on a port on an active network interface, and start and/or stop of a network service that does not entail the use of any port.

US Patent 9537876: Method and apparatus for detecting vulnerability status of a target

January 3, 2017 Granted

ABSTRACT

A computer implemented method for detecting vulnerability status of a target having interfaces and ports is provided. The method comprises tracking the occurrence of an event including at least one of a network interface becoming active and/or inactive, start and/or stop of a client network service using a port on an active network interface, start and/or stop of a server network service running on a port on an active network interface, and start and/or stop of a network service that does not entail the use of any port.

MORE

US Patent 8789193 : Method and apparatus for detecting events pertaining to potential change in vulnerability status US 8789193 B2

July 26, 2014, Granted

ABSTRACT Method and apparatus for Vulnerability Assessment techniques is disclosed. A method comprises detecting an event on a target in real time or at periodic intervals, by at least one of an OS service, an OS command, a hook, and an API. The event comprises a change in status of at least one of a network interface, a server network service, a client network service, and a port.

MORE

US Patent 8127359: Systems and methods for real-time network-based vulnerability assessment

February 28, 2012 Granted

ABSTRACT

ABSTRACT A system for real-time vulnerability assessment of a host/device, said system comprising an agent running on the host/device. The agent includes a a first data structure for storing the status of interfaces and ports on the interfaces of the host/device.

MORE

Automated repair of complex systems by fault compensation

1994IEEE

Authors: Samir Kelekar
George Hart

Abstract: A formal method used to repair discrete-event systems consisting of communicating processes is described. Two mechanisms of repairing faulty systems are proposed: the first inserts a new "compensator module" into the communication channel between the faulty process and one or more of its neighbors; the second modifies a neighbor of the faulty process in a compensating manner. The two mechanisms fall under a class of methods in which faults are not fixed by replacement of a faulty unit with a fault-free one, but where changes to the non-faulty parts of the system repair the system. A finite-state model is used to describe processes, and the problem is solved for two models of communication: the symmetric (or the handshake) model and, an asymmetric model. The algorithm is described, and examples are presented, including an indication of how the approach may be applied as part of a sophisticated fault management system for communication networks.

Published in: IEEE/ACM Transactions on Networking ( Volume: 2, Issue: 2, Apr 1994 )
Page(s): 193 - 205

Formal-language theoretic techniques to solve design and fault management problems in computer network protocols and other discrete-event systems

MORE

US Patent 8127359: Systems and methods for real-time network-based vulnerability assessment

February 28, 2012 Granted

ABSTRACT

ABSTRACT A system for real-time vulnerability assessment of a host/device, said system comprising an agent running on the host/device. The agent includes a a first data structure for storing the status of interfaces and ports on the interfaces of the host/device.

MORE

Formal-language theoretic techniques to solve design and fault management problems in computer network protocols and other discrete-event systems

1994Doctoral Dissertation, Columbia University

Formal-language theoretic techniques to solve design and fault management problems in computer network protocols and other discrete-event systems

Author: Samir G. Kelekar
Columbia Univ., New York, NY
Publication: Doctoral Dissertation

Formal-language theoretic techniques to solve design and fault management problems in computer network protocols and other discrete-event systems Columbia University New York, NY, USA 1994

MORE

Synthesis of Protocols and Protocol Converters Using the Submodule Construction Approach

May 1993, Published by : IFIP Belgium

Synthesis of Protocols and Protocol Converters Using the Submodule Construcion Approach

Authors: Samir G. Kelekar George W. Hart

Published in:
Proceeding Proceedings of the IFIP TC6/WG6.1 Thirteenth International Symposium on Protocol Specification, Testing and Verification XIII Pages 307-322

May 25 - 28, 1993 North-Holland Publishing Co. Amsterdam, The Netherlands, The Netherlands 1993 table of contents ISBN:0-444-81648-8

MORE

SUBSCRIBE TO THIS HOMEBLOG

Copyrights © 2017 Teknotrends Software Private Limited All rights reserved | Template by W3layouts