Posts by Collection

publications

SilentInformer: A Framework for Information Dispersion using Inaudible Acoustic Signals

Published in Poster Track in COMSNETS, 2020

Disbursing information in real-life noisy environ- ments is challenging. The problem gets further compounded when the users of the system are aged or have sensory impaire- ments. We, in this paper, develop a system called SilentInformer, for advanced information sharing ,over smartphones, by exploit- ing inaudible acoustic signals. The results depict the potential of the system by achieving a minimum bit error rate (BER) ≤ 10% with message length ≤ 4 symbols and an average BER ≤ 30% with a message length ≤ 8 symbols, from a distance of 27ft in realistic outdoor conditions.

Download Paper, Source Code

DisProTrack: Distributed Provenance Tracking over Serverless Applications

Published in INFOCOM, 2023

Provenance tracking has been widely used in the recent literature to debug system vulnerabilities and find the root causes behind faults, errors, or crashes over a running system. However, the existing approaches primarily developed graph-based models for provenance tracking over monolithic applications running directly over the operating system kernel. In contrast, the modern DevOps-based service-oriented architecture relies on distributed platforms, like serverless computing that uses container-based sandboxing over the kernel. Provenance tracking over such a distributed micro-service architecture is challenging, as the application and system logs are generated asynchronously and follow heterogeneous nomenclature and logging formats. This paper develops a novel approach to combining system and micro- services logs together to generate a Universal Provenance Graph (UPG) that can be used for provenance tracking over serverless architecture. We develop a Loadable Kernel Module (LKM) for runtime unit identification over the logs by intercepting the system calls with the help from the control flow graphs over the static application binaries. Finally, we design a regular expression-based log optimization method for reverse query parsing over the generated UPG. A thorough evaluation of the proposed UPG model with different benchmarked serverless applications shows the system’s effectiveness.

Download Paper, Source Code

talks

teaching

Theory of Blockchain & Application

NPTEL Online Certification Course, Department of Computer Science & Engineering, IIT Kharagpur, 2022

Course Page

  • Instructor: Prof. Sandip Chakraborty, Prof. Shamik Sural
  • Teaching Assistance: Bishakh Ghosh, Utkalika Satapathy
  • Duration : 12 weeks
  • Level : Undergraduate Students, Postgraduate Students

CS60002: Distributed Systems

Classroom Course, Department of Computer Science & Engineering, IIT Kharagpur, 2023

Course Page

  • Instructor: Prof. Sandip Chakraborty
  • Teaching Assistance: Utkalika Satapathy, Ishan Sharma, Pankaj Kumar Agarwal
  • Duration : 16 weeks
  • Level : Postgraduate Students, Research Scholar
  • Syllabus: Lamport Clocks, State Machines, Fault Detection, Snapshots, Consensus, Byzantine Agreement, Consistency Models, Replication Protocols, Distributed Storage

CS61065: Theory And Applications Of Blockchain

Classroom Course, Department of Computer Science & Engineering, IIT Kharagpur, 2023

Course Page

  • Instructor: Prof. Sandip Chakraborty, Prof. Shamik Sural
  • Teaching Assistance: Utkalika Satpathy, Tirthankar Sengupta, Gaurav Kumar Meena
  • Duration : 16 weeks
  • Level : Postgraduate Students

Blockchain and its Applications

NPTEL Online Certification Course, Department of Computer Science & Engineering, IIT Kharagpur, 2023

Course Page

  • Instructor: Prof. Sandip Chakraborty, Prof. Shamik Sural
  • Teaching Assistance: Utkalika Satapathy, Tirthankar Sengupta
  • Duration : 12 weeks
  • Level : Undergraduate Students, Postgraduate Students