Certified Information Privacy
Technologist (CIPT), International Association of Privacy Professionals (IAPP), 2015 - Present.
Winner, Symantec Graduate Intern showcase event, Aug 2013.
Dean Tuition Fellowship, awarded by Carnegie Institute of Technology, CMU, 2009 - 10.
Merit Scholarship (full tuition waiver), PEC University of Technology, India, 2005 - 09.
Silver Medal for Senior Design project, Department of Electronics and Electrical Communication Engineering, PEC University of Technology, India, 2009.
Selected for Indian National Mathematics Olympiad, 2005.
Selected for Indian National Chemistry Olympiad (Theory), 2005.
National Talent Search Scholarship (NTSE), awarded by the National Council of Education, Research and Training (NCERT), India, 2003.
Programming Languages: Python (Working knowledge), C (Prior experience) , Java (Prior experience)
Tools: LATEX, Eclipse, IntelliJ, Version control (SVN, Git, Mercurial)
Operating Systems: Windows, Linux, MAC OSX
1. Database Privacy: k-anonymity and
de-anonymization attacks, Guest
lecture for CMU course 18-734,
Foundations of Privacy, October 2014.
2. MapReduce with Secure Co-processors: Data Leakage via Composition Attacks and Mitigation, Microsoft Research, Cambridge, UK, August 2014.
3. Actual Causes of Security Violations: A Building Block for Accountability, FCS-FCC’14, Vienna Summer of Logic, July 2014.
4. Provable De-anonymization of Large Datasets with Sparse Dimensions, Microsoft Research, Cambridge, UK, June 2014.
5. ACiD: Automating Compliance in Data Insight, Guest lecture for CMU course, Foundations of Privacy, September 2013.
6. Privacy related Compliance: Automating Compliance in Data Insight, Symantec Research Labs, Mountain View, CA, August 2013.
7. Defining Programs as Actual Causes, Department of Philosophy, Carnegie Mellon University, March 2013.
8. Programs as Actual Causes, Symantec Research Labs, Mountain View, CA, July 2013.
9. Provable De-anonymization of Large Datasets with Sparse Dimensions, ETAPS First Conference on Principles of Security and Trust, March 2012.
10. Database Privacy: k-anonymity and de-anonymization attacks, Guest lecture for CMU course, Foundations of Security and Privacy 18-739, October 2011.
Tiny Transactions on Computer Science (Vol IV), March 2016.
Tiny Transactions on Computer Science (Vol III), March 2015.
ACM Conference on Computer and Communications Security (CCS) 2014,
IEEE Symposium on Security and Privacy 2014, 2013
Principles of Security and Trust, ETAPS Conference (POST) 2014
Workshop on Privacy in the Electronic Society (WPES) 2013, 2012
IEEE Computer Security Foundations Symposium (CSF) 2012
European Symposium on Research in Computer Security (ESORICS) 2012
Member, International Association of Privacy Professionals (IAPP), 2015 - Present.
Member, Society of Women Engineers (SWE), 2011 – Present.
Awarded Federated Logic Conference (FLoC) student travel grant for attending FLoC’14, colocated
with Vienna Summer of Logic, Vienna, July 2014.
Selected for Second Summer School on Formal Techniques (SSFT), CA, May 2014.
Selected for Women in Theory (WIT) workshop, co-located with STOC, New York, May 2014.
Selected for CRA-W Graduate Cohort Workshop ’12, Washington, April 2012.
Awarded student travel grant for ACM CCS 2011, Chicago, October 2011.
Selected for CRA-W Graduate Cohort Workshop ’11, Boston, April 2011.