Samarth Bhaskar Bhat

Unknown

Bio

SPEAKER PROFILE

 1.Security Architect 2. Over six years of experience in Information Security, design and development of Application  Software.  3.Audited 50+ business Web-Applications in the areas of Banking, Finance, Insurance, Trading and eCommerce.  4.Conducted security audit of Payment Gateway. 5. Expertise in handling various Application security Assessments, Penetration Tests and Vulnerability Assessment  6.Good work exposure on implementation of SOC (Security Operation Centre) and Data Loss Prevention  7.Proficient in understanding application level vulnerabilities like XSS, SQL injection, response splitting attacks, session hijacking, authorization bypass, weak cryptography, authentication flaws & design level vulnerabilities along with the defence mechanisms. 8. Expert in web security testing tools like Proxy Editors, Network Sniffing tools, Web Vulnerability scanners, flash de-compilers.  9.Well versed with OWASP Top 10 10. Proficiency in creating Threat profile for different types of applications 11. Knowledge of different phases, methodologies, concepts and procedures involved in the PT/VA. 12. Good understanding of vulnerability scanners like Nessus, QualysGuard, Rapid7 and Symantec CCSVM. 13. Expertise in implementation and configuration disk encryption and email encryption (PGP) 14. Sound knowledge on remediation process for the vulnerabilities identified during the assessment  15.Proficient in Information security reporting for executive management 16. Trained in secure code review of .NET applications. 17. Trained in web services testing methodology.  18.Sound knowledge of T-SQL, Crystal Reports, VBA, C# (Winforms), Visual Basic.NET  19.Expertise in database programming  20.Experienced with exposure and experience in understanding, reversing and  21.fuzzing wireless protocols in the RF-Layer of systems. 22.Experienced in reversing hardware protocols and implementing hardware attacks and threat- modelling of Wireless and Signals Systems. Have previous exposure and experience in Signal 23.Design and Offensive Signal Tactics. Presently working on application of EW and SIGINT techniques in the Aerospace and Defence domain. Personal projects include machine learning 24.and deep learning methods of recognition and deepfaking signals that can cause signal cant impact on the physical domain/layer of systems and OpenWRT for mesh networking.  25.Signal Detection meta information extraction of signals using Commercially available SDR platforms.  Protocol decomposition of signal of interest.  Baseline formulation of minimum jamming requirements for RADAR and datalink.  Utilization of SDR for SIGINT and ELINT in drones.  Proof of Concept development of DRFM systems using commercially available SDR.  Telecom signal (LTE) reconnaissance using commercially available SDR/  Radio Direction Finding (RDF) and aggregation using commercially avaialble SDR.  Establishment of CEMA guidelines for EW and Cross layer protocol research.  Bechmarking of default DSP algorithms in GP-CPU’s using python (adopted from BDTI guidelines). 26. Network metrics computation of IQ data transfer metrics on mesh networks for SIGINT and ELINT operations.  Wideband FHSS interception techniques using aliasing and FFT shot detection.  Development of PoC of Automatic Modulation Recognition techniques using function models in python.  3D cyclostationary analysis of signals for operator visulalization.  IQ signal generator and interference generator using SDR for RDF testing.  Information security baseline for CEMA and ELINT operations