Dr  Ashish Kundu Digital Library

Based in NY,  United States
photo
Ashish Kundu

Bio:

Ashish Kundu is a Master Inventor, and  Research Scientist in  Security Research at the IBM T J Watson Research Center, Yorktown Heights, New York.  He received Ph.D. in Computer Science from Purdue University in 2010 prior to joining IBM Research. His research interests are in Security, Privacy, Compliance and AI Ethics for cloud, blockchain, mobile/IoT and regulatory computing environments. He is leading the security and compliance research efforts for IBM Watson Health Cloud. The long-term vision of Dr. Kundu's research is:  "How to weave security, privacy, compliance, and ethics requirements with the functionality".  He is currently the Associate Editor for IEEE Transactions on Dependable and Secure Computing, and Guest Editor, IEEE Internet Computing Special Issue on Healthcare Informatics and Privacy. He is a IEEE Senior Member. Dr. Kundu has been a member of ACM for over decade; during this period, he has participated in several ACM conferences and acted as reviewer for many journals.

 

His work has been published in more than 25 publications in peer-reviewed conferences and journals, has resulted in more than  100 patents filed, and 50 or more patents granted so far.  Some of his primary contributions to the scientific community are the development of  leakage-free redactable signatures, discovery of security issues in programming languages, such as buffer overflows due to vulnerabilities in the “placement new” expression in C++, development of several cloud security and compliance techniques. During his research work, Ashish has established the areas of "privacy-preserving digital signatures, and data integrity techniques".  GCC released a patch based on his work on Placement new vulnerabilities in C++ . Dr. Kundu's research work has directly and indirectly influenced several products and services. He is the security and compliance research lead for IBM Watson Health Cloud Platform. He has led the research activities for security and compliance for IBM Watson Genomics, and IBM Cognitive Learning for Education Cloud Platform. His prior work has also gone into IBM Hybrid Cloud offerings as well as to IBM Everyplace Access toolkit. 

 

He has been recognized with several awards for his research contributions. Dr. Kundu received the Purdue University CERIAS Diamond Award for outstanding contributions in his doctoral research. He received IBM Research Excellence and Eminence in 2016, and best paper award in 2006. He was recognized as the Best Graduate Teaching Assistant in 2011 by Purdue University (Computer Science). In 2014, Dr. Kundu was recognized by IBM Research with the prestigious title of Master Inventor (he was the quickest researcher to achieve the recognition). He also became the youngest recipient of the Star Alumnus Award from National Institute of Technology Alumni Association, Rourkela. Dr. Kundu has also been named as a Competent Communicator by Toastmasters International.

 

Available Lectures

To request a single lecture/event, click on the desired lecture and complete the Request Lecture Form.

  • Baking Compliance into Cloud: Art or Science?
    With the (obvious) evolution of cloud from being a compute-centric infrastructure to a data-and-compute-centric infrastructure, more and more enterprises are bringing their data to cloud in search...
  • Blockchain Security, Privacy and Compliance

    Given that security threats and privacy breaches are commonplace today, it is an important problem for one to know whether their device(s) are in a "good state of security",...

  • Energy Attacks on Mobile and IoT Devices
    All mobile devices are energy-constrained. They use batteries thatallows using the device for a limited amount of time. In general, energy attacks on mobile devices are denial of service...
  • Exploiting Placement New of C++
    In this talk, we would explore how to exploit the "placement new" expression in C++. "Placement new" facilitates placement of an object/array at a specific memory location. When...
  • HMACs for Graphs
    Graphs are widely used in the representation and processing of data in several domains. Assurance of integrity of graph data is essential. Related work has shown that the digital signatures for graphs...
  • Network Flow Security Analytics for IoT and Mobile Devices

    Given that security threats and privacy breaches are commonplace today, it is an important problem for one to know whether their device(s) are in a "good state of security",...

  • Privacy-preserving Authentication of Graphs on Cloud
    Leakages of structural information in trees and graphs due to (redactable) signatures lead to privacy and confidentiality breaches. So leakage-free redactable signatures are an important topic especially...

To request a tour with this speaker, please complete this online form.

If you are not requesting a tour, click on the desired lecture and complete the Request this Lecture form.

All requests will be sent to ACM headquarters for review.