Apply now

Seminars & Events


Short introduction to C3I Center's Research

Bio: My name is Anam Fatima and I am pursuing M.Tech(specialisation in Cyber Security) from Centre For Advanced Studies, AKTU, Lucknow. I did my B.Tech from Institute of Engineering & Technology, Lucknow in 2013 and have been working as full-stack JAVA developer at a MNC since 2013. My area of interest is Secure App development and would like to explore other areas of security such as Blockchain.

Abstract: The massive popularity and nearly 88%global market share of Android devices has made apps more vulnerable to targeted security attacks. Quick Heal Security Labs detected over 1 million Android malware in 2017. The proliferation of fake apps has been one of the biggest mobile security concerns in 2017. In addition, downloading apps from third-party app stores makes it easier for mobile malware writers to attack the Android devices. Most malicious apps can compromise the personal and sensitive information of users. Android security is built on a permission-based mechanism and hence it is very important for users to carefully observe the permissions an App asks. In this internship, I will be working on developing an Android app which will help in characterisation and detection of malicious Apps on the devicebased on permissions.

Bio: I am pursuing M.Tech in specialization Cyber Security from CENTER FOR ADVANCED STUDIES ,AKTU,LUCKNOW. And I have done my B.tech degree in Computer Science Engineering 2016 from Seth Sriniwas Agrawal Institude of Engineering & Technology, Kanpur.

Area of interst

  • Cyber Security
  • Malware Analysis(Static Analysis)
  • Security of Cloud Computing based on Trusted ComputingS

Detection of Malware in Advance Android Apps By using the Static Analysis

Abstract: Since the time Android made its entry into the Smartphone arena, it ruffled quite a few players; even the big ones. At present time, Google Android grips a tight 51.6% of the US market share. The open source nature of Android has made it the most popular mobile platform in the world. And many android malware affected to the android devices so we have detect the malware by detection techniques. Static analysis is preferred the any other techniques because it is safe to affection of the system and Portable Executable (PE) used to feature extraction of malware in the malware analysis. Hence in the project I will  detect the malware by malware features by use of PE files advanced android malware in huge of the data.

Bio: Kumar Shanu Singh obtained B.Tech degree in Computer Science Engineering from the BabuBanarasi Das University at Lucknow and pursuing his M.Tech (specialized Cyber Security) at the Centre for Advanced Studies.

Interested area:

Modified RSA algorithms


Project Working on

Development and implementation of different types of Honeypot and identifying the attacks and attacker’s information.

Also repeating and validating the work done on Honeypot by the previous student of M.Tech in IIT-Kanpur.

Bio- I am doing  M.Tech. with specialization in cyber security from Centre for Advanced Studies, AKTU, LUCKNOW. I have done my B.Tech. degree in Computer Science Engineering from theSheat  College Of  Engineering  and  Management (AKTU), at  Varanasi.

Project- Classification of  malware analysis and preventing the attacks.

Abstract- Malware, or malicious software, is any program or file that is harmful to a computer user. Malware includes computer viruses, worms, Trojan horses and spyware. These malicious programs can perform a variety of functions, including stealing, encrypting or deleting sensitive data, altering or hijacking core computing functions and monitoring users' computer activity without their permission.Ransomware,  for example, is designed to infect a user's system and encrypt the data. Cybercriminals then demand a ransom payment from the victim in exchange for decrypting the system's data.Dynamic or Behavioral analysis is performed by observing the behavior of the malware while it is actually running on a host system. This form of analysis is often performed in a  sandboxenvironment  to prevent the malware from actually infecting production systems; many such sandboxes are virtual systems that can easily be rolled back to a clean state after the analysis is complete. Hence in this work I will use the classification of dynamic  malware  analysis to detect   advanced malware in huge volume of data.

About me

I am ParulGahelot pursuing M.Tech (Specialized cybrsecurity) at center for advanced studies. I have done B.Tech in S.R. institute of management and technology,lucknow and diploma in government polytechnic,Unnao.

Interested area

  • Network security, malware analysis in android smart phones, cyber security.


Analysis of deep packet inspection in advance method of managing and examine packet traffic. Network forensics is use in two ways first related to security second related to law enforcement. Analysis and monitoring computer network traffic for the purpose of legal evidence or intrusion detection.

Bio: I am ARVIND GOUTAM. I belong to LUCKNOW. I have completed bachelor degree in COMPUTER SCIENCE from MAHARANA INSTITUTE OF PROFESSIONAL STUDIES with 60.34%. I did my schooling 12th and 10th from U.P board from my hometown. My final year project is on “ONLINE JOB CONSULTANCY” which is developed on ASP.Net as frontend. 


 Project- Vulnerability Assessment and Penetration Testing.

 My Role and work-

1- Web application development cycle.

2- Practice various webapp based attacks.

3- Security aspect in development cycle.

Abstract-In my internship, I'm working on Vulnerability Assessment and Penetration Testing (Web Application). It is about finding vulnerabilities (flaws) in web application and providing secure code which removes these security flaws. I will be working on various attack vectors like SQL Injection, Cross-Site Request Forgery, Cross-Site Scripting etc and their mitigation techniques. The focus of this training is security aspect in development cycle.

I am Shikha & I am pursuing M .Tech Computer science with specialization in Cyber Security from Centre For Advance Studies (DR. APJ Abdul Kalam Technical University) Lucknow. I begged my B .Tech in computer science from I.I.M.T Engineering College Meerut (GautamBuddh Technical University Lucknow).

My areas of interest are malware analysis, security monitoring tool, cloud security.

Abstract - Despite the significant improvement of security defense mechanisms and their continuous evolution, malware are still spreading and keeping to succeed in pursuing their malicious goals. These advanced malwares may be encrypted, compressed or other-wise obfuscated to evade traditional detection techniques. Static analysis is preferred on the other techniques because it is safe to infect the productive systems and Portable Executable (PE) can be a comprehensive view in analyzing malware. Hence in this work I will use the information inside the PE files to detect advanced malware in huge volume of data.

Bio:Currently, I am doing M. Tech in Cyber Security from Computer Science and Engineering department, Dr. A.P.J. Abdul Kalam Technical University. I have done B.Tech. in Computer Science and Engineering from Uttar Pradesh Technical university, Vira College of Engineering Bijnor (2009-2013). I am working in area of cyber security and also have great interest in Web Vulnerability Assessment and Penetration Testing (WVAPT).

Area of Interest- Network and Information Security, Cryptography.

Project- Deep Packet Inspection (DPI) in Network.

Abstract- Computer networks become larger day by day and connected to the internet is the subject of cyber-attacks. Economic cost of cyber-attack is commercial loss arising from theft of corporate and financial information, reputational damage, and legal consequence of cyber breach. Many forensic tools and strong security measure contribute together to detect those attacks and re-establishing the network. Hence increasing security of the network is much more important. Various Forensic tools are used to capture, filter and inspect packets. In this work, I will use these tools for deep packet Inspection and analysis the malicious traffic on the network.

Bio: I am pursuing M.Tech in Computer Science (with specialization Cyber Security) at the Centre for Advanced Studies, Dr. A.P.J. Abdul Kalam Technical University, Lucknow and I have done B.Tech degree in Computer Science Engineering from Shri Ram MurtiSmarak College of Engineering & Technology at Bareilly.

Area of Interest:  Cyber Security, Malware Analysis & Web VAPT

Title: Detection of loopholes in web application

Vulnerability Assessment and Penetration Testing (VAPT) techniques help them to go looking out security loopholes. These security loopholes could also be utilized by attackers to launch attacks on technical assets. It divides into 3- phases like Web Application Development Cycle, Web Application Security Testing and Web based attacks, Security aspect in Development Cycle. According to the news of OWASP for web applications vulnerability like Broken Authentication & Session Management, Cross-site Scripting (XSS), Insecure Direct Object References. In my work I am doing detection of some loopholes in web application.