Picture of Sid Rao

Sid Rao

Espoo, Finland
Security Researcher

Education

Doctoral Degree:

  • Doctor of Science (D.Sc/ Ph.D): Aalto University, Finland.(Expected in 2020)

Master's degrees: Erasmus Mundus NordSecMob Joint Master's program (2013- 2015)

  • Master of Science (Technology), Security and Mobile Computing , Aalto University, Finland.

  • Master of Science in Engineering (Cryptography) , University of Tartu, Estonia.

 

Research Interests

  • Cryptography
  • Network Security
  • Privacy

Selected Articles and Publications

  • Rao, S.P., Holtmanns, S. and Aura, T., 2020. Threat modeling framework for mobile communication systems. arXiv preprint arXiv:2005.05110. [Under Submission]
  • Bui, T., Rao, S.P, Antikainen, M. and Aura, T., 2020, October. XSS Vulnerabilities in Cloud-Application Add-Ons. In 15th ACM ASIA Conference on Computer and Communications Security (AsiaCCS 2020). [To appear].
  • Bui, T., Rao, S.P, Antikainen, M. and Aura, T., 2019, November. Client-Side Vulnerabilities in Commercial VPNs. In Nordic Conference on Secure IT Systems (pp. 103-119). Springer, Cham.
  • Bui, T., Rao, S.P., Antikainen, M. and Aura, T., 2019, March. Pitfalls of open architecture: How friends can exploit your cryptocurrency wallet. In Proceedings of the 12th European Workshop on Systems Security (pp. 1-6).
  • Bui, T., Rao, S.P., Antikainen, M., Bojan, V.M. and Aura, T., 2018. Man-in-the-machine: exploiting ill-secured communication inside the computer. In 27th {USENIX} Security Symposium ({USENIX} Security 18) (pp. 1511-1525).
  • Holtmanns, S., Rao, S.P. and Oliver, I., 2016, May. User location tracking attacks for LTE networks using interworking functionality. In 2016 IFIP Networking Conference (IFIP Networking) and workshops (pp. 315-322). IEEE.
  • Rao, S.P., Kotte, B.T. and Holtmanns, S., 2016, June. Privacy in LTE networks. In Proceedings of the 9th EAI International Conference on Mobile Multimedia Communications (pp. 176-183).
  • Rao, S.P., Oliver, I., Holtmanns, S. and Aura, T., 2016, May. We know where you are!. In 2016 8th International Conference on Cyber Conflict (CyCon) (pp. 277-293). IEEE.
  • Rao, S.P., Holtmanns, S., Oliver, I. and Aura, T., 2015, August. Unblocking stolen mobile devices using SS7-MAP vulnerabilities: Exploiting the relationship between IMEI and IMSI for EIR access. In 2015 IEEE Trustcom/ BigDataSE /ISPA (Vol. 1, pp. 1171-1176). IEEE.
Contact