developing authentication protocols to track physical objects Digital Fingerprinting of physical objects Crytographic protocols to authenticate objects Side Channel Privacy Leakages Sensor-based privacy leakages Medical IoT connection hijacking
Cryptographic protocols for ML governance Verifiable Auditing for Fairness Decentralised Black-box Auditing of ML models Socio-Technical perception of trust and trustworthiness in ML systems Trustworthy ML technologies Trust perception in various ML-based usecases
Malicious Browser Extensions Protections against malicious browser extensions Man-in-the-Browser attacks Web Tracking and Privacy Enhancing Technologies Tracking in different platforms Privacy leakages in web apps
I am expanding my team for now so keep an eye on any upcoming hiring notifications.