Back close

Dr. Jevitha K. P.

Assistant Professor, TIFAC-CORE in Cyber Security, Coimbatore

Qualification: M.Tech.
kp_jevitha@cb.amrita.edu
Jevitha KP's Googler Scholar Profile
Research Interest: Android Security, Computer Networks, Mobile Security, Web & Mobile Application Development, Web Security

Bio

Dr. Jevitha K. P. currently serves as Assistant Professor (Sr. Gd.) at TIFAC-CORE in Cyber Security, Coimbatore. Her areas of research include Web Security, Android Security, Web and Mobile Application Development. She also serves as Assistant Professor at TIFAC-CORE in Cyber Security, Coimbatore Campus.

 

Publications

Journal Article

Year : 2017

Stride based analysis of the chrome browser extensions API

Cite this Research Publication : P. K. Akshay Dev and Jevitha, K. P., “Stride based analysis of the chrome browser extensions API”, Advances in Intelligent Systems and Computing, vol. 516, pp. 169-178, 2017.

Publisher : Advances in Intelligent Systems and Computing

Year : 2017

Prevention of PAC File Based Attack Using DHCP Snooping

Cite this Research Publication : K. R. Atul and Jevitha, K. P., “Prevention of PAC File Based Attack Using DHCP Snooping”, Communications in Computer and Information Science, vol. 746, pp. 195-204, 2017.

Publisher : Communications in Computer and Information Science

Year : 2016

Static analysis of Firefox OS privileged applications to detect permission policy violations

Cite this Research Publication : S. P and Jevitha, K. P., “Static analysis of Firefox OS privileged applications to detect permission policy violations”, International Journal of Control Theory and Applications, vol. 9, no. 7, pp. 3085-3093, 2016.

Publisher : International Journal of Control Theory and Applications, International Science Press, Volume 9, Issue 7, p.3085-3093 .

Year : 2016

An encryption technique to thwart android binder exploits

Cite this Research Publication : Ya Kaladharan, Mateti, Pb, and Jevitha, K. P., “An encryption technique to thwart android binder exploits”, Advances in Intelligent Systems and Computing, vol. 385, pp. 13-21, 2016.

Publisher : Advances in Intelligent Systems and Computing, Springer Verlag.

Year : 2015

An automata based approach for the prevention of NOSQL injections

Cite this Research Publication : S. Joseph and Jevitha, K. P., “An automata based approach for the prevention of NOSQL injections”, Communications in Computer and Information Science, vol. 536, pp. 538-546, 2015.


Publisher : Communications in Computer and Information Science

Year : 2014

Web Services Attacks and Security- A Systematic Literature Review

Cite this Research Publication : V. R. Mouli and Jevitha, K. P., “Web Services Attacks and Security- A Systematic Literature Review”, Procedia Computer Science, vol. 93, pp. 870-877, 2014.

Publisher : Procedia Computer Science, Elsevier.

Conference Paper

Year : 2019

Runtime Verification and Vulnerability Testing of Smart Contracts

Cite this Research Publication : M. Abraham and Jevitha, K. P., “Runtime Verification and Vulnerability Testing of Smart Contracts”, in Advances in Computing and Data Sciences, Singapore, 2019, vol. 1046, pp. 333-342.

Publisher : Advances in Computing and Data Sciences, Springer Singapore

Year : 2018

Verification of OAuth 2.0 Using UPPAAL

Cite this Research Publication : K. S. Jayasri, Jevitha, K. P., and Jayaraman, B., “Verification of OAuth 2.0 Using UPPAAL”, in Social Transformation – Digital Way, Singapore, 2018, vol. 836, pp. 58-67.

Publisher : Social Transformation – Digital Way, Springer Singapore, Volume 836, Singapore

Year : 2017

CBEAT: Chrome Browser Extension Analysis Tool

Cite this Research Publication : S. Singha Roy and Jevitha, K. P., “CBEAT: Chrome Browser Extension Analysis Tool”, in Security in Computing and Communications, Singapore, 2017, vol. 746, pp. 364-378.

Publisher : Security in Computing and Communications, Springer Singapore.

Conference Proceedings

Year : 2014

Prediction of Cross-Site Scripting Attack Using Machine Learning Algorithms

Cite this Research Publication : K. P. Jevitha and Vishnu, B. A., “Prediction of Cross-Site Scripting Attack Using Machine Learning Algorithms”, Proceedings of the 2014 International Conference on Interdisciplinary Advances in Applied Computing ICONIAAC '14 , 55 vol. ACM, New York, NY, USA, 2014.

Publisher : Proceedings of the 2014 International Conference on Interdisciplinary Advances in Applied Computing ICONIAAC '14

Book Chapter

Year : 2016

A Systematic Review of Security Measures for Web Browser Extension Vulnerabilities

Cite this Research Publication : J. Arunagiri, Rakhi, S., and Jevitha, K. P., “A Systematic Review of Security Measures for Web Browser Extension Vulnerabilities”, in Proceedings of the International Conference on Soft Computing Systems: ICSCS 2015, , vol. 2, P. L. Suresh and Panigrahi, K. Bijaya, Eds. New Delhi: Springer India, 2016, pp. 99–112.

Publisher : Proceedings of the International Conference on Soft Computing Systems: ICSCS 2015, , Springer India.

Year : 2016

Evaluating the Effectiveness of Conventional Fixes for SQL Injection Vulnerability

Cite this Research Publication : S. Joseph and Jevitha, K. P., “Evaluating the Effectiveness of Conventional Fixes for SQL Injection Vulnerability”, in Proceedings of 3rd International Conference on Advanced Computing, Networking and Informatics: ICACNI 2015, Volume 2, A. Nagar, Mohapatra, P. Durga, and Chaki, N., Eds. New Delhi: Springer India, 2016, pp. 417–426.

Publisher : Proceedings of 3rd International Conference on Advanced Computing, Networking and Informatics: ICACNI 2015.

Year : 2009

Security-aware Software Development Life Cycle (SaSDLC) – Processes and tools

Cite this Research Publication : A. K. Talukder, Maurya, V. K., Santhosh, B. G., Jangam, E., Muni, S. V., Jevitha, K. P., Saurabh, S., and Pais, A. R., “Security-aware Software Development Life Cycle (SaSDLC) - Processes and tools”, in International Conference on Wireless and Optical Communications Networks IFIP , 2009, pp. 1- 5.

Publisher : International Conference on Wireless and Optical Communications Networks IFIP

Patents

Year : 2014

Transparent system for mitigating web vulnerabilities and method thereof

Cite this Research Publication : K. P. Jevitha and Rajeev, M., “Transparent system for mitigating web vulnerabilities and method thereof, Application No. 106/CHE/2014, Filed on January 9”, 2014.

Admissions Apply Now