Back close
Jevitha-K-P_asst-professor_cse_engineering_amritauniversity_coimbatore

Dr. Jevitha K. P.

Assistant Professor (Sr. Gd.), TIFAC-CORE in Cyber Security, School of Engineering, Coimbatore

Qualification: B.E., M.Tech., Ph.D
kp_jevitha@cb.amrita.edu
Orcid Profile
Google Scholar Profile
Scopus Author ID
Research Interest: Runtime Verification, Formal Methods, Web and Mobile Application Security, Blockchain and Secure Coding.

Bio

Dr. Jevitha K. P. is an Assistant Professor (Senior Grade) at TIFAC-CORE in Cyber Security, Coimbatore. She brings over 15 years of research and teaching experience in Computer Science and Cyber Security from her tenure at Amrita Vishwa Vidyapeetham, along with more than three years of experience in IT industry. Dr. Jevitha has a granted patent and has published more than 20 papers in reputable journals and conference proceedings. Her research interests encompass Runtime Verification, Formal Methods, Web and Mobile Application Security, and Secure Coding.

 

Publications

Journal Article

Year : 2024

Runtime verification on abstract finite state models

Cite this Research Publication : K.P. Jevitha, Bharat Jayaraman, M. Sethumadhavan, Runtime verification on abstract finite state models, Journal of Systems and Software, 2024.

Year : 2023

Security Analysis of OAuth 2.0 Implementation

Cite this Research Publication : Swarag Sharma, Jevitha KP, Security Analysis of OAuth 2.0 Implementation, 2023 Innovations in Power and Advanced Computing Technologies (i-PACT), 2023.

Publisher : IEEE

Year : 2020

Finite-state model extraction and visualization from Java program execution

Cite this Research Publication : K.P. Jevitha, J. Swaminathan, B. Jayaraman, M. Sethumadhavan, “Finite-state model extraction and visualization from Java program execution”, Software: Practice and Experience, vol. 51, pp. 409-437, 2021. DOI: https://doi.org/10.1002/spe.2910

Publisher : Wiley

Year : 2017

Stride based analysis of the chrome browser extensions API

Cite this Research Publication : P. K. Akshay Dev and Jevitha, K. P., “Stride based analysis of the chrome browser extensions API”, Advances in Intelligent Systems and Computing, vol. 516, pp. 169-178, 2017.

Publisher : Advances in Intelligent Systems and Computing

Year : 2017

Prevention of PAC File Based Attack Using DHCP Snooping

Cite this Research Publication : K. R. Atul and Jevitha, K. P., “Prevention of PAC File Based Attack Using DHCP Snooping”, Communications in Computer and Information Science, vol. 746, pp. 195-204, 2017.

Publisher : Communications in Computer and Information Science

Year : 2016

Static analysis of Firefox OS privileged applications to detect permission policy violations

Cite this Research Publication : S. P and Jevitha, K. P., “Static analysis of Firefox OS privileged applications to detect permission policy violations”, International Journal of Control Theory and Applications, vol. 9, no. 7, pp. 3085-3093, 2016.

Publisher : International Journal of Control Theory and Applications, International Science Press, Volume 9, Issue 7, p.3085-3093 .

Year : 2016

An encryption technique to thwart android binder exploits

Cite this Research Publication : Ya Kaladharan, Mateti, Pb, and Jevitha, K. P., “An encryption technique to thwart android binder exploits”, Advances in Intelligent Systems and Computing, vol. 385, pp. 13-21, 2016.

Publisher : Advances in Intelligent Systems and Computing, Springer Verlag.

Year : 2015

An automata based approach for the prevention of NOSQL injections

Cite this Research Publication : S. Joseph and Jevitha, K. P., “An automata based approach for the prevention of NOSQL injections”, Communications in Computer and Information Science, vol. 536, pp. 538-546, 2015.


Publisher : Communications in Computer and Information Science

Year : 2014

Web Services Attacks and Security- A Systematic Literature Review

Cite this Research Publication : V. R. Mouli and Jevitha, K. P., “Web Services Attacks and Security- A Systematic Literature Review”, Procedia Computer Science, vol. 93, pp. 870-877, 2014.

Publisher : Procedia Computer Science, Elsevier.

Conference Paper

Year : 2019

Runtime Verification and Vulnerability Testing of Smart Contracts

Cite this Research Publication : M. Abraham and Jevitha, K. P., “Runtime Verification and Vulnerability Testing of Smart Contracts”, in Advances in Computing and Data Sciences, Singapore, 2019, vol. 1046, pp. 333-342.

Publisher : Advances in Computing and Data Sciences, Springer Singapore

Year : 2018

Verification of OAuth 2.0 Using UPPAAL

Cite this Research Publication : K. S. Jayasri, Jevitha, K. P., and Jayaraman, B., “Verification of OAuth 2.0 Using UPPAAL”, in Social Transformation – Digital Way, Singapore, 2018, vol. 836, pp. 58-67.

Publisher : Social Transformation – Digital Way, Springer Singapore, Volume 836, Singapore

Year : 2017

CBEAT: Chrome Browser Extension Analysis Tool

Cite this Research Publication : S. Singha Roy and Jevitha, K. P., “CBEAT: Chrome Browser Extension Analysis Tool”, in Security in Computing and Communications, Singapore, 2017, vol. 746, pp. 364-378.

Publisher : Security in Computing and Communications, Springer Singapore.

Conference Proceedings

Year : 2014

Prediction of Cross-Site Scripting Attack Using Machine Learning Algorithms

Cite this Research Publication : K. P. Jevitha and Vishnu, B. A., “Prediction of Cross-Site Scripting Attack Using Machine Learning Algorithms”, Proceedings of the 2014 International Conference on Interdisciplinary Advances in Applied Computing ICONIAAC '14 , 55 vol. ACM, New York, NY, USA, 2014.

Publisher : Proceedings of the 2014 International Conference on Interdisciplinary Advances in Applied Computing ICONIAAC '14

Book Chapter

Year : 2022

Password Generation Based on Song Lyrics and Its Management

Cite this Research Publication : ai Kishan, E., Hemchudaesh, M., Gowri Shankar, B., Sai Brahadeesh, B., Jevitha, K.P. (2022). Password Generation Based on Song Lyrics and Its Management. In: Singh, M., Tyagi, V., Gupta, P.K., Flusser, J., Ören, T. (eds) Advances in Computing and Data Sciences. ICACDS 2022. Communications in Computer and Information Science, vol 1614. Springer, 2022.

Year : 2022

Run-time Control Flow Model Extraction of Java Applications

Cite this Research Publication : Gokul Saravanan, Goutham Subramani, P. N. S. S. Akshay, Nithesh Kanigolla & K. P. Jevitha, Run-time Control Flow Model Extraction of Java Applications, Emerging Research in Computing, Information, Communication and Applications, 2022.

Year : 2021

Formal Analysis of OpenID Connect Protocol Using Tamarin Prover

Cite this Research Publication : Naresh, S., Jevitha, K.P, Formal Analysis of OpenID Connect Protocol Using Tamarin Prover, In: Sengodan, T., Murugappan, M., Misra, S. (eds) Advances in Electrical and Computer Technologies. ICAECT 2020. Lecture Notes in Electrical Engineering, vol 711. Springer, Singapore.

Publisher : Springer

Year : 2016

A Systematic Review of Security Measures for Web Browser Extension Vulnerabilities

Cite this Research Publication : J. Arunagiri, Rakhi, S., and Jevitha, K. P., “A Systematic Review of Security Measures for Web Browser Extension Vulnerabilities”, in Proceedings of the International Conference on Soft Computing Systems: ICSCS 2015, , vol. 2, P. L. Suresh and Panigrahi, K. Bijaya, Eds. New Delhi: Springer India, 2016, pp. 99–112.

Publisher : Proceedings of the International Conference on Soft Computing Systems: ICSCS 2015, , Springer India.

Year : 2016

Evaluating the Effectiveness of Conventional Fixes for SQL Injection Vulnerability

Cite this Research Publication : S. Joseph and Jevitha, K. P., “Evaluating the Effectiveness of Conventional Fixes for SQL Injection Vulnerability”, in Proceedings of 3rd International Conference on Advanced Computing, Networking and Informatics: ICACNI 2015, Volume 2, A. Nagar, Mohapatra, P. Durga, and Chaki, N., Eds. New Delhi: Springer India, 2016, pp. 417–426.

Publisher : Proceedings of 3rd International Conference on Advanced Computing, Networking and Informatics: ICACNI 2015.

Year : 2009

Security-aware Software Development Life Cycle (SaSDLC) – Processes and tools

Cite this Research Publication : A. K. Talukder, Maurya, V. K., Santhosh, B. G., Jangam, E., Muni, S. V., Jevitha, K. P., Saurabh, S., and Pais, A. R., “Security-aware Software Development Life Cycle (SaSDLC) - Processes and tools”, in International Conference on Wireless and Optical Communications Networks IFIP , 2009, pp. 1- 5.

Publisher : International Conference on Wireless and Optical Communications Networks IFIP

Patents

Year : 2023

Transparent system for mitigating web vulnerabilities and method thereof

Cite this Research Publication : K. P. Jevitha and Rajeev, M., “Transparent system for mitigating web vulnerabilities and method thereof, Patent No. 489807, granted on December 27, 2023”.

FDP / Workshops

FDP/Workshops Organized: 

  • Co-ordinator of “Workshop on Formal Methods for Systems” conducted at Amrita Vishwa Vidyapeetham, Coimbatore during 14-19, August 2017.
  • Co-ordinator of “Faculty Development Program on Android Application Development” conducted by Google at Amrita Vishwa Vidyapeetham, Coimbatore during Nov 1-5, 2016.
  • Co-ordinator of “Hands-on Workshop on Android Security” conducted at Amrita Vishwa Vidyapeetham, Coimbatore during December 18-19, 2014.

FDP/Workshops Participated:

  • Participated and completed AICTE Training And Learning (ATAL) Academy Faculty Development Program on “Supercomputing (High-Performance Computing, AI, Quantum Computing)” at Amrita Vishwa Vidyapeetham, Coimbatore from 17 February 2025 to 22 February 2025.
  • Participated in Microsoft India & SAP India led online Faculty Development Program on “Applied AI: Practical Implementations” under TechSaksham Program (AICTE) from 23 December 2024 – 28 December 2024.
  • Participated in online Faculty Development Program conducted by IIT Patna on “A Proof and Refinement based Development for Cyber-Physical Systems” from 20 June 2022 – 1 July 2022.
  • Attended 5-day online FDP on “Inculcating Universal Human Values in Technical Education” organized by All India Council for Technical Education(AICTE) from1 February, 2021 to 5 February, 2021.
  • Participated in “Android Development with Kotlin” Train-the-Trainer online workshop conducted by Google from 7th December 2020 – 12th December 2020.
  • Attended “5-day Advanced Android Development Training and Design Thinking Workshop” conducted at Google, Bangalore from April 24-28, 2018.
  • Attended “Workshop on Blockchain Technologies” conducted at Amrita Vishwa Vidyapeetham, Coimbatore from March 15 – 17, 2018.
  • Attended a Faculty Development Program on “Android Application Development” conducted by Department of Computer Science and Engineering, Amrita Vishwa Vidyapeetham, Coimbatore from 1 November 2016 – 5 November 2016.
  • Participated in IBM Career Education Enablement Program on “Big Data Analytics for Business Analysts” from 28-31 January 2016 – 31 January 2016.
  • Participated in Faculty Enablement Program on “Big Data and Analytics” conducted by Infosys Limited, Bangalore from 10 August 2015 – 14 August 2015.
  • Attended “National Workshop/Conference on Formal methods” conducted at Indian Institute of Science, Bangalore during October 15 – 17, 2014.
Invited Talks
  • Invited talk on “Formal Modeling with UPPAAL” in 2nd Symposium on Application of formal methods for Safety and Security of Critical Systems conducted at Amrita Vishwa Vidyapeetham, Amritapuri during February 26-28 2018.
  • Resource person in TEQIP II Sponsored One Week Faculty Development Program on Cyber Security at Government College of Technology, Coimbatore for a lecture on “Web Application Security” on 19 March 2017.
Awards
  • Recognized as “Bronze” partner faculty under Infosys Inspire- The Campus Connect Faculty Partnership Model, 2017.
  • Received certificate of appreciation from Cisco for guidance and successful project delivery on “Gamified Learning using Unity” incorporating Agile processes and practices, 2016.
  • Recognized as “Silver” partner faculty under Infosys Inspire- The Campus Connect Faculty Partnership Model, 2015.
Admissions Apply Now