H.B. Acharya Headshot

H.B. Acharya

Assistant Professor
Department of Computing Security
Golisano College of Computing and Information Sciences

585-475-2801
Office Location
Office Mailing Address
152 Lomb Memorial Drive Rochester, NY 14623

H.B. Acharya

Assistant Professor
Department of Computing Security
Golisano College of Computing and Information Sciences

Education

B.Tech., Indian Institute of Technology; Ph.D., University of Texas at Austin

Bio

H. B. Acharya (Ph.D. in Computer Science, University of Texas at Austin) 
 

H. B. is interested in second-order effects, such as what happens when we tighten network controls in the name of Security. An insecure Internet leads to insecure systems; but even a secure Internet is not as trustworthy as one might think. (Who watches the watchmen? - we have seen bad behavior from governments, ISPs, Facebook ...) And even in terms of basic security, we may expect a flood of new attacks, with the rise of the Internet of Things.

585-475-2801

Currently Teaching

CSEC-462
3 Credits
This course investigates the many facets of network security and forensics. Students will examine the areas of intrusion detection, evidence collection, network auditing, network security policy design and implementation as well as preparation for and defense against attacks. The issues and facilities available to both the intruder and data network administrator will be examined and evaluated with appropriate laboratory exercises to illustrate their effect.
CSEC-599
1 - 6 Credits
Students will work with a supervising faculty member on a project of mutual interest. Project design and evaluation will be determined through discussion with the supervising faculty member and documented through completion of an independent study form to be filed with the department of computing security.
CSEC-490
3 Credits
This is a capstone course for students in the information security and forensics program. Students will apply knowledge and skills learned and work on real world projects in various areas of computing security. Projects may require performing security analysis of systems, networks, and software, etc., devising and implementing security solutions in real world applications.

Select Scholarship

Published Conference Proceedings
Acharya, H. B., et al. "The Devil’s in The Details: Placing Decoy Routers in the Internet." Proceedings of the Annual Computer Security Applications Conference (ACSAC), Florida 2017. Ed. David Balenson, Juan Caballero, Jeremy Epstein. Orlando, FL: ACSAC, 2017. Print.
Acharya, H. B., Devashish Gosain, and Sambuddho Chakravarty. "Few Throats to Choke: On the Current Structure of the Internet." Proceedings of the IEEE Local Computer Networks Conference, Singapore 2017. Ed. Jens Tolle, Kemal Akkaya, and Soumaya Cherkaoui. Singapore, Singapore: IEEE, 2017. Print.
Acharya, H. B., et al. "Mending Wall: On the Implementation of Censorship in India." Proceedings of the EAI International Conference on Security and Privacy in Communication Networks, Niagara Falls 2017. Ed. Imrich Chlamtac and Guofei Gu. Niagara Falls, Ontario: EAI/Springer, 2017. Web.