-
Notifications
You must be signed in to change notification settings - Fork 0
/
index.html
140 lines (139 loc) · 11.3 KB
/
index.html
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head lang="en">
<meta http-equiv="Content-Type" content="text/html; charset=UTF-8" />
<link href='style.css' rel='stylesheet' />
<title>Khilan Gudka</title>
</head>
<body>
<div id="content">
<img id="headshot" src="images/headshot.jpg" alt="Headshot" />
<h1>Khilan Gudka</h1>
<p>
I am a Security Software Engineer at <a href="https://www.hudsonrivertrading.com">Hudson River Trading</a>.
</p>
<p>
Previously, I was a Security Software Engineer at <a href="https://www.gresearch.co.uk">G-Research</a>.
</p>
<p>
Before moving into industry, I spent seven years in academia as a Research Associate (postdoc) in the <a href="http://www.cl.cam.ac.uk/research/security/">Security Group</a> at the <a href="http://www.cl.cam.ac.uk">University of Cambridge Computer Laboratory</a> supervised by <a href="http://www.cl.cam.ac.uk/~rnw24/">Dr. Robert N. M. Watson</a>. During this time, I led work on the <a href="http://www.cl.cam.ac.uk/research/security/ctsrd/soaap/">SOAAP</a> project, which explored semi-automated techniques, grounded in static analysis, dynamic analysis, and program transformation, to improve the developer experience when compartmentalising applications. Moreover, it aimed to provide better understanding of the security, performance and complexity tradeoffs of different compartmentalisation strategies. I also led work investigating the use of <a href="http://www.cl.cam.ac.uk/research/security/ctsrd/cheri/">CHERI</a> to protect C++ applications, such as web browsers.
</p>
<p>
Prior to my postdoc, I completed a PhD at the <a href="http://www.doc.ic.ac.uk">Department of Computing</a>, <a href="http://www.ic.ac.uk">Imperial College London</a> supervised by <a href="http://www.doc.ic.ac.uk/~susan/">Professor Susan Eisenbach</a> and <a href="http://www.doc.ic.ac.uk/~scd/">Professor Sophia Drossopoulou</a>. My thesis explored the technique of lock inference for implementing atomic sections. This technique infers a set of locks for each atomic section, while attempting to balance the requirements of maximal concurrency, minimal locking overhead and freedom from deadlock. I focused on lock-inference techniques for tackling large Java programs making use of mature libraries. My research was generously funded by <a href="https://www.microsoft.com/en-us/research/lab/microsoft-research-cambridge/">Microsoft Research Cambridge</a> as part of their PhD Scholarship programme. My mentor at Microsoft was <a href="https://timharris.uk/">Dr. Tim Harris</a>.
</p>
<p>
<i>Email:</i> [firstname]@khilan.com<br/>
<i>Profiles:</i> <a href="https://scholar.google.co.uk/citations?user=Q_DlSkgAAAAJ">Google Scholar</a>, <a href="https://www.linkedin.com/in/khilangudka">LinkedIn</a>
</p>
<h2>Research interests</h2>
<p>
Security, Program Analysis, Compilers, Concurrency
</p>
<h2>Publications</h2>
<div id="pubs">
<ul>
<li><a href="https://www.cl.cam.ac.uk/research/security/ctsrd/pdfs/2020oakland-cornucopia.pdf"><b>Cornucopia: Temporal Safety for CHERI Heaps</b></a><br/>
Nathaniel Wesley Filardo, Brett F. Gutstein, Jonathan Woodruff, Sam Ainsworth, Lucian Paul-Trifu, Brooks Davis, Hongyan Xia, Edward Tomasz Napierala, Alexander Richardson, John Baldwin, David Chisnall, Jessica Clarke, <b>Khilan Gudka</b>, Alexandre Joannou, A. Theodore Markettos, Alfredo Mazzinghi, Robert M. Norton, Michael Roe, Peter Sewell, Stacey Son, Timothy M. Jones, Simon W. Moore, Peter G. Neumann, and Robert N. M. Watson<br />
<i>IEEE Symposium on Security and Privacy (IEEE S&P 2020), May 2020</i>
<li><a href="https://www.cl.cam.ac.uk/research/security/ctsrd/pdfs/2019tc-cheri-concentrate.pdf"><b>CHERI Concentrate: Practical Compressed Capabilities</b></a><br/>
Jonathan Woodruff, Alexandre Joannou, Hongyan Xia, Anthony Fox, Robert Norton, Thomas Bauereiss, David Chisnall, Brooks Davis, <b>Khilan Gudka</b>, Nathaniel W. Filardo, A. Theodore Markettos, Michael Roe, Peter G. Neumann, Robert N. M. Watson, Simon W. Moore<br/>
<i>IEEE Transactions on Computers 2019, October 2019</i>
<li><a href="https://www.cl.cam.ac.uk/research/security/ctsrd/pdfs/201904-asplos-cheriabi.pdf"><b>CheriABI: Enforcing Valid Pointer Provenance and Minimizing Pointer Privilege in the POSIX C Run-time Environment</b></a><br/>
Brooks Davis, Robert N. M. Watson, Alexander Richardson, Peter G. Neumann, Simon W. Moore, John Baldwin, David Chisnall, James Clarke, Nathaniel Wesley Filardo, <b>Khilan Gudka</b>, Alexandre Joannou, Ben Laurie, A. Theodore Markettos, J. Edward Maste, Alfredo Mazzinghi, Edward Tomasz Napierala, Robert M. Norton, Michael Roe, Peter Sewell, Stacey Son, and Jonathan Woodruff.<br/>
<i>ASPLOS 2019, April 2019</i>
<li><a href="https://www.cl.cam.ac.uk/research/security/ctsrd/pdfs/201810-iccd2018-cheri-rtos.pdf"><b>CheriRTOS: A Capability Model for Embedded Devices</b></a><br/>
Hongyan Xia, Jonathan Woodruff, Hadrien Barral, Lawrence Esswood, Alexandre Joannou, Robert Kovacsics, David Chisnall, Michael Roe, Brooks Davis, Edward Napierala, John Baldwin, <b>Khilan Gudka</b>, Peter G. Neumann, Alex Richardson, Simon W. Moore, and Robert N. M. Watson.<br/>
<i>ICCD 2018, October 2018</i>
</li>
<li>
<a href="http://www.cl.cam.ac.uk/research/security/ctsrd/pdfs/201711-iccd2017-efficient-tags.pdf"><b>Efficient Tagged Memory</b></a><br/>
Alexandre Joannou, Jonathan Woodruff, Robert Kovacsics, Simon. W. Moore, Alex Bradbury, Hongyan Xia, Robert N. M. Watson, David Chisnall, Michael Roe, Brooks Davis, Edward Napierala, John Baldwin, <b>Khilan Gudka</b>, Peter G. Neumann, Alfredo Mazzinghi, Alex Richardson, Stacey Son and A. Theodore Markettos.<br/>
<i>ICCD 2017, November 2017</i>
</li>
<li>
<a href="http://www.cl.cam.ac.uk/research/security/ctsrd/pdfs/201704-asplos-cherijni.pdf"><b>CHERI JNI: Sinking the Java security model into the C</b></a><br/>
David Chisnall, Brooks Davis, <b>Khilan Gudka</b>, David Brazdil, Alexandre Joannouand, Jonathan Woodruff, A. Theodore Markettos, J. Edward Maste, Robert Norton, Stacey Son, Michael Roe, Simon W. Moore, Peter G. Neumann, Ben Laurie, and Robert N. M. Watson<br/>
<i>ASPLOS 2017, April 2017</i>
</li>
<li>
<a href="http://www.cl.cam.ac.uk/research/security/ctsrd/pdfs/20160728micro-journal-cheri-final.pdf"><b>Fast Protection-Domain Crossing in the CHERI Capability-System Architecture</b></a><br/>
Robert N. M. Watson, Robert M. Norton, Jon Woodruff, Simon W. Moore, Peter G. Neumann, Jon Anderson, David Chisnall, Brooks Davis, Ben. Laurie, Michael Roe, Nirav H. Dave, <b>Khilan Gudka</b>, Alexandre Joannou, A. Theodore Markettos, J. Edward Maste, Steven J. Murdoch, Colin Rothwell, Stacey D. Son and Munraj Vadera. Fast Protection-Domain Crossing in the CHERI Capability-System Architecture.<br/>
<i>IEEE Micro 36, 5 (2016), 38–49.</i>
</li>
<li>
<a href="pubs/2015ccs-soaap.pdf"><b>Clean Application Compartmentalization with SOAAP</b></a> (<a href="talks/20151014-ccs-soaap.pdf">Slides</a>)<br/>
<b>Khilan Gudka</b>, Robert N. M. Watson, Jonathan Anderson, David Chisnall, Brooks Davis, Ben Laurie, Ilias Marinos, Peter G. Neumann, and Alex Richardson<br/>
<i>ACM CCS 2015, October 2015</i>
</li>
<li>
<a href="pubs/201505-oakland2015-cheri-compartmentalization.pdf"><b>CHERI: A Hybrid Capability-System Architecture for Scalable Software Compartmentalization</b></a><br/>
Robert N. M. Watson, Jonathan Woodruff, Peter G. Neumann, Simon W. Moore, Jonathan Anderson, David Chisnall, Nirav Dave, Brooks Davis, <b>Khilan Gudka</b>, Ben Laurie, Steven J. Murdoch, Robert Norton, Michael Roe, Stacey Son, and Munraj Vadera<br/>
<i>IEEE Symposium on Security and Privacy (IEEE S&P 2015), May 2015</i>
</li>
<li>
<a href="pubs/201404-eurosys2014-tesla.pdf"><b>TESLA: Temporally Enhanced System Logic Assertions</b></a><br />
Jonathan Anderson, Robert N. M. Watson, David Chisnall, <b>Khilan Gudka</b>, Brooks Davis, Ilias Marinos<br />
<i>EuroSys 2014, April 2014</i>
</li>
<li>
<a href="pubs/2013spw-compartmentalisation.pdf"><b>Towards a Theory of Application Compartmentalisation</b></a><br />
Robert N. M. Watson, Steven J. Murdoch, <b>Khilan Gudka</b>, Jonathan Anderson, Peter G. Neumann, Ben Laurie<br />
<i>Security Protocols Workshop, March 2013</i>
</li>
<li>
<a href="pubs/khilan-phd-thesis.pdf"><b>Lock Inference for Java</b></a> (<a href="ic/phd-viva-slides.pdf">Slides</a>)<br />
<b>Khilan Gudka</b><br />
<i>PhD Thesis, Imperial College London, December 2012</i><br/>
<i>(Nominated for the BCS Distinguished Dissertation award)</i>
</li>
<li>
<a href="pubs/2012ahans-soaap.pdf"><b>Exploring Compartmentalisation Hypotheses with SOAAP</b></a> (<a href="talks/20120914-ahans-soaap.pdf">Slides</a>)<br />
<b>Khilan Gudka</b>, Robert N. M. Watson, Steven Hand, Ben Laurie, Anil Madhavapeddy<br />
<i>Workshop on Adaptive Host and Network Security (AHANS 2012), September 2012</i>
</li>
<li>
<a href="pubs/2012ecoop-lockinference.pdf"><b>Lock Inference in the Presence of Large Libraries</b></a> (<a href="ic/ecoop2012-slides.pdf">Slides</a>)<br/>
<b>Khilan Gudka</b>, Tim Harris, Susan Eisenbach<br/>
<i>ECOOP 2012, June 2012</i>
</li>
<li>
<a href="pubs/ec2-fastlocks.pdf"><b>Fast Multi-Level Locks for Java: A Preliminary Performance Evaluation</b></a> (<a href="ic/ec2-multilocks-slides.pdf">Slides</a>)<br/>
<b>Khilan Gudka</b>, Susan Eisenbach<br/>
<i>EC<sup>2</sup> 2010: Workshop on Exploiting Concurrency Efficiently and Correctly, July 2010</i>
</li>
<li>
<a href="pubs/keep-off-grass-atomicity.pdf"><b>Keep Off The Grass: Locking the Right Path for Atomicity</b></a> (<a href="ic/cc08-slides.pdf">Slides</a>)<br/>
David Cunningham, <b>Khilan Gudka</b>, Susan Eisenbach<br/>
<i>Compiler Construction 2008, October 2008</i>
</li>
</ul>
<h2>Talks</h2>
<ul>
<li>
<a href="talks/20190113-prisc-cheri-cxx.pdf"><b>Protecting C++ programs with CHERI</b></a><br/>
<b>Khilan Gudka</b>, Alexander Richardson, Robert N. M. Watson<br/>
<i>Principles of Secure Compilation (PriSC 2019), January 2019</i>
</li>
</ul>
<h2>Posters</h2>
<ul>
<li>
<a href="ic/posters/msrsummer09.pdf"><b>Improving the Performance of Atomic Sections</b></a><br/>
<i>Microsoft Research Cambridge Summer School 2009</i>
</li>
</ul>
<h2>Reports</h2>
<ul class="pubslist">
<li>
<a href="ic/unpublished/transfer.pdf"><b>Improving the Performance of Atomic Sections</b></a> (<a href="ic/unpublished/transfer-slides.pdf">Slides</a>)<br/>
<i>PhD Transfer Report, September 2009</i>
</li>
<li>
<a href="ic/unpublished/finalreport.pdf"><b>Implementing Atomic Sections Using Lock Inference</b></a> (<a href="ic/unpublished/outsourcingreport.pdf">Outsourcing</a>) (<a href="http://www.imperial.ac.uk/computing/current-students/project-info/ug-prizes/archive/">Distinguished Project</a>)<br/>
<i>MEng Final Year Project, June 2007</i>
</li>
</ul>
</div>
</div>
</body>
</html>