top of page

My primary research area is Computer Networks and Network Security.

More generally, I study Cybersecurity, Distributed Systems, and Network Science and Algorithms.

​

My current research topics are:

  • In-Network Computation with SDN switches,

  • Intrusion Detection and Access Control,

  • Network Mapping and Measurement,

  • Internet Censorship / Anti-Censorship.

 

I am particularly interested in how new tools and problems (such as Machine Learning) interact with these topics.

Selected Publications
 

2023

​​DeeP4R: Deep Packet Inspection in P4 using Packet Recirculation.

S. Gupta, D. Gosain, M. Kwon, H. B. Acharya.

IEEE Conf. on Computer Communications (INFOCOM), 2023.

 

Predictable Internet Clients and In-Switch Deep Packet Inspection.

S. Gupta, D. Gosain, M. Kwon, H. B. Acharya.

International Conference on Computer Communication (ICCCN), 2023.

2021

Simple Deep Packet Inspection with P4

S. Gupta, D. Gosain, G. Grigoryan, M. Kwon, H. B. Acharya.

IEEE 29th International Conference on Network Protocols (ICNP), 2021, 1-2.

​

Telemetron: Measuring Network Capacity Between Off-Path Remote Hosts

D. Gosain, A. Jaiswal, H. B. Acharya, S. Chakravarty.

IEEE 46th Conference on Local Computer Networks (LCN), 2021, 351-354.

2020

SiegeBreaker: An SDN Based Practical Decoy Routing System.

P. K. Sharma, D. Gosain, H. Sagar, C. Kumar, A. Dogra, V. Naik, H. B. Acharya, S. Chakravarty.

(Proceedings of) Privacy Enhancing Technologies (PETS), 2020, (3), 243-263 5.

​

From spanning trees to meshed trees

H. B. Acharya, J. Hamilton, N. Shenoy.

Invited Talk, International Conference on COMmunication Systems & NETworkS (COMSNETS), 2020.

2019

Detecting BGP Route Anomalies with Deep Learning.

K. McGlynn, H. B. Acharya, M. Kwon.

IEEE Conf. on Computer Communications - Workshops (INFOCOM-WKSHPS), 2019.


Policy Expressions and the Bottom-Up Design of Computing Policies. 

R. Reaz, H. B. Acharya, E. S. Elmallah, J. A. Cobb, M. G. Gouda.

Computing, 101, 1307–1326, 2019. 

2017

The Devil’s in The Details: Placing Decoy Routers in the Internet.

D. Gosain, A. Aggarwal, S. Chakravarty, and H. B. Acharya.

Annual Computer Security Applications Conference (ACSAC), 2017.

Mending Wall: On the Implementation of Censorship in India.

D. Gosain, A. Aggarwal, S. Shekhawat, H. B. Acharya and S. Chakravarty.

International Conference on Security & Privacy in Comm. Networks (SECURECOMM), 2017.

(BEST STUDENT PAPER)

Older Work
 

2016

Rules in Play: On the Complexity of Routing Tables and Firewalls,

H. B. Acharya, S. Kumar, M. Wadhwa and A. Shah,

IEEE International Conference on Network Protocols (ICNP), 2016.

2015

Troubleshooting SDN Control Software with Minimal Causal Sequences.

C. Scott, A. Wundsam, A. Panda, B. Raghavan, A. Or, J. Lai, 
E. Huang, Z. Liu,  A. El-Hassany, S. Whitlock, H. B. Acharya, 
K. Zarifis and S. Shenker,
ACM SIGCOMM Computer Communications Review 44(4), 395—406, 2015.


Towards a Practical Infrastructure for Decoy Routing,

S. Chakravarty, V. Naik, H. B. Acharya and C. S. Tanwar, 

Network and Distributed System Security – Workshops (NDSS-WKSHPS), 2015.

2014

On Rule Width and the Unreasonable Effectiveness of Policy Verification,

H. B. Acharya,

IEEE Conference on Local Computer Networks (LCN), 2014. 

2013

The Best Keying Protocol for Sensor Networks

T. Choi, H. B. Acharya and M. G. Gouda, 
Pervasive and Mobile Computing, 9 (4), 564-571, 2013.

2011

Firewall Verification and Redundancy Checking are Equivalent,

H. B. Acharya and M. G. Gouda,

IEEE Conf. on Computer Communications (INFOCOM), 2011.

​

Is That You?: Authentication in a Network without Identities,

T. Choi, H. B. Acharya and M. G. Gouda,

International Journal of Security and Networks (IJSN), 6, 1-5, 2011.

​

TPP: The Two-way Password Protocol,

T. Choi, H. B. Acharya and M. G. Gouda,

International Conference on Computer Communication (ICCCN), 2011.

2010

Projection and Division: Linear-Space Verification of Firewalls,

H. B. Acharya and M. G. Gouda,

IEEE International Conference on Distributed Computing Systems (ICDCS), 2010.


On the Power of Non-Spoofing Adversaries,

H. B. Acharya and M. G. Gouda,

International Symposium on Distributed Computing (DISC), 2010.

bottom of page