APNIC blog published a post titled, ‘Ferret: Automatically finding RFC compliance bugs in DNS nameservers’ based on our NSDI ' 22 paper.
I successfully defended my thesis (hybrid) - reached the final milestone of my PhD journey
It was an honor to have Ryan Beckett, Ravi Netravali, Yuval Tamir, and my advisors Todd Millstein, and George Varghese on my committee!!
Slides: Formal Methods for a Robust Domain Name System
I presented GRoot to the DNS community through the talk, Find Bugs in your DNS Zone files Before Deployment with GRᴏᴏᴛ at DNS-OARC 37 workshop.
I presented my Ph.D. work on how I use formal methods to make the DNS as robust as possible.
I presented our work, “Exploiting Formal Methods To make The Domain Name System More Robust” at Network Verficiation Workshop, happening in conjunction with the 29th IEEE ICNP 2021 conference.
Talk Proposal: Towards a Robust DNS
I am serving on the artifact evaluation committee of the SIGCOMM 2021 conference.
Artifact evaluation ensures that the results claimed in research papers are efficiently and accurately reproducible, facilitating further research. This is only the second year since SIGCOMM started artifact evaluation, so consider submitting the supporting artifacts for your research papers.
Deadlines: 27th January (papers) · 25th May (artifacts)
I presented our ongoing work, “So you think your Nameservers are Correct?” : Finding Errors Automatically in Nameserver Implementations at DNS-OARC 35 workshop.
DNS-OARC Tweet — “Incredible reception from the audience on @SivaKesavaRK presentation. The automation tool received great compliments from the DNS experts”
Tweet from one of the audience — “As usual for DNS-OARC, #OARC35 is packed with interesting, useful DNS stuff. This one sounded impossible before the talk.”
Ferret found a test input that can crash Bind. We reported it confidentially to the Bind security team, which fixed it and released a public disclosure.
Mentions: CVE Tweet
I was a finalist (top 3.5%) of the Facebook PhD fellowship program.
APNIC blog published a post titled, ‘Find bugs in your DNS zone files before deployment’ based on GRoot.
APNIC Tweet — DNS engineers have a new #opensource Guardian to help them catch bugs and prevent DNS-related outages,
LinkedIn — Interesting open source software to proactively identify DNS zone file errors,
APNIC Tweet — Zone file errors are all over the #DNS. With billions of potential queries, how can you check before deployment?,
APNIC Tweet — Bugs are everywhere in #DNS zone files. GRoot roots them out.
I passed the OQE, and have now advanced to candidacy — one more milestone reached!
I am a teaching assistant for the upper-division Computer Network Fundamentals (CS 118) course, taught by my advisor Prof. George Varghese.
I presented my first part of the internship work on DNS as a poster during the Microsoft Research Networking intern postern session event.
I am interning with Ryan Beckett from the MNR group led by Victor Bahl. I am developing the first verification tool using static analysis for proactive and exhaustive checking of the DNS configurations (zone files) for common bugs. I am also working with Karthick Jayaraman on finding misconfigurations in Microsoft data center and WAN router configurations and aiming to submit the work to NSDI 2020 fall deadline.
I passed the WQE — one milestone reached on the journey to my PhD!
I am honored to be the one of the recipients of the Dean’s special fellowship for the 2018-2019 academic year.