Name Dr. Deepti Vidhyarthi
DesignationAssistant Professor
Highest Qualification P.hD.
Total Citations117
Office Tel No. 02024304131
Mobile 02024304131
Home page

(Brief Description / Abstract) :

Dr. Deepti Vidyarthi has been with the Department of Computer Science and Engineering, Defence Institute of Advanced Technology, as an Assistant Professor since 2011.  She received her B.E. degree in Information Technology from the University of Pune, Pune, India, in 2005, M.Tech. degree in Computer Science and Engineering from the Indian Institute of Technology Kanpur, India, in 2010 and Ph.D. in Computer Science and Engineering from the Defence Institute of Advanced Technology, Pune, India in 2020. Her current research interests include reverse engineering, program analysis and verification, malware analysis and operating system security. Her interests extend from Information Technology to Indian Vaidik Philosophy


  • 2020 - Ph.D in Computer Science & Engineering, DIAT Pune. Thesis Title: Malware Detection and Characterization based on Intent and Impact.

  • 2010 - M.Tech Computer Science & Engineering, IIT Kanpur. Thesis Title: Static Analysis of Programs for Property Checking.

  • 2005 - B.E. Information Technology, Cummins College of Engineering for Women, Pune University.

Professional Experience (Institution, Position and Period):

  • Assistant Professor, Defence Institute of Advanced Technology (DU), Pune, May 2011 – Present.

  • Visiting Faculty, L N Mittal Institute of Information Technology, Jaipur, Jan 2011 – May 2011.

  • Programmer Analyst, Cognizant Technology Solutions Ltd., Pune, Oct 2005 – Apr 2008

Research Domains:

Cyber Security.

  • Program Analysis.
  •  Malware Analysis, Reverse Engineering Binaries.
  •  Operating Systems.
  •  Offensive Security
  • Compilers Optimizations.

Specific Projects:

  • Malware Analysis based on High Level Semantics
  • Android App Security Analysis
  • Side Channel Attack on SGX
  • Vulnerability Analysis of SOHO Device
  • Propagation Mechanism of Malware-As-A-Service
  • Cyber Security In IAF Through Run-Time Process Analysis

Research Collaborations:

  • CRL BEL, Bangalore
  • CAIR DRDO, Bangalore
  • BEL CRL, Gaziabad

Ph.D Thesis Supervision:

M.Tech. Dissertation Supervision:

  • Implementing Software Side Channel Attacks on Intel SGX and Countermeasures To Guard SGX. June 2021.
  • Characterization of Malware providing Malware as a Service (MaaS) and Development of a Proof of Concept on MaaS. June 2021.
  • Automatic Text Summarization of Defect Reports using Deep Learning. June 2021.
  • Security Analysis of Android Applications. June 2021.
  • Augmenting Cyber Security In IAF Through Run-Time Process Analysis To Prevent Malware Threats. May 2020.
  • Biological Virus Inspired Malware Growth. May 2019.
  • Micro-Architecture Based Attacks to Access System Without OS Intervention. May 2019.
  • Enhancing Cyber Warfare capability of IAF through Extracting Sensitive Information from Android Devices.  May 2019.
  • Identification of Ransomware-Specific Properties Using Static and Debug-Time Analysis. May 2018.
  • Development of Automatic Microcontroller based Embedded Testing Tool. May 2017.
  • Automatic Text Summarization of Defect Reports using Deep Learning. May 2017.
  • Vulnerability Analysis and Exploitation of SOHO Networking Devices. May 2017.
  • Multi Platform Based Environment Evasive Windows Executable Detection. May 2016.
  • A Framework for Linux Malware Detection (LMD) using process executable file characteristics and its execution profile. May 2016.
  • Extracting Mass Information from Android Based Smart Devices. May 2015.
  • To Detect Metamorphic Malware in a Portable Executable Using Comprehensive Approach. May 2015.
  • Static Malware Variant Detection Based on  Control Flow Graph Properties. May 2015.
  • A Novel approach for Intrusion Detection based on network traffic pattern analysis. May 2014.
  • Identification of Rootkits based on their effects on system behaviour. May 2014.
  • Multilayer Protection Approach to detect Metamorphic Malware. May 2013

Summer/Winter Internships From other institutions Supervision:

Other Supervision:

Research Publications from 2010 to 2020:

Books Total Journals Articles Articles published in SCOPUS / Web of Science Index Journals Books Chapter Articles published in the Conference Volumes Registered Patent
4 3 1

Research Publications:

Journal Articles:

  • Vidyarthi, D., Choudhary, S. P., Rakshit, S., & Kumar, C. S. (2017). Malware detection by static checking and dynamic analysis of executables. International Journal of Information Security and Privacy (IJISP)11(3), 29-41.
  • Vidyarthi, D., Damri, G., Rakshit, S., Suthikshn Kumar, C. R., & Chansarkar, S. (2019). Classification of malicious process using high‐level activity based dynamic analysis. Security and Privacy2(6), e86.
  • Lokhande, V. G., & Vidyarthi, D. (2019). A study of hardware architecture based attacks to bypass operating system security. Security and Privacy2(4), e81.
  • Vidyarthi, D., Kumar, C. R. S., Rakshit, S., & Chansarkar, S. (2019). Static Malware Analysis to Identify Ransomware Properties. International Journal of Computer Science Issues (IJCSI)16(3), 10-17

Book Chapters:

  • Natani, P., & Vidyarthi, D. (2014). An overview of detection techniques for metamorphic malware. Intelligent Computing, Networking, and Informatics, 637-643.

Conference Papers:

  • Natani, P., & Vidyarthi, D. (2013, August). Malware detection using API function frequency with ensemble based classifier. In International Symposium on Security in Computing and Communication (pp. 378-388). Springer, Berlin, Heidelberg.
  • Choudhary, S. P., & Vidyarthi, D. (2015). A simple method for detection of metamorphic malware using dynamic analysis and text mining. Procedia Computer Science, 54, 265-270.
  • Vidyarthi, D. (2015, August). Detection of Stealth Process using Hooking. In Proceedings of the Third International Symposium on Women in Computing and Informatics (pp. 602-607).
  • Damri, G., & Vidyarthi, D. (2016, March). Automatic dynamic malware analysis techniques for Linux environment. In 2016 3rd International Conference on Computing for Sustainable Global Development (INDIACom) (pp. 825-830). IEEE.
  • Jadhav, A., Vidyarthi, D., & Hemavathy, M. (2016, March). Evolution of evasive malwares: A survey. In 2016 International Conference on Computational Techniques in Information and Communication Technologies (ICCTICT) (pp. 641-646). IEEE.
  • Nithish G, Deepti Vidyarthi. (2019, April). Trends in Malware Writing Techniques. In Modeling, Optimization and Computing for Technological and Sustainable Development (MOCTSD-2019).
  • Nishant Pandit, Deepti Vidyarthi. (2019, April). Paper on EVOLUTION OF ANDROID MALWARE OFFENSE AND ANDROID ECOSYSTEM DEFENSE. In IISTEM-International Conference on Electrical, Electronics & Computer Science (ICEECS-2019)

Research/Review Submitted/Under Review:

Any Publications Submitted/Under Review:

Invited Talks:

  • Interaction Meet on Digital Forensics, at CDAC Trivendrum, 20-21 Feb 2014.
  • Invited Talk on “Detection of Malware and related studies” during CEP on “Implementation of Cyber Security Aspects” at NSTL, Vishakhapatnam 27Aug 2014.
  • Invited Lecture on “Introduction to Malware Analysis” for INS HAMLA Navy Officers 29th July 2019.
  • Invited talk on “Legal Aspects of Information Security Management” in CEP course Training on Information Security Management, organized at ARDE, DRDO, Pune, on 17th Sep 2019.
  • Invited Lecture on “Malware Analysis” for ATAL FDP on Cyber Security at IIIT Pune 19 Dec 2019.
  • Invited Talk on “Publishing: Identifying Relevant Journals and Conferences” in CEP Course on on “Research Methodology and formalizing resultant Intellectual property” at CAIR, DRDO Bangalore 07Feb 2020.
  • Invite Lecture on “Introduction to Malware Analysis” for INS HAMLA Navy Officers 2nd June 2020.
  • Invited Lecture on “Malware Threat Analysis” for ATAL FDP on Cyber Security Online at IIIT Pune 24th Feb 2021


Awards/Scholastic Achievements:

Government Funded Projects:

Any Other: