I am a doctoral candidate in the Computer Engineering department at George Washington University, under the guidance of Professor Guru Venkataramani. My primary research interests are software security and efficient machine learning in systems. My current research is focused on developing hardware/software optimizations for accelerating multi-agent reinforcement learning workloads. Prior to enrolling at GWU, I completed my undergraduate studies in Computer Science and Engineering at Vellore Institute of Technology, Tamil Nadu, India in 2019.
MARL is a promising research area that can model and control multiple distributed decision-making AI agents. However, recent studies have shown that the MARL algorithms suffer from inefficiencies that can severely limit their adoption in real-world systems. These problems occur due to complexities in decision-making processes arising from having to observe and act upon a large number of events present in the environment, along with the growth in the number of AI agents needed to interact with each other. To ameliorate the learning efficiency and scalability issues of MARL algorithms, we will seek techniques to improve neural-network throughput, to efficiently manage the state-action space in a dynamic fashion and to scalably encode states and observations of a large and varying number of agents.
The objective of this project is to design a secure micro-architecture ecosystem that effectively deceives adversaries in an automated fashion and drains their resources ultimately in order to prevent bad actors from gaining access to sensitive information. The investigation will span memory, computer, and other performance enhancing hardware (including the various predictors). This project will add a unique dimension to computer system security by complementing the trusted execution environments with active defense via hardware.
The project will investigate how to individualize security in cyber systems by customizing their protocols. In contrast to the currently adopted “protocol standards", this first-of-a-kind approach is motivated by the fact that unnecessary code/layer often introduced by standards may eventually be used as backdoors for security exploits, while protocol customization enables the feature to debloat and can significantly eliminate the risks associated with monoculture cyber systems.
Powered by Jekyll and Minimal Light theme.