To main content

Ravishankar Borgaonkar

Senior Research Scientist

Ravishankar Borgaonkar

Senior Research Scientist

Ravishankar Borgaonkar
Phone: 413 31 913
Email:
Department: Software Engineering, Safety and Security
Office: Trondheim

Publications and responsibilities

Publication
https://www.sintef.no/en/publications/publication/1927009/

Threat modeling is about identifying architectural flaws and weaknesses in a system in order to mitigate them and avoid unwanted incidents caused by an attacker. Tool assisted threat modeling has seen limited use in complex cyber physical systems involving both Information Technology (IT) and...

Year 2021
Type Academic chapter/article/Conference paper
Publication
https://www.sintef.no/en/publications/publication/1925082/

This article investigates and analyzes the security aspects of 5G specifications from the perspective of IoT-based smart grids. As the smart grid requires high-speed and reliable communication to enable real-time grid monitoring via Internet of Things (IoT) devices, 5G can be considered a catalyst...

Publication
https://www.sintef.no/en/publications/publication/1896312/

Maritime shipping is currently undergoing rapid digitalization, but with increasing exposure to cyber threats, there is a need to improve the security of the ship communication technology used during operations across international waters, as well as close to local shores and in ports. To this aid...

Year 2021
Type Academic article
Publication
https://www.sintef.no/en/publications/publication/1889141/

The modernisation of the power grid is ongoing, and the level of digitalisation of the power grid in, say, ten years may be quite different than today. Cyber security needs will change correspondingly. In this paper we utilise a qualitative research approach to explore misuse cases related to three...

Year 2020
Type Academic chapter/article/Conference paper
Publication
https://www.sintef.no/en/publications/publication/1784009/

IMSI catchers threaten the privacy of mobile phone users by identifying and tracking them. Commercial IMSI catcher products exploit vulnerabilities in cellular network security standards to lure nearby mobile devices. Commercial IMSI catcher's technical capabilities and operational details are still...

Authors Shinjo Park Altaf Shaik Ravishankar Borgaonkar Jean-Pierre Seifert
Year 2019
Type Academic chapter/article/Conference paper
Publication
https://www.sintef.no/en/publications/publication/1696819/

Mobile communications are used by more than two-thirds of the world population who expect security and privacy guarantees. The 3rd Generation Partnership Project (3GPP) responsible for the worldwide standardization of mobile communication has designed and mandated the use of the AKA protocol to...

Authors Ravishankar Borgaonkar Lucca Hirschi Altaf Shaik Shinjo Park
Year 2019
Type Academic article
Publication
https://www.sintef.no/en/publications/publication/1696826/

Cellular devices support various technical features and services for 2G, 3G, 4G and upcoming 5G networks. For example, these tech- nical features contain physical layer throughput categories, radio protocol information, security algorithm, carrier aggregation bands and type of services such as GSM-R...

Authors Ravishankar Borgaonkar Altaf Shaik Shinjo Park Jean-Pierre Seifert
Year 2019
Type Academic article