A

Aditi Gupta

DevOps Manager

San Mateo, California, United States15 yrs 5 mos experience
Most Likely To SwitchHighly Stable

Key Highlights

  • Led Trust & Safety team at Netflix.
  • Developed Bot Defense Platform reducing bot traffic by 80%.
  • PhD research on advanced security techniques.
Stackforce AI infers this person is a Cybersecurity expert specializing in fraud detection and system security.

Contact

Skills

Core Skills

Fraud DetectionDistributed SystemsDdosFraud ProtectionBot DefenseInfrastructure SecurityAccess ControlIn-memory DatabasesSystem Security

Other Skills

Abuse MitigationMachine LearningPolicy DefinitionDatabase TechnologiesReturn Oriented ProgrammingSoftware DiversificationContextual Access ControlContextual SecurityRisk QuantificationSecurity PoliciesComputer SecurityAlgorithmsComputer ScienceCC++

About

I am a security leader with experience in a broad range of technologies. I love working on the intersections of distributed systems and security and building scalable systems to solve a security problem. I currently lead the Trust & Safety engineering team within Netflix that is responsible for building services and platforms that detect and mitigate fraud and abuse at scale. My team is responsible for mitigating threats such as DDoS, Account Fraud, Games abuse, Content leak etc. Before joining Netflix, I spent 4 years at Uber where I built out their bot defense service to secure the infrastructure against bot attacks. I also built the data layer access control platform at Uber to secure internal resources such as data stores. My PhD research spanned a wide range of security areas with main focus on system security and contextual access control. I extensively researched Return Oriented Programming (ROP) attack and developed software diversification based defense technique that use run-time binary randomization technique to generate a new binary image with every run. I also worked on intuitive and sensible access control mechanism for mobile devices that use contextual cues to automatically determine security policies for these devices. In my Master’s thesis, I worked on developing SCOSTA-PKI - a secure smart card operating system that incorporates PKI features such as digital signatures, origin integrity, public key encryption and certificate verification. This design is compliant to ISO/IEC-7816 international standards for smart card and SCOSTA-CL specification. These PKI features enhance the reliability and security of smart cards against unauthorized access. Specialties: DDoS, Access Control, System security, Distributed Systems, Buffer overflow attacks (with focus on Return Oriented Programming Attacks), Automated software diversity, Static and dynamic code analysis, Contextual Access Control, Mobile Security, Malware, RBAC, PKI, In-Memory Databases, Database kernel. Languages: Proficient in Golang/C/C++/Java/Python/SQL. For complete list of publications, please see https://scholar.google.com/citations?user=oqMo66wAAAAJ&hl=en

Experience

15 yrs 5 mos
Total Experience
2 yrs 7 mos
Average Tenure
6 yrs 1 mo
Current Experience

Netflix

2 roles

Engineering Lead, Trust Services and Enforcement

Promoted

May 2024Present · 1 yr 11 mos · Los Gatos, California, United States

  • I lead Trust Services and Enforcement team at Netflix where we build services and platforms to solve fraud and abuse problems at scale. My team builds systems to tackle problems such as account fraud, account takeover, distributed denial of service attacks (DDoS), content moderation and content theft.
DDoSFraud DetectionAbuse MitigationDistributed Systems

Staff Security Software Engineer

Mar 2020May 2024 · 4 yrs 2 mos · Los Gatos, California, United States

  • I led the Anti-DDoS efforts at Netflix to protect Netflix infrastructure and customer data against high volume attack traffic intended for DDoS, fraud or abuse.
DDoSFraud ProtectionInfrastructure Security

Uber

Software Engineer, Bot Defense Platform

May 2016Mar 2020 · 3 yrs 10 mos

  • I worked in the Infrastructure Security / Bot Defense Platform team to secure our infrastructure against bot attacks.
  • Founding engineer for Bot Defense Platform team
  • Defined short term mitigation strategy and long term roadmap for bot defense
  • Designed and implemented a scalable fast decisioning service to secure endpoints against bot attacks. The first version of this service reduce bot traffic by more than 80%
  • Continuously explore and implement new rules and machine learning models for bot defense
  • Presented this work at UberML conference
  • Before this, I built access control framework to secure internal resources.
  • Designed and implemented 2 systems (data layer enforcer and a scalable permission service) to secure internal resources
  • Defined a generic policy definition language to support access control use-cases beyond just data layer access
  • Onboarded data stores and internal customers to these systems
  • Gathered requirements to add more features and provided customer support
  • Other work
  • Designed and presented security trainings for the team
  • Taught oncall training course (company wide)
  • Bar raiser interviewer
Bot DefenseInfrastructure SecurityMachine Learning

Oracle

Senior Member of Technical Staff, Data layer and In-Memory database team

May 2014May 2016 · 2 yrs · San Francisco Bay Area

  • I worked in data layer and In-Memory database technologies team at Oracle. My team was responsible for developing Oracle’s In-Memory option, which is an In-Memory column store on top of Oracle’s row-major database that optimizes both analytics and mixed workload OLTP providing extremely fast real-time analytics while delivering outstanding performance for transactions.
In-Memory DatabasesDatabase Technologies

Amazon

SDE Intern, Information Security team

May 2012Aug 2012 · 3 mos · Greater Seattle Area

  • I worked on developing automatic risk quantification for internal AWS accounts based on security policies and credential rotation.
Risk QuantificationSecurity Policies

Purdue university

Research Assistant

Aug 2011Apr 2014 · 2 yrs 8 mos · West Lafayette

  • My research involved researching return oriented programming (ROP) attacks and developing software diversification based defense techniques. ROP attacks are an advanced form of buffer overflow attacks that reuse existing application code for malicious logic. Our proposed technique, Marlin, uses a fine grained randomization technique that randomizes application binary with every run, rendering ROP attacks ineffective. Also developed stealth ROP attack on UAV systems that performs a buffer overflow and restores the smashed stack after that to make the attack undetectable. We also proposed a defense technique for such attacks.
  • I also worked in contextual access control. I proposed a formal proximity model for RBAC systems that allows specifying access control policies based on who is in proximity. This proximity can be geographical, cyber, social, logical or attribute-based.
Return Oriented ProgrammingSoftware DiversificationContextual Access ControlSystem Security

Nokia

2 roles

Research Intern in Nokia Research Center

May 2011Aug 2011 · 3 mos · Helsinki, Finland

  • I worked on developing “PeerSense”, a system that provides meaningful co-presence information which serves as an enabler for various applications that require user's current social proximity information, for example contextual photo-sharing.

Research Intern in Nokia Research Center

Jun 2010Dec 2010 · 6 mos · Helsinki, Finland

  • I worked on developing “Intuitive and Sensible Access Control” mechanism for mobile devices that uses contextual observations to infer safety of current surroundings and use that information to automatically configure access control policies on mobile device. This work was demoed in PerCom Conference and won the best Demo paper award.

Epfl (école polytechnique fédérale de lausanne)

Research Intern

Jun 2007Jul 2007 · 1 mo · Lausanne, Switzerland

  • I developed a tool for trace monitoring based on regular expression matching. This involved implementing an efficient collection of run-time traces and triggering user specified action using run-time pattern matching. This is useful in detecting possible faults, threats, deadlocks and security violations in real time.

Inria

Intern

May 2006Jul 2006 · 2 mos · Nancy, France

  • My project was “Model driven approach to Electronic voting system verification”. I worked on implementing a complex electronic voting system prototype and then used formal verification and automated testing techniques to ensure correctness.

Education

Purdue University

Doctor of Philosophy (Ph.D.) — Computer Science

Jan 2008Jan 2014

Indian Institute of Technology, Kanpur

BTech+MTech (Dual Degree) — Computer Science and Engineering

Jan 2003Jan 2008

Stackforce found 100+ more professionals with Fraud Detection & Distributed Systems

Explore similar profiles based on matching skills and experience