Skip to content
View adityadeshpande09's full-sized avatar

Highlights

  • Pro

Block or report adityadeshpande09

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Maximum 250 characters. Please don't include any personal information such as legal names or email addresses. Markdown supported. This note will be visible to only you.
Report abuse

Contact GitHub support about this userโ€™s behavior. Learn more about reporting abuse.

Report abuse
adityadeshpande09/README.md

Hello World, I'm Aditya Deshpande ๐Ÿ‘‹

๐ŸŽ“ Master's student in Computer Science at NC State University
๐Ÿ” Focused on Cybersecurity, Privacy, and Secure Software Engineering

I design and analyze systems with security and privacy at the core, spanning Android app privacy analysis, secure backend development, and AI-assisted security tools.


๐Ÿ” Areas of Interest

  • Web application Security
  • Privacy Analysis and Data Protection
  • Secure Software Design and Threat Modeling
  • Android Security and Static Analysis
  • Software Engineering for Security-Critical Systems

๐Ÿ“Œ Featured Projects

๐Ÿ” Mobile Application Privacy Analysis

Static taint analysis of real-world Android applications to uncover privacy risks

  • Identified 79 source-to-sink data leakage paths
  • Analyzed inter-component communication, permissions, and lifecycle callbacks
  • Detected unauthorized location tracking and device fingerprinting

๐Ÿงฉ Req-Trace (Requirements Traceability System)

A system that transforms meeting conversations into a persistent, queryable knowledge graph, enabling stakeholders to understand decisions, dependencies, and evolving requirements across the SDLC.

  • Transcribes meeting audio and extracts key concepts, decisions, and relationships into a Neo4j property graph
  • Provides stakeholder-specific views (engineering, product, security) through tailored graph queries
  • Supports saving sessions and comparing graphs across meetings to track how discussions, priorities, and decisions evolve over time
  • Enables high-level understanding as well as deep dives through multiple graph-based perspectives

๐ŸŽฏ Phishing Abhiyan (Ethical Security Simulation)

AI-driven phishing simulation built for a controlled cybersecurity challenge

  • Designed realistic phishing campaigns using AI
  • Monitored user interaction and campaign effectiveness
  • Secured 2nd place in a cybersecurity & AI-based hackathon

๐ŸŒ Fix It (MERN Web Application)

Full-stack platform to streamline citizenโ€“government issue reporting

  • React frontend with Node.js / Express backend
  • Authentication, routing, and MongoDB persistence

๐Ÿ“ˆ What Iโ€™m Currently Working On

  • Understanding how modern applications unintentionally expose sensitive user data
  • Learning about systems that make security and privacy failures easier to detect and reason about
  • Applying AI in security analysis

๐Ÿ“ซ Letโ€™s Connect

Profile Views

โญ Always happy to discuss my work!

Pinned Loading

  1. Phishing-Abhiyan-AI-based-cybersecurity-project- Phishing-Abhiyan-AI-based-cybersecurity-project- Public

    Forked from dalvishruti14/hactivate_hactify

    Python 1

  2. Req-Trace Req-Trace Public

    Forked from tiva710/SE_Project_2

    ReqTrace is a tool that automatically constructs interactive knowledge graphs from requirements discussions.

    Python 1 1

  3. Tiffin-Trails Tiffin-Trails Public

    Forked from YashDhavale/CSC-510-SE-Project

    JavaScript