About
Articles by Asankhaya
-
The Power of First Principles Thinking in Software Development
The Power of First Principles Thinking in Software Development
By Asankhaya Sharma
-
Mastering the Craft: Unveiling the Art and Science of Engineering Management
Mastering the Craft: Unveiling the Art and Science of Engineering Management
By Asankhaya Sharma
-
Unleashing the Code of Happiness in Software Development
Unleashing the Code of Happiness in Software Development
By Asankhaya Sharma
Contributions
Activity
-
Solving International Maths Olympiad (IMO) level problems has been a grand challenge for AI systems. Happy to share that a new solver (AlphaProof)…
Solving International Maths Olympiad (IMO) level problems has been a grand challenge for AI systems. Happy to share that a new solver (AlphaProof)…
Liked by Asankhaya Sharma
-
Hello Y Combinator 2024 Cohort! Got the chance to advise some incredible founders this week including: LedgerUp’s Joseph Johnson: working to solve…
Hello Y Combinator 2024 Cohort! Got the chance to advise some incredible founders this week including: LedgerUp’s Joseph Johnson: working to solve…
Liked by Asankhaya Sharma
-
We introduce Patched Round-Trip Correctness (Patched RTC), a novel, unsupervised evaluation technique for Large Language Models used in diverse…
We introduce Patched Round-Trip Correctness (Patched RTC), a novel, unsupervised evaluation technique for Large Language Models used in diverse…
Shared by Asankhaya Sharma
Experience & Education
Licenses & Certifications
Publications
-
Certified Reasoning with Infinity
International Symposium on Formal Methods
We demonstrate how infinities improve the expressivity, power, readability,
conciseness, and compositionality of a program logic. We prove that adding
infinities to Presburger arithmetic enables these improvements without sacrificing
decidability. We develop Omega++, a Coq-certified decision procedure for
Presburger arithmetic with infinity and benchmark its performance. Both the program
and proof of Omega++ are paramaterized over user-selected semantics for
the indeterminate…We demonstrate how infinities improve the expressivity, power, readability,
conciseness, and compositionality of a program logic. We prove that adding
infinities to Presburger arithmetic enables these improvements without sacrificing
decidability. We develop Omega++, a Coq-certified decision procedure for
Presburger arithmetic with infinity and benchmark its performance. Both the program
and proof of Omega++ are paramaterized over user-selected semantics for
the indeterminate terms (such as 0 * ∞).Other authorsSee publication -
Exploiting undefined behaviors for efficient symbolic execution
ACM ICSE
Symbolic execution is an important and popular technique used in several software engineering tools for test case generation, debugging and program analysis. As such improving the performance of symbolic execution can have huge impact on the effectiveness of such tools. In this paper, we present a technique to systematically introduce undefined behaviors during compilation to speed up the subsequent symbolic execution of the program. We have implemented our technique inside LLVM and tested with…
Symbolic execution is an important and popular technique used in several software engineering tools for test case generation, debugging and program analysis. As such improving the performance of symbolic execution can have huge impact on the effectiveness of such tools. In this paper, we present a technique to systematically introduce undefined behaviors during compilation to speed up the subsequent symbolic execution of the program. We have implemented our technique inside LLVM and tested with an existing symbolic execution engine (Pathgrind). Preliminary results on the SIR repository benchmark are encouraging and show 48% speed up in time and 30% reduction in the number of constraints.
-
Cloud Based Document Delivery Service for Emerging Markets
ICSEM
Presented this paper on Services Design at ‘International Conference for Services in Emerging Markets’ (ICSEM, 2010)
-
PRISM: platform for remote sensing using smartphones
Proceeding MobiSys '10 Proceedings of the 8th international conference on Mobile systems, applications, and services
To realize the potential of opportunistic and participatory sensing using mobile smartphones, a key challenge is ensuring the ease of developing and deploying such applications, without the need for the application writer to reinvent the wheel each time. To this end, we present a Platform for Remote Sensing using Smartphones (PRISM) that balances the interconnected goals of generality, security, and scalability. PRISM allows application writers to package their applications as executable…
To realize the potential of opportunistic and participatory sensing using mobile smartphones, a key challenge is ensuring the ease of developing and deploying such applications, without the need for the application writer to reinvent the wheel each time. To this end, we present a Platform for Remote Sensing using Smartphones (PRISM) that balances the interconnected goals of generality, security, and scalability. PRISM allows application writers to package their applications as executable binaries, which offers efficiency and also the flexibility of reusing existing code modules. PRISM then pushes the application out automatically to an appropriate set of phones based on a specified set of predicates. This push model enables timely and scalable application deployment while still ensuring a good degree of privacy. To safely execute untrusted applications on the smartphones, while allowing them controlled access to sensitive sensor data, we augment standard software sandboxing with several PRISM-specific elements like resource metering and forced amnesia.
We present three applications built on our implementation of PRISM on Windows Mobile: citizen journalist, party thermometer, and road bump monitor. These applications vary in the set of sensors they use and in their mode of operation (depending on human input vs. automatic). We report on our experience from a small-scale deployment of these applications. We also present a large-scale simulation-based analysis of the scalability of PRISM's push model.Other authors -
Patents
-
Open source vulnerability prediction with machine learning ensemble
Filed US 16/105,016
A system to create a stacked classifier model combination or classifier ensemble has been designed for identification of undisclosed flaws in software components on a large-scale. This classifier ensemble is capable of at least a 54.55% improvement in precision. The system uses a K-folding cross validation algorithm to partition a sample dataset and then train and test a set of N classifiers with the dataset folds. At each test iteration, trained models of the set of classifiers generate…
A system to create a stacked classifier model combination or classifier ensemble has been designed for identification of undisclosed flaws in software components on a large-scale. This classifier ensemble is capable of at least a 54.55% improvement in precision. The system uses a K-folding cross validation algorithm to partition a sample dataset and then train and test a set of N classifiers with the dataset folds. At each test iteration, trained models of the set of classifiers generate probabilities that a sample has a flaw, resulting in a set of N probabilities or predictions for each sample in the test data. With a sample size of S, the system passes the S sets of N predictions to a logistic regressor along with “ground truth” for the sample dataset to train a logistic regression model. The trained classifiers and the logistic regression model are stored as the classifier ensemble.
Other inventorsSee patent -
Open-source software vulnerability analysis
Filed US 16/050,050
To analyze open-source code at a large scale, a security domain graph language (“SGL”) has been created that functions as a vulnerability description language and facilitates program analysis queries. The SGL facilitates building and maintaining a graph database to catalogue vulnerabilities found in open-source components. This vulnerability database generated with SGL is used for analysis of software projects which use open source components. An agent which interacts with the vulnerability…
To analyze open-source code at a large scale, a security domain graph language (“SGL”) has been created that functions as a vulnerability description language and facilitates program analysis queries. The SGL facilitates building and maintaining a graph database to catalogue vulnerabilities found in open-source components. This vulnerability database generated with SGL is used for analysis of software projects which use open source components. An agent which interacts with the vulnerability database can perform a scan of a software project to identify open-source components used in the project and submit queries to the vulnerability database to identify vulnerabilities which may affect the open-source components in the project. Results of the scan are presented to a user in the form of a vulnerability report which indicates vulnerabilities that have been discovered and which open-source components the vulnerabilities affect.
Other inventorsSee patent -
Software vulnerability graph database
Filed US 16/050,109
To analyze open-source code at a large scale, a security domain graph language (“SGL”) has been created that functions as a vulnerability description language and facilitates program analysis queries. The SGL facilitates building and maintaining a graph database to catalogue vulnerabilities found in open-source components. This graphical database can be accessed via a database interface directly or accessed by an agent that interacts with the database interface. To build the graph database, a…
To analyze open-source code at a large scale, a security domain graph language (“SGL”) has been created that functions as a vulnerability description language and facilitates program analysis queries. The SGL facilitates building and maintaining a graph database to catalogue vulnerabilities found in open-source components. This graphical database can be accessed via a database interface directly or accessed by an agent that interacts with the database interface. To build the graph database, a database interface processes an open-source component and creates graph structures which represent relationships present in the open-source component. The database interface transforms a vulnerability description into a canonical form based on a schema for the graph database and updates the database based on a determination of whether the vulnerability is a duplicate. This ensures quality and consistency of the vulnerability dataset maintained in the graph database.
Other inventorsSee patent -
Signatures for software components
Filed US 14506490
A facility for analyzing a pair of code files is described. From each of the code files, the facility extracts a hierarchy of textual names. The facility then determines the score reflecting a level of similarity between the extracted hierarchies of textual names for attribution to the pair of code files.
-
Displaying content on multiple web pages
Filed US 12623458
Aspects of the subject matter described herein relate to displaying content on multiple
pages. In aspects, a request for content is received from a browsing component. The content
is divided into pages suitable for displaying on a display associated with the browsing
component. Navigation elements may be embedded in the pages to allow a user using the
browsing component to navigate between pages corresponding to the content.
Honors & Awards
-
WSHAsia Award
World of Safety and Health Asia
-
Veracode Way Award
Veracode
-
ACM Distinguished Paper Award
ACM
For the paper titled “A Machine Learning Approach for Vulnerability Curation” at the MSR 2020 conference.
-
Editors' Picks
Medium
For the series "How to be an Authentic Leader?" - https://medium.com/series/how-to-be-an-authentic-leader-5f7d18e70255
-
Top 10 Downloaded Articles
ACM SIGSOFT
For the paper titled "Exploiting Undefined Behaviors for Efficient Symbolic Execution".
Software Engineering Notes - http://portalparts.acm.org/2700000/2693208/fm/frontmatter.pdf -
Bronze Medal
ACM
Student Research Competition (http://src.acm.org/) at ICSE 2014
Languages
-
English
Native or bilingual proficiency
-
Hindi
Native or bilingual proficiency
Organizations
-
3 Day Startup
Mentor
3 Day Startup’s mission is to kick-start new student-run companies and build entrepreneurial capabilities in students and their university communities. We rent work space for 3 full days, recruit 45 student participants from a wide range of backgrounds, cater food and drinks, and bring in top-notch entrepreneurs and investors. The participants pick the best ideas for startups during the Day 1 brainstorming session and deliver prototypes and investor pitches on the final night.
-
Okyasoft
Co-Founder
Helping Startups Succeed
Recommendations received
2 people have recommended Asankhaya
Join now to viewMore activity by Asankhaya
-
My analysis for Llama 3.1 8b, 70b & 405b which was released just today: 1. 15.6T tokens, Tools & Multilingual 2. Llama arch + new RoPE 3. fp16 &…
My analysis for Llama 3.1 8b, 70b & 405b which was released just today: 1. 15.6T tokens, Tools & Multilingual 2. Llama arch + new RoPE 3. fp16 &…
Liked by Asankhaya Sharma
-
Mem0 (YC S24) trending #2 worldwide on GitHub. Thank you everyone for the support. #ai #opensource #github
Mem0 (YC S24) trending #2 worldwide on GitHub. Thank you everyone for the support. #ai #opensource #github
Liked by Asankhaya Sharma
-
How you know you’re building something people want
How you know you’re building something people want
Liked by Asankhaya Sharma
-
We're releasing 2 free notebooks for 2x faster & 60% less memory finetuning for Mistral NeMo 12b! Mistral's latest free LLM is the largest…
We're releasing 2 free notebooks for 2x faster & 60% less memory finetuning for Mistral NeMo 12b! Mistral's latest free LLM is the largest…
Liked by Asankhaya Sharma
-
Introducing GPT-4o mini - which is significantly smarter and 60% cheaper than GPT-3.5T. Another step towards making AI more broadly beneficial for…
Introducing GPT-4o mini - which is significantly smarter and 60% cheaper than GPT-3.5T. Another step towards making AI more broadly beneficial for…
Liked by Asankhaya Sharma
-
We're excited to announce the launch of our Pointwise beta!🚀🚀 Pointwise is the free app that tells you which credit card to get, based on your…
We're excited to announce the launch of our Pointwise beta!🚀🚀 Pointwise is the free app that tells you which credit card to get, based on your…
Liked by Asankhaya Sharma
-
4 years ago, I started my journey as a Founder. I literally had no startup experience and had to figure out everything along the way. Although I…
4 years ago, I started my journey as a Founder. I literally had no startup experience and had to figure out everything along the way. Although I…
Liked by Asankhaya Sharma
-
I’m getting ready for my summer vacation! This unique “travel packing guide" helped me to make travel a breeze ✈️ 🤔 Packing got you stumped? Ask…
I’m getting ready for my summer vacation! This unique “travel packing guide" helped me to make travel a breeze ✈️ 🤔 Packing got you stumped? Ask…
Liked by Asankhaya Sharma
Other similar profiles
Explore collaborative articles
We’re unlocking community knowledge in a new way. Experts add insights directly into each article, started with the help of AI.
Explore MoreOthers named Asankhaya Sharma
1 other named Asankhaya Sharma is on LinkedIn
See others named Asankhaya Sharma