Hack The Breach Logo
Mar 29 - Apr 12, 2025Virtual

HACKTHEBREACH

Join experts and enthusiasts for 15 days of workshops, sessions, and hacking challenges

20+Speakers
10+Hands-on Sessions
30+Sessions
15Days of Event

About The Event

Special Thanks

Hack The Breach wouldn't be possible without their support

Organized By

IIIT Sri CityChittoor
IIIT Sri City

Chief Patron

Prof. M. V. KartikeyanDirector, IIIT Sri City
Prof. M. V. Kartikeyan

Convener

Dr. Neha AgrawalAssistant Professor, IIIT Sri City
Dr. Neha Agrawal

Our Sponsors

Thank you to our sponsors for supporting Hack The Breach.

MeitY logo
ISEA logo
CyStar IITM logo
IIT Madras logo
MeitY logo
ISEA logo
CyStar IITM logo
IIT Madras logo
MeitY logo
ISEA logo
CyStar IITM logo
IIT Madras logo
MeitY logo
ISEA logo
CyStar IITM logo
IIT Madras logo
MeitY logo
ISEA logo
CyStar IITM logo
IIT Madras logo
MeitY logo
ISEA logo
CyStar IITM logo
IIT Madras logo

Meet The Speakers

Learn from industry experts at the forefront of cybersecurity innovation and defense

Dr. Nikhil Tripathi

Dr. Nikhil Tripathi

Assistant Professor

IIT (ISM) Dhanbad, Jharkhand

Assistant Professor at IIT (ISM) Dhanbad. Researches network security, focusing on vulnerability assessment and DoS/DDoS defenses. Has over 590 citations on Google Scholar for his impactful work.

Application-Layer Security
Dr. Monosij Maitra

Dr. Monosij Maitra

Assistant Professor

IIT Kharagpur, West Bengal

Assistant Professor at IIT Kharagpur, specializing in cryptography. Known for advanced encryption systems for secure data computation. Won IBM Best PhD Thesis award for his doctoral work at IIT Madras.

Cryptography
Dr. Bodhisatwa Mazumdar

Dr. Bodhisatwa Mazumdar

Professor

IIT Indore, Madhya Pradesh

Associate Professor at IIT Indore. Known for extensive research in hardware security and side-channel attacks. Accumulated over 1,800 citations on Google Scholar for his contributions.

Side-channel Attacks
Dr.Sharad Sinha

Dr.Sharad Sinha

Associate Professor

IIT Goa, Goa

Associate Professor and Dean of Faculty Affairs at IIT Goa. Focuses on reconfigurable computing, computer architecture, and embedded systems. Contributes significantly to both research and academic leadership.

Architecture and Methods for Fine Grained Detection and Mitigation of Cache Side Channel Attacks
Dr. Saumya Bhadauria

Dr. Saumya Bhadauria

Assistant Professor

ABV-IIIT Gwalior, Madhya Pradesh

Assistant Professor at ABV-IIITM Gwalior. Pioneers high-level synthesis and hardware security for integrated circuits. Has over 418 citations on Google Scholar for her reliable design techniques.

IoT and Industrial Cyber Physical System (CPS) Security
P. Santhi Thilagam

P. Santhi Thilagam

Professor

NIT Surathkal, Karnataka

Professor and former HOD of CSE department at NIT Surathkal. Known for research in data mining, database security, and distributed systems. Contributes extensively to academic leadership and scholarship.

Web Services Security
Dr. Aditya japa

Dr. Aditya japa

Assistant Professor

Ulster University, UK

Lecturer in Computer Science at Ulster University, UK. Researches machine learning, data analytics, and IoT applications. Contributes to smart systems through interdisciplinary innovations.

Hardware Security Attacks on Edge Devices and Defence Techniques
Dr. Imran Malik

Dr. Imran Malik

Assistant Professor

Queen's University, UK

Lecturer in Electronic Engineering at Queen's University Belfast. Expert in RF/microwave/mmWave circuits and antenna design. Advances wireless communication technologies through his research.

Hardware-Based Post-Quantum Cryptography Accelerators: SABER
Dr Padmavathi U.

Dr Padmavathi U.

Assistant Professor

Shiv Nadar University, Tamil Nadu

Assistant Professor at Shiv Nadar University Chennai. Researches deep learning and computer vision. Won Best Paper Award at IEEE ANTS-2021 for her contributions.

Dr Pradeep Kumar Bhale

Dr Pradeep Kumar Bhale

Assistant Professor

IIITDM Kancheepuram, Tamil Nadu

Assistant Professor at IIITDM Kancheepuram. Researches RF/microwave engineering and antenna design. Enhances wireless communication with work on millimeter-wave systems and terahertz systems.

Attack Detection and Mitigation for IoT Ecosystems: Adaptive, Scalable, and Lightweight Approaches
Mr. Prajjwal Govil

Mr. Prajjwal Govil

Cybersecurity Analyst

TCS

IT Analyst at Tata Consultancy Services, Bangalore. Brings 8+ years of experience in full-stack development and enterprise solutions. Skilled in Java, Spring Boot, and cloud technologies for scalable IT systems.

Phishing analysis
Prof. John Augustine

Prof. John Augustine

Professor

IIT Madras, Tamil Nadu

Prof. Durga Toshniwal

Prof. Durga Toshniwal

Professor

IIT Roorkee, Uttarakhand

Professor at IIT Roorkee in Computer Science. Renowned for work in AI, data mining, and intelligent transportation systems. Boasts over 6,300 citations on Google Scholar for her research.

Prof. Rajat Subhra Chakraborty

Prof. Rajat Subhra Chakraborty

Professor

IIT Kharagpur, West Bengal

Professor and Associate Dean at IIT Kharagpur. Renowned for pioneering research in hardware security and VLSI design. Ranked among the top 2% of global Computer Science researchers in 2022.

Hardware Security
Dr. Rajesh Gupta

Dr. Rajesh Gupta

Assistant Professor

Nirma University, Gujarat

Professor and HOD of CSE department at Nirma University. Specializes in IoT, cloud computing, and network security. Known for significant contributions to both academia and leadership.

Dr. Vimal Kumar Dwivedi

Dr. Vimal Kumar Dwivedi

Assistant Professor

Ulster University, UK

Lecturer in Electrical and Electronic Engineering at Ulster University, UK. Focuses on energy harvesting, wireless sensor networks, and IoT. Advances sustainable technology solutions through his work.

Dr. Gaurav Varshney

Dr. Gaurav Varshney

Assistant Professor

IIT Roorkee, Uttarakhand

Assistant Professor at IIT Jammu. Focuses on cybersecurity, including anti-phishing and multi-factor authentication. Earned over 540 citations on Google Scholar for his research.

Web Application Security and Pentest
Prof. Shashikala Tapaswi

Prof. Shashikala Tapaswi

Professor

ABV-IIITM Gwalior

Professor at ABV-IIITM Gwalior. Specializes in image/video processing, mobile networks, and IoT security. Holds patents for indoor tracking and image dehazing devices.

Dr. Kamalakanta Sethi

Dr. Kamalakanta Sethi

Assistant Professor

IIIT Sri City, Andhra Pradesh

Workshop Agenda

Explore our lineup of talks, workshops, and activities scheduled over the conference days.

The schedule may be subject to minor changes. Attendees will receive real-time updates via email.

Meet The Organizers

The backbone of the event, the organizers that made this event possible.

Arka Mondal

Arka Mondal

Lead Organizer

Hack The Breach

Suvan Sarkar

Suvan Sarkar

CTF Challenge & Technical Lead

Hack The Breach

Vedant Kesarwani

Vedant Kesarwani

Website & Design Lead

Hack The Breach

Rakshita Badugu

Rakshita Badugu

Design Team

Hack The Breach

Akshat Mathur

Akshat Mathur

CTF Challenge Team

Hack The Breach

Piyush Singh

Piyush Singh

CTF Challenge Team

Hack The Breach

Sham Gagan Siddarth

Sham Gagan Siddarth

Design Team

Hack The Breach

R. R. Sai Tej

R. R. Sai Tej

Event Management Team

Hack The Breach

Gaurav Gautam

Gaurav Gautam

Technical Team

Hack The Breach

Akansh Vaibhav

Akansh Vaibhav

Design Team

Hack The Breach

Medhansh Rao

Medhansh Rao

Anchoring Team

Hack The Breach

Harshini Reddy

Harshini Reddy

Anchoring Team

Hack The Breach

Test your skills in our 48-hour cybersecurity competition with challenges across multiple security domains

Date

4th and 11th April, 2025

After sessions

Duration

60 Hours of Hacking

Real-time updates

Team Size

Solo Participation Only

Only 1 member per team

Skill Level

Beginner to Advanced

Challenges for all levels

Exciting Prizes Awaiting You!

Compete for goodies and kits, including tshirts, stickers, mugs and more

Challenge Categories

Test your skills across multiple cybersecurity domains

Web Exploitation

All Levels

Discover and exploit vulnerabilities in web applications.

Cryptography

All Levels

Break codes, decrypt messages, and solve cipher challenges.

Reverse Engineering

intermediate

Analyze and understand compiled programs and binaries.

Binary Exploitation

advanced

Identify and exploit vulnerabilities in program binaries.

Forensics

All Levels

Analyze digital evidence to solve security puzzles.

OSINT

beginner

Use open source intelligence to solve challenges.

Frequently Asked Questions

Everything you need to know about the event.

Still have questions? Contact us at hackthebreach@iiits.in