Janani Kehelwala

Researcher, Engineer, Reader, Writer
About Me
Profile Image

I am a doctoral researcher at University of Oulu, Finland, pursuing my PhD in Communications Engineering. My research interests are federated learning security, privacy of decentralized learning, distributed consensus protocols and security applications of game theory.

I received my Bachelor's degree in Computer Security from University of Plymouth, United Kingdom in 2016, and my Master's degree in Computer Science from University of Moratuwa, Sri Lanka in 2021. I have worked as a Software Engineer and an Information Security Engineer in Sri Lanka, accumulating over 4 years of experience in the industry.

While my background is in Computer Science, I am quite enthusiastic about two aspects; decentralization as an avenue to provide more control to the general public and interdisciplinary approaches to problem-solving. Therefore, I am quite committed to ensuring security and privacy in communications so they can be used safely, or at the very least, with well-identified, quantitative risks.

I have been an avid reader since childhood, which has greatly shaped my academic and professional careers, besides inspiring me to infuse creativity into my work. I also enjoy writing creative fiction and poetry in my leisure.

Some of my technical case studies are cataloged below. Do feel free to contact me for collaborations or if you have any questions.

Research
Conference Proceedings
  • J. Kehelwala, Y. Siriwardhana, T. Hewa, M. Liyanage and M. Ylianttila, "Decentralized Learning for 6G Security: Open Issues and Future Directions," 2024 Joint European Conference on Networks and Communications & 6G Summit (EuCNC/6G Summit), Antwerp, Belgium, 2024, pp. 1175-1180, doi: 10.1109/EuCNC/6GSummit60053.2024.10597004.
Demonstrations
  • J. Kehelwala, Y. Siriwardhana, T. Hewa, and M. Ylianttila, "Defense against poisoning in federated learning systems for autonomous driving," Demonstration, 2023, Brooklyn 6G Summit. [Online]. Available: https://cwc-ns-6gcure.github.io/BrooklynSummit2023/
Timeline
Mar 2023 - Present
Doctoral Researcher
University of Oulu, Oulu, Finland
Jun 2022 - Nov 2022
Application Security Engineer
Pearson Lanka, Colombo, Sri Lanka
Aug 2021 - May 2022
Information Security Engineer
Jan 2021 - Jul 2021
Information Security Specialist
Oct 2020 - Dec 2020
Associate Information Security Analyst
TechCERT, Dehiwala, Sri Lanka
Jan 2018 - May 2021
MSc in Computer Science (Spec. Security Engineering)
University of Moratuwa, Moratuwa, Sri Lanka
Dec 2018 - Feb 2020
Software Engineer
Sep 2017 - Jan 2018
Software Engineer
LSEG Technology, Malabe, Sri Lanka
Nov 2016 - Jul 2017
Associate Software Engineer
WSO2.Telco, Maradana, Sri Lanka
Jan 2013 - June 2016
BSc in Computer Security
University of Plymouth, Plymouth, United Kingdom
(Delivered at NSBM, Sri Lanka.)

Blog Posts
post-thumbnail
Deploying your own Website

with Jekyll and Cloudfare Pages

Back in 2016 or so, I had a quaint little website made in Jekyll and deployed with Github pages. This was great. It’s a professional hazard for some people who...

View
post-thumbnail
Secure Coding: Misuse of Security Concepts

In a previous post, we discussed why bugs are so frequent and persistent when it comes to application security. One of the reasons mentioned was misuse of security concepts in...

View
post-thumbnail
Understanding Application Security and APIs

Application security as a whole requires an overarching view of all your products and how their vulnerabilities might be made worse or better in relation to each other. However, an...

View
post-thumbnail
Practical tips for a successful research process - Tools

There is a lot of well-informed literature regarding how to choose your research topic, how to conduct the literature review, how to write the thesis or a paper, and there...

View
post-thumbnail
UNIX and Stack Smashing

Let us look into what buffer overflow vulnerabilities are, what aspects of UNIX system design allows their (popular and continued) exploitation and what precautions can be taken to patch them....

View
post-thumbnail
A brief look into securing calls to Software Libraries and frameworks

One of the most common uses of APIs is integrating libraries and frameworks that has a required behavior to a new software in order to cut down on the development...

View