Sonali Sharma

Work place: Department of CSE & IT Global Institute of Technology and management, Gurugram, India



Research Interests: Computer Architecture and Organization, Application Security, Hardware Security, Information Security, Network Security, Data Structures and Algorithms, Information-Theoretic Security


Sonali Sharma received her Bachelor of engineering in Computer Science from Amity University, Gurgaon, India in 2015. She received her Masters of engineering in Computer Science with specialization in Cyber security from The NorthCap University, Gurgaon, India in 2017. Her research areas include Design and implementation of malware detection using static and dynamic analysis, Creation of antivirus which can detect and remove ransomware, cyber security, network and system security, information security and intrusion detection. Currently, she is working as an Assistant professor of Computer Science and Information Technology Department in Global Institute of Technology and management, Gurugram, Haryana, India.

Author Articles
Design and Implementation of Malware Detection Scheme

By Sonali Sharma

DOI:, Pub. Date: 8 Aug. 2018

Malware is a worldwide epidemic and studies suggest that with the evolution of internet it is getting even worse. There is a new virus implemented every minute and various relevant strategies and tactics have been proposed to alleviate and eradicate cyber threats. Therefore, major concern for the researchers today is to detect and mitigate such programs. In this paper an effort has been made to propose a system which will detect some dangerous viruses and some features of the recently emerged new form of malware in cyberspace known as Ransomware. Imposing serious threats to information assets protection ransomware victimizes the internet users by hijacking user files, encrypting them, then demanding a ransom to be paid in exchange of the decryption key. The proposed program aims to scan the system to get hold of all vulnerable files present on the system and to detect the malicious one’s and remove them.

[...] Read more.
Design and Implementation of a Security Scheme for Detecting System Vulnerabilities

By Sonali Sharma Shilpa Mahajan

DOI:, Pub. Date: 8 Oct. 2017

With evolution of internet, security becomes a major concern. Number of malicious programs called malware, travels through network into systems. They have many advanced properties like self-hiding, self-healing and stealth mode execution, which are hard to detect. Therefore, the major challenge for researchers today is to detect and mitigate such programs. Since there is a new virus implemented every minute no detection mechanism can be designed which gives 100% protection but by keeping the anti-virus database up to date we can escape many attacks. In this paper, an effort has been made to explain the design of a system program which can scan the vulnerable files on the system, generate logs and this can later be used to design antivirus software and stop virus execution. This program aims to scan system files and target the files which are vulnerable present on the system based on their file extensions. It generates logs after the system scan is complete which can be studied and used for anti-virus creation.

[...] Read more.
Other Articles