About me
Currently, I am a Ph.D. student in the department of Computer Science at Purdue University , working on computer security and system security in PurSec Lab. I am fortunate to be advised by Prof. Z.Berkay Celik and Prof. Antonio Bianchi. Before joining Purdue, I received my M.S and B.S from Computer Engineering department at METU in 2020 and 2017, respectively.After completing bachelor's degree, I worked at Comodo , evaluating the malware detection and classification. I also interned at SAP and eNTERFACE'15 when I was undergrad.
Research Interests |
- Android security and privacy [1]
- Safety and security of multi robot navigation systems [2]
- Automated network protocol reverse engineering [in progress]
- Practical deep learning applications (e.g., LLM) in security
Updates |
Thrilled to be named as a Windracers Fellow.
We presented a poster on the use case concepts of PUP at the AIrTonomy Workshop.
Our research on Protecting Privacy in Wearable Devices is appeared at Purdue Today.
I started serving at NSF ACTION GATE 2023.
Our Paper on Runtime Permission Models on Wearables is accepted to IEEE S&P 2024!
I attended the CyberTruck Challenge!
We won the Google ASPIRE award!
We received a bug bounty!
My colleagues and I gave a talk at Google remotely as part of the Google ASPIRE project.
We presented a demo about our Sandia project.
We submitted a Bug Report to Google!
We started a project with Sandia Labs.
I started my PhD at Purdue University.
Publications |
-
Automated Discovery of Semantic Attacks in Multi-Robot Navigation Systems
Doguhan Yeke, Kartik A. Pant, Muslum Ozgur Ozmen, Hyungsub Kim, James M. Goppert, Inseok Hwang, Antonio Bianchi, Z. Berkay Celik.
The 34th USENIX Security Symposium (Security'25), Seattle, WA, August 2025
[paper] -
Wear's my Data? Understanding the Cross-Device Runtime Permission Model in Wearables
Doguhan Yeke, Muhammad Ibrahim, Guliz Seray Tuncay, Habiba Farrukh, Abdullah Imran, Antonio Bianchi, Z. Berkay Celik.
The 45th IEEE Symposium on Security and Privacy (Oakland'24), San Francisco, CA, May 2024
[paper] [code] [video] [news]
Talks |
-
Swarm Robots, Guest Lecturer in CS 36100: Great Issues in CS, Purdue University, Feb 2025
Delivered an invited lecture introducing drones, drone swarms, and their security challenges. Covered foundational concepts, real-world security issues, countermeasures, and future research directions, followed by an interactive Q&A session. -
Wear OS project, Android Security and Privacy Research (ASPIRE), Google (remote), Oct 2022
Presented our research on understanding permission models in wearables, with a focus on Android's evolution from install-time to runtime permissions. Discussed privacy implications and the importance of user consent for sensitive data access, in collaboration with Purdue, Google, and UC Irvine.
Bugs discovered |
- Location Privacy, awarded $500 bug bounty, Android Bug Bounty, Google [Details]
Services |
- External reviewer at USENIX Security 2024
- External reviewer at IEEE S&P 2023, 2024
- External reviewer at NDSS 2023
- External reviewer at ACM WiSec 2024
Teaching |
This course introduces students to the issues in software development and the software life cycle, including models such as waterfall and spiral. It covers requirements and design specification, data flow diagrams, entity-relationship diagrams, finite state machines, and Petri-nets. Students learn about software testing (functional and structural), cost and effort estimation, and selected advanced topics such as reliability estimation, parallel program design, and verification methods. The course emphasizes the social implications of software quality and the relationship of software engineering to other disciplines.
This course covers the analysis and implementation of fundamental data structures and algorithms. Topics include running time analysis, abstract data types, arrays, linked lists, stacks, queues, trees, binary trees, searching and sorting algorithms, heaps, binary search trees, balanced search trees, hashing, union-find structures, spatial data structures, tries, string algorithms, and an introduction to graphs and graph algorithms. Students gain experience with both theoretical and practical aspects of data structures, preparing them for advanced coursework and software development.
CEng492: Computer Engineering Design, CEng489: Introduction to Computer Security, CEng350: Software Engineering, CEng331: Computer Organization [Details]
Outreach Activities |


