About me

Currently, I am a Ph.D. student in the department of Computer Science at Purdue University , working on computer security and system security in PurSec Lab. I am fortunate to be advised by Prof. Z.Berkay Celik and Prof. Antonio Bianchi. Before joining Purdue, I received my M.S and B.S from Computer Engineering department at METU in 2020 and 2017, respectively.

After completing bachelor's degree, I worked at Comodo , evaluating the malware detection and classification. I also interned at SAP and eNTERFACE'15 when I was undergrad.

Research Interests

  • Android security and privacy [1]
  • Safety and security of multi robot navigation systems [2]
  • Automated network protocol reverse engineering [in progress]
  • Practical deep learning applications (e.g., LLM) in security

Updates

Oct 2024

Thrilled to be named as a Windracers Fellow.

Sep 2024

We presented a poster on the use case concepts of PUP at the AIrTonomy Workshop.

Mar 2024

Our research on Protecting Privacy in Wearable Devices is appeared at Purdue Today.

Jan 2024

I started serving at NSF ACTION GATE 2023.

Aug 2023

Our Paper on Runtime Permission Models on Wearables is accepted to IEEE S&P 2024!

Jun 2023

I attended the CyberTruck Challenge!

Jan 2023

We won the Google ASPIRE award!

Dec 2022

We received a bug bounty!

Oct 2022

My colleagues and I gave a talk at Google remotely as part of the Google ASPIRE project.

Sep 2022

We presented a demo about our Sandia project.

Jul 2022

We submitted a Bug Report to Google!

May 2022

We started a project with Sandia Labs.

Aug 2021

I started my PhD at Purdue University.

Publications

  • Automated Discovery of Semantic Attacks in Multi-Robot Navigation Systems
    Doguhan Yeke, Kartik A. Pant, Muslum Ozgur Ozmen, Hyungsub Kim, James M. Goppert, Inseok Hwang, Antonio Bianchi, Z. Berkay Celik.
    The 34th USENIX Security Symposium (Security'25), Seattle, WA, August 2025
    [paper]
  • Wear's my Data? Understanding the Cross-Device Runtime Permission Model in Wearables
    Doguhan Yeke, Muhammad Ibrahim, Guliz Seray Tuncay, Habiba Farrukh, Abdullah Imran, Antonio Bianchi, Z. Berkay Celik.
    The 45th IEEE Symposium on Security and Privacy (Oakland'24), San Francisco, CA, May 2024
    [paper] [code] [video] [news]

Talks

  • Swarm Robots, Guest Lecturer in CS 36100: Great Issues in CS, Purdue University, Feb 2025
    Delivered an invited lecture introducing drones, drone swarms, and their security challenges. Covered foundational concepts, real-world security issues, countermeasures, and future research directions, followed by an interactive Q&A session.
  • Wear OS project, Android Security and Privacy Research (ASPIRE), Google (remote), Oct 2022
    Presented our research on understanding permission models in wearables, with a focus on Android's evolution from install-time to runtime permissions. Discussed privacy implications and the importance of user consent for sensitive data access, in collaboration with Purdue, Google, and UC Irvine.

Bugs discovered

  • Location Privacy, awarded $500 bug bounty, Android Bug Bounty, Google [Details]

Services

  • External reviewer at USENIX Security 2024
  • External reviewer at IEEE S&P 2023, 2024
  • External reviewer at NDSS 2023
  • External reviewer at ACM WiSec 2024

Teaching

CS 307: Software Engineering I (Undergraduate) [Fall 2023, Fall 2022] [Syllabus]
This course introduces students to the issues in software development and the software life cycle, including models such as waterfall and spiral. It covers requirements and design specification, data flow diagrams, entity-relationship diagrams, finite state machines, and Petri-nets. Students learn about software testing (functional and structural), cost and effort estimation, and selected advanced topics such as reliability estimation, parallel program design, and verification methods. The course emphasizes the social implications of software quality and the relationship of software engineering to other disciplines.
CS 251: Data Structures (Undergraduate) [Spring 2022, Fall 2021] [Syllabus]
This course covers the analysis and implementation of fundamental data structures and algorithms. Topics include running time analysis, abstract data types, arrays, linked lists, stacks, queues, trees, binary trees, searching and sorting algorithms, heaps, binary search trees, balanced search trees, hashing, union-find structures, spatial data structures, tries, string algorithms, and an introduction to graphs and graph algorithms. Students gain experience with both theoretical and practical aspects of data structures, preparing them for advanced coursework and software development.
I have also served as a teaching assistant for the following courses at my previous universities:
CEng492: Computer Engineering Design, CEng489: Introduction to Computer Security, CEng350: Software Engineering, CEng331: Computer Organization [Details]

Outreach Activities

I actively participate in outreach activities to inspire and educate the next generation about AI and cyber-physical systems. In 2024 and 2025, I helped lead hands-on workshops and demonstrations for Indiana 4-H Foundation summer camp students, showing how AI can address real-world challenges. [LinkedIn]
For students and practitioners, I prepared a quick hackathon challenge module for SQLi attacks. With various questions, practitioners have a chance to gain hands-on experience with attacking and defending against SQLi attacks. Our module is deployable to your local machine. [Module]
Outreach 2024 Photo 1
[2024]
Outreach 2024 Photo 2
[2024]
Outreach 2025 Photo 3
[2025]