Gokila Dorai, PhD

Assistant Professor

  • Augusta GA UNITED STATES
  • Department of Computer & Cyber Sciences

Dr. Dorai’s area of expertise is mobile/IoT forensics research and developing a targeted data extraction system for digital forensics.

Contact

Spotlight

4 min

Can you be hacked while using your mobile device? In a word, yes — here’s how to protect your data

October is Cybersecurity Awareness Month and being aware of all your devices is as important as ever before. Most people are online every day, which opens themselves up to a threat of being hacked. Whether it be a mobile device, laptop, or personal computer, everyone needs to have cyber awareness.Steven Weldon, director of the Cyber Institute at Augusta University’s School of Computer and Cyber Sciences said many straightforward things that can be done to protect devices, such as having lock screens, making sure operating systems are up to date and simply recognizing how, when and where devices are being used.“Smart phones today are probably the most capable computing device that we have and we have it on us all the time,” said Weldon. “The data that can be extracted from these devices can be put together to build a pattern of life on us: where we go, what we do and when we do it. All of this data is potentially at risk if we’re not being careful about who gets access to our smart phones. That’s a great reason to lock the screen and require at least a password or pin to unlock the phone.”Gokila Dorai, PhD, assistant professor in the School of Computer and Cyber Sciences, suggests using biometrics to enhance security.“I would strongly recommend for women, young adults even teenagers, if it’s possible for you to have biometrics as a way to unlock your device, then go for that. These unique ways of unlocking a device would add a layer of protection,” said Dorai.Dorai is one of the growing experts in the field of mobile forensics and her research projects are federally funded. In addition, several SCCS faculty are mentoring undergraduate and graduate students working on cutting edge research related to mobile device security and digital forensics.She also suggested adding a two-factor authentication or multi-factor authentication to add an extra layer of security.When out in the public, it’s easy to connect a mobile device to an unprotected Wi-Fi network. Doing so could open up sites you visit to a hacker. Weldon suggests people should be careful of what apps are used when on public Wi-Fi, since they may expose a lot of personally identifiable information. His suggestion is to use a virtual private network to help protect data that’s being transmitted and received.“We should recognize the data on our smart phones and protect them accordingly,” added Weldon. “Recognizing the value and sensitivity of the data on our smart phones can guide us in how we protect these devices. We may not think as much about the security and privacy of our smart phones as we do about our laptops and desktops. When we think about everything we use our smartphones for, how ubiquitous they are in our lives, we come to realize just how central they are to today’s lifestyle in the digital age.”It’s tough to identify when a mobile device has been hijacked, so both Weldon and Dorai suggest paying close attention to any unusual behavior, even small things such as a battery draining faster than usual. Both are indicators you may need to take corrective actions.Dorai added the government can do more to protect a person’s privacy.“With the introduction of more and more Internet of Things devices in the market, with several different manufacturers, there’s a lot of user data that’s actually getting exchanged. These days, the most valuable thing in the world is data. So stricter measures are required,” she said.She indicated it needs to be a collaborative effort between industry, academia, government, and practitioners to come together and work on ideas to strengthen security.“Yes we want security. We are willing to put up with a little bit of friction for additional security. We want it easy and we generally want it free,” said Weldon. “We don’t read licensing agreements, but we would generally be willing to take certain actions, make certain tradeoffs, to be more secure.”One other major concern are apps in general. While Google Play Store and Apple routinely remove some apps that may be out of date or have security vulnerabilities, they may still be running on a user’s device.“Mobile applications may also hide from you in plain sight in the sense the app icons may not be showing up on the screen, but still they are running in the background,” added Dorai.In essence, the device user is the first line of defense. Taking all the necessary steps to prevent a third party from getting your information is of the utmost importance in the digital age.“I believe a big part of it this discussion is about user awareness. We want that free app but that app is asking for a lot of permissions. There’s an old saying in cybersecurity: if you are not paying for the product, you are the product. There’s also another saying: if it’s smart, it’s vulnerable,” said Weldon.Are you a reporter covering Cybersecurity Awareness Month? If so then let us help with your stories.Steven Weldon is the Director of  Cyber Institute at the School of Computer and Cyber Sciences at Augusta University and is an expert in the areas of cellular and mobile technology, ethics in computer science, scripting and scripting and automation.Gokila Dorai is an Assistant Professor in the School of Computer and Cyber Sciences at Augusta University and is an expert in the areas is mobile/IoT forensics research.Both experts are available for interviews simply click on either icon to arrange a time today.

Gokila Dorai, PhD

Social

Biography

Dr. Gokila Dorai is an Assistant Professor in the School of Computer and Cyber Sciences (SCCS) at Augusta University (AU). Dr. Dorai’s area of expertise is mobile/IoT forensics research. She is passionate about inventing digital tools to help victims and survivors of various digital crimes.

Areas of Expertise

Algorithms
Mobile Computing
loT forensics research
Mobile Research
Digital Crimes
Software Development

Education

Florida State University

Ph.D.

Computer Science & Mobile Forensics

2019

Florida State University

M.S.

Computer Science

2016

R.M.K. Engineering College

B.E.

Computer Science & Engineering

2007

Media Appearances

Protecting your data on even the most unlikely devices

WFXG  tv

2022-12-05

Mobile devices are with us all the time, listening. While your mobile devices are at an increased risk for attacks, even the most unlikely household appliances can be prone to hacking.

You might be wondering what a cellphone and a crock pot could possibly have in common? But, they are each susceptible to attacks if they have are connected to the internet. “It could be a coffee maker, it could be something that your wearing on your hands, something for monitoring health,” says Dr. Gokila Dorai, an assistant professor, at Augusta Universities, School of Computer and Cyber Sciences.

View More

‘Tis the season to spend money online: How to have a scam free holiday

WJBF  tv

2022-12-13

‘Tis the season for shopping and these days more people shop and donate online during the holidays than ever before. Scammers know this and are ready to steal your hard earned money. But how do you know if the website you are on is legitimate?

If someone reaches out to you, asking for a charitable donation, always ask for the name, mission, and location of the charity.

Watch out for people that ask you to pay in crypto currency, prepaid debit cards, gift cards, wire transfers, or bank transfers. It’s likely a scam.

View More

Answers

What is a good way to better protect your mobile device?
Gokila Dorai, PhD

“I would strongly recommend for women, young adults even teenagers, if it’s possible for you to have biometrics as a way to unlock your device, then go for that. These unique ways of unlocking a device would add a layer of protection."

Articles

VIDE - Vault App Identification and Extraction System for iOS Devices

Forensic Science International: Digital Investigation

2020
Content hiding (or vault) apps are a class of applications that allow users to hide photos, videos, documents and other content securely. A subclass of these applications called decoy apps further supports secret hiding by having a mode which mimics standard apps such as calculators but can turn into a vault app through entering a specific input. In this work we focus on iOS devices and first describe how to identify content hiding applications from the App Store. We consider not only the US Store but also give results for App Stores in Russia, India and China. We show an effective and very fast identification of content hiding apps through a two-phase process: initial categorization using keywords followed by more precise binary classification. We next turn to understanding the behavior and features of these vault apps and how to extract the hidden information from artifacts of the app's stored data.

View more

Data Extraction and Forensic Analysis for Smartphone Paired Wearables and IoT Devices

Internet of Things: Providing Services Using Smart Devices, Wearables, and Quantified Self

2020
Wearable devices and Internet of Things (IoT) devices have marked the beginning of a new era in forensic science. Data from smart home gadgets and wearable devices can serve as an important "witness" in civil as well as criminal cases. Thus data extracted from these devices has started to impact and transform litigation. Data collected from wearable devices can help determine truths in witness testimony since these devices document several types of activities of an individual at all times. Increased use of smart home devices also opens a new window for investigators.

View more

Analysis of iOS SQLite Schema Evolution for Updating Forensic Data Extraction Tools

2020 8th International Symposium on Digital Forensics and Security (ISDFS)

2020
Files in the backup of iOS devices can be a potential source of evidentiary data. Particularly, the iOS backup (obtained through a logical acquisition technique) is widely used by many forensic tools to sift through the data. A significant challenge faced by several forensic tool developers is the changes in the data organization of the iOS backup. This is due to the fact that the iOS operating system is frequently updated by Apple Inc. Many iOS application developers release periodical updates to iOS mobile applications.

View more

Show All +