Anushka works in cyber-physical security, focused on OT/ICS, embedded systems, and networked autonomous platforms. Her approach treats nature as architecture - biological first principles applied to system design, security, and resilience.
Her research spans offensive security and autonomous systems - adversarial analysis on industrial protocols, RF signal exploitation, and edge-autonomous stacks operating in contested environments.
Her methodology integrates zero-trust and secure-by-design frameworks with threat modelling, digital twin simulation, and penetration testing.
Industrial control systems, PLCs, SCADA, and robotic platforms. Protocol-level research across Modbus, DNP3, and EtherNet/IP. Threat modelling for cyber-physical environments including autonomous vehicles and edge-deployed robotics.
Deep packet analysis, network exploitation, and adversarial threat hunting. TCP/IP, DNS, TLS internals. APT behavioural analysis and vulnerability scanning across enterprise and industrial network stacks.
Application-layer vulnerability research, manual testing, and attack surface mapping. Bug bounty and coordinated disclosure.
Adversarial simulation, stealth and evasion, C2 frameworks, persistence mechanisms, lateral movement, and living-off-the-land techniques. The long game.
Black box, grey box, and white box engagements across network, web application, and OT/ICS environments. Structured methodology from recon through reporting and remediation.
Autonomous recon, LLM-assisted exploitation, AI-driven persistence and evasion. Adversarial attacks on ML systems embedded in cyber-physical infrastructure. How AI inference pipelines at the edge of autonomous and industrial platforms reshape the attack surface.