Jump to Content
Umesh Shankar

Umesh Shankar

Umesh Shankar is a Distinguished Engineer and the Chief Technologist for Google Cloud Security. He leads many cross-cutting initiatives, most notably Google Cloud's Security AI efforts. In his 17 years at Google, Umesh has led a number of foundational security and privacy initiatives, including the creation of the Data Protection effort at Google, building global infrastructure for key management, authentication, authorization, insider risk, software supply chain security, data governance, and Access Transparency, to keep users' data safe across all Google’s products and Google Cloud Platform. He previously led the Google Assistant Ecosystem team, including its developer platform, identity, monetization, and discovery services. Umesh has a Ph.D. in computer science from the University of California, Berkeley, and an A.B. from Harvard University. He is an avid soccer player, mixologist, clarinetist, husband, and dad to three boys.
Authored Publications
Google Publications
Other Publications
Sort By
  • Title
  • Title, descending
  • Year
  • Year, descending
    Cloud Data Protection for the Masses
    Dawn Song
    Elaine Shi
    Ian Fischer
    Computer, vol. 45, no. 1 (2012), pp. 39-45
    Preview abstract Offering strong data protection to cloud users while enabling rich applications is a challenging task. Researchers explore a new cloud platform architecture called Data Protection as a Service, which dramatically reduces the per-application development effort required to offer data protection, while still allowing rapid development and maintenance. View details
    Preview abstract The current health system lacks assurances to patients of data retention and privacy control. We argue that this is due to discrepancies in how health data is reported and consumed and contrast this with how financial credit data is reported and consumed. To address these health system gaps in protection of medical data, we would like to evangelize the implementation of health record trusts. Finally, we argue that Personal Health Records (PHRs) are the closest to offering the main features of health record trusts. View details
    Preview abstract There are several challenges in aggregating health records from multiple sources, including merging data, preserving proper attribution, and allowing corrections. unfortunately, standards for exchanging medical records data, such as CCR and CCD, tend to focus on representing particular clinical data as some subset of a patient’s complete record. This provides a snapshot of a patient record, but there is very little to describe how a sequence of changes to the record should be interpreted as a coherent whole.there is something available that gives us the data aggregation, conflict resolution, and audit trail that what we want: the Wave federation protocol. View details
    Dynamic Pharming Attacks and Locked Same-Origin Policies for Web Browsers
    Chris Karlof
    J. D. Tygar
    David Wagner
    Conference on Computer and Communications Security, ACM, Alexandria, VA (2007)
    Doppelganger: Better Browser Privacy Without the Bother
    Chris Karlof
    Proceedings of the 13th ACM Conference on Computer and Communications Security (CCS 2006), ACM Press, New York, NY, USA
    Preventing Secret Leakage from fork(): Securing Privilege-Separated Applications
    David Wagner
    Proceedings of the 2006 IEEE International Conference on Communications (Network Security and Information Assurance Symposium at ICC 2006)
    Toward Automated Information-Flow Integrity Verification for Security-Critical Applications
    Trent Jaeger
    Reiner Sailer
    NDSS (2006)
    PRIMA: policy-reduced integrity measurement architecture
    Trent Jaeger
    Reiner Sailer
    SACMAT (2006), pp. 19-28
    Side Effects Are Not Sufficient to Authenticate Software
    Monica Chew
    J. D. Tygar
    USENIX Security Symposium (2004), pp. 89-102
    Secure verification of location claims
    Naveen Sastry
    David Wagner
    ACM Workshop on Wireless Security (WiSE) (2003), pp. 1-10
    Active Mapping: Resisting NIDS Evasion without Altering Traffic
    Vern Paxson
    IEEE Symposium on Security and Privacy (2003), pp. 44-61
    Multiscale Stepping-Stone Detection: Detecting Pairs of Jittered Interactive Streams by Exploiting Maximum Tolerable Delay
    David L. Donoho
    Ana Georgina Flesia
    Vern Paxson
    Jason Coit
    Stuart Staniford
    Proceedings of the 5th International Symposium on Recent Advances in Intrusion Detection (RAID) (2002), pp. 17-35
    Detecting Format String Vulnerabilities with Type Qualifiers
    Kunal Talwar
    Jeffrey S. Foster
    David Wagner
    Proceedings of the 10th USENIX Security Symposium (2001)