Anupam Datta

Associate Professor
Computer Science Department and
Electrical and Computer Engineering Department
Carnegie Mellon University
PhD 2005, Computer Science, Stanford University

Anupam Datta

Compositional Security

The goal of this project is to develop a general theory of compositional security. This theory will enable the modular analysis of security properties of systems as well as modular construction of secure systems.

 

Overview

 

A Domain-Independent Theory of Compositional Security

  • D. GargJ. FranklinD. KaynarA. Datta, Compositional System Security with Interface-Confined Adversaries, in Proceedings of 26th Annual Conference on Mathematical Foundations of Programming Semantics, Electronic Notes in Theoretical Computer Science, May 2010. [ Paper] [ Full Version ]  Invited Paper

 

Domain-Specific Theories of Compositional Security

 

Protocol Composition Logic (PCL) (A Logic for Compositional Reasoning about Security Protocols) 

  • A. RoyA. Datta, A. Derek, J. C. Mitchell, Inductive Trace Properties for Computational Security, in Journal of Computer Security18(6): 1035-1073 (2010). [ Paper]
  • A. RoyA. DattaJ. C. Mitchell, Formal Proofs of Cryptographic Security of Diffie-Hellman based Protocols, in Proceedings of Symposium On Trustworthy Global Computing, November 2007. [ Paper ]
  • A. RoyA. Datta, A. Derek, J. C. Mitchell, Inductive Proofs of Computational Secrecy, in Proceedings of 12th European Symposium On Research In Computer Security , September 2007. [ Paper ]
  • A. Datta, A. Derek, J. C. MitchellA. Roy, Protocol Composition Logic (PCL), in Electronic Notes in Theoretical Computer Science (Gordon D. Plotkin Festschrift), 2007. [ Paper ]   Invited Paper
  • A. RoyA. Datta, A. Derek, J. C. Mitchell, Inductive Trace Properties for Computational Security, in Proceedings of ACM SIGPLAN and IFIP WG 1.7  7th Workshop on Issues in the Theory of Security, March 2007. (Invited to Special Issue of Journal of Computer Security). [ Paper ]    Award Paper
  • A. RoyA. Datta, A. Derek, J. C. Mitchell, J.-P. Seifert, Secrecy Analysis in Protocol Composition Logic, in Proceedings of 11th Annual Asian Computing Science Conference, December 2006. [ Paper ]
  • A. Datta, A. Derek, J. C. MitchellB. Warinschi, Computationally Sound Compositional Logic for Key Exchange Protocols, in Proceedings of 19th IEEE Computer Security Foundations Workshop, pp. 321-334, July 2006. [ Paper ]
  • M. BackesA. Datta, A. Derek, J. C. MitchellM. Turuani, Compositional Analysis of Contract-Signing Protocols, in Theoretical Computer Science, 367(1-2), pp. 33-56, 2006. [ Paper ]
  • C. He, M. Sundararajan, A. Datta, A. Derek, J. C. Mitchell, A Modular Correctness Proof of TLS and IEEE 802.11i, in Proceedings of 12th ACM Conference on Computer and Communications Security, pp. 2-15, November 2005. (Invited to ACM Transactions on Information and System Security, Special Issue of Selected Papers from CCS'05.) [ Paper ]    Award Paper
  • A. Datta, A. Derek, J. C. MitchellV. ShmatikovM. Turuani, Probabilistic Polynomial-time Semantics for a Protocol Security Logic, in Proceedings of 32nd International Colloquium on Automata, Languages and Programming, pp. 16-29, July 2005. [ Paper ]    Invited Paper
  • A. Datta, A. Derek, J. C. MitchellD. Pavlovic, A Derivation System and Compositional Logic for Security Protocols, Journal of Computer Security (Special Issue of Selected Papers from CSFW-16), Vol. 13, pp. 423-482, 2005. [ Paper ]
  • M. BackesA. Datta, A. Derek, J. C. MitchellM. Turuani, Compositional Analysis of Contract-Signing Protocols, in Proceedings of 18th IEEE Computer Security Foundations Workshop, pp. 94-110, June 2005. [ Paper ]
  • A. Datta, A. Derek, J. C. MitchellD. Pavlovic, Abstraction and Refinement in Protocol Derivation, in Proceedings of 17th IEEE Computer Security Foundations Workshop, pp. 30-45, June 2004. [ Paper ]
  • A. Datta, A. Derek, J. C. MitchellD. Pavlovic, Secure Protocol Composition.
    • In Proceedings of 19th Annual Conference on Mathematical Foundations of Programming Semantics, Electronic Notes in Theoretical Computer Science, Vol. 83, 2004. [ Paper ]
    • Extended abstract in Proceedings of ACM  Workshop on Formal Methods in Security Engineering, pp. 11-23, October 2003. [ Paper ]
  • A. Datta, A. Derek, J. C. MitchellD. Pavlovic, A Derivation System for Security Protocols and its Logical Formalization, in Proceedings of 16th IEEE Computer Security Foundations Workshop, pp. 109-125, June 2003. (Invited to Journal of Computer Security, Special Issue of Selected Papers from CSFW-16) Paper ]    Award Paper