Anupam Datta

Anupam Datta

Associate Professor
Computer Science Department and
Electrical and Computer Engineering Department
Carnegie Mellon University

Anupam Datta

Selected Publications

DBLP


Working Papers:


Monographs, Edited Volumes, Book Chapters:

  • A. Datta (Editor), Proceedings of the 13th ACM Workshop on Privacy in the Electronic Society, ACM Press, November 2014.
  • A. Datta, C. Fournet (Editors), Proceedings of the 27th IEEE Computer Security Foundations Symposium, IEEE Press, July 2014. IEEE Technical Committee on Security and Privacy Outstanding Service Award
  • V. Cortier, A. Datta (Editors), Proceedings of the 26th IEEE Computer Security Foundations Symposium, IEEE Press, June 2013.
  • A. Datta, J. C. Mitchell, A. Roy, S. Stiller, Protocol Composition Logic, book chapter in V. Cortier and S. Kremer (Editors), Formal Models and Techniques for Analyzing Security Protocols, IOS Press, March 2011. [ PDF ]
  • A. Datta, S. Jha, N. Li, D. Melski, T. Reps, Analysis Techniques for Information Security, In series Synthesis Lectures on Computer Science, Morgan and Claypool Publishers , April, 2010.
  • A. Datta, Logical Methods in Security and Privacy, IEEE Security and Privacy 8(6), 86-89 (2010). [ Paper] Invited Column
  • A. Datta (Editor), Advances in Computer Science, Information Security and Privacy: Proceedings of the 13th Asian Computing Science Conference, Lecture Notes in Computer Science, Vol. 5913, Springer, December 2009.
  • A. Roy, A. Datta, A. Derek, J. C. Mitchell, J.-P. Seifert, Secrecy Analysis in Protocol Composition Logic, book chapter in O. Grumberg, T. Nipkow and C. Pfaller (Editors), Formal Logical Methods for System Security and Correctness, Volume 14 NATO Science for Peace and Security Series - D: Information and Communication Security, IOS Press, March 2008. [PDF ]

Journal, Conference, and Workshop Publications:

Human Computable Protocols

  • J. Blocki, S. Komanduri, L. Cranor, A. Datta, Spaced Repetition and Mnemonics Enable Recall of Multiple Strong Passwords, in Proceedings of Network and Distributed System Security Symposium, February 2015. [Full Version]
  • J. Blocki, M. Blum, A. Datta, Naturally Rehearsing Passwords, in Proceedings of Asiacrypt, December 2013. [Full Version]
  • J. Blocki, M. Blum, A. Datta, GOTCHA Password Hackers!, in Proceedings of ACM Workshop on Artificial Intelligence and Security (AISec), November 2013. [Full Version]

Privacy, Audit and Accountability

  • O. Chowdhury, L. Jia, D. Garg, A. Datta, Temporal Mode-Checking for Runtime Monitoring of Privacy Policies, in Proceedings of 26th International Conference on Computer Aided Verification, July 2014. [Paper] [Full Version]
  • S. Sen, S. Guha, A. Datta, S. Rajamani, J. Tsai, J. M. Wing, Bootstrapping Privacy Compliance in Big Data Systems, in Proceedings of 35th IEEE Symposium on Security and Privacy, May 2014. [Paper] Best Student Paper Award
  • S. E. Oh, J.Y. Chun, L. Jia, D. Garg, C. A. Gunter, A. Datta, Privacy-preserving audit for broker-based health information exchange, in Proceedings of 4th ACM Conference on Data and Application Security and Privacy, March 2014.
  • A. Datta, Privacy through Accountability: A Computer Science Perspective, in Proceedings of 10th International Conference on Distributed Computing and Internet Technology, February 2014. [Paper] Invited Paper
  • J. Blocki, N. Christin, A. Datta, A. Sinha, Adaptive Regret Minimization in Bounded-Memory Games, in Proceedings of 4th Conference on Decision and Game Theory for Security, November 2013. [Full Version]
  • M. C. Tschantz, A. Datta, J. M. Wing, Purpose Restrictions on Information Use, in Proceedings of 18th European Symposium on Research in Computer Security, September 2013. [Full Version]
  • J. Blocki, N. Christin, A. Datta, A. Procaccia, A. Sinha, Audit Games, in Proceedings of 23rd International Joint Conference on Artificial Intelligence, August 2013. [Full Version]
  • O. Chowdhury, A. Gampe, J. Niu, J. von Ronne, J. Bennatt, A. Datta, L. Jia, W. H. Winsborough, Privacy Promises That Can Be Kept: A Policy Analysis Method with Application to the HIPAA Privacy Rule, in Proceedings of 18th ACM Symposium on Access Control Models and Technologies, June 2013.
  • J. Blocki, A. Blum, A. Datta, O. Sheffet, Differentially Private Data Analysis of Social Networks via Restricted Sensitivity, in Proceedings of 4th Innovations in Theoretical Computer Science Conference, January 2013. [Full Version]
  • J. Blocki, N. Christin, A. Datta, A. Sinha, Audit Mechanisms for Provable Risk Management and Accountable Data Governance, in Proceedings of 3rd Conference on Decision and Game Theory for Security, November 2012. [Paper]
  • J. Blocki, A. Blum, A. Datta, O. Sheffet, The Johnson-Lindenstrauss Transform Itself Preserves Differential Privacy, in Proceedings of 53rd Annual IEEE Symposium on Foundations of Computer Science, October 2012. [Full Version]
  • M. C. Tschantz, A. Datta, J. M. Wing, Formalizing and Enforcing Purpose Restrictions in Privacy Policies, in Proceedings of 33rd IEEE Symposium on Security and Privacy, May 2012.[Paper] [Full Version]
  • A. Datta, D. Sharma, A. Sinha, Provable De-anonymization of Large Datasets with Sparse Dimensions, in Proceedings of ETAPS Conference on Principles of Security and Trust, March 2012. [Paper]
  • A. Conley, A. Datta, H. Nissenbaum, D. Sharma, Sustaining both Privacy and Open Justice in the Transition from Local to Online Access to Court Records: A Multidisciplinary Inquiry,Maryland Law Review, 71 Md. L. Rev. 772 (2012). [Paper]

(Preliminary version presented at the 2011 Privacy Law Scholars Conference, June 2011.)

  • D. Garg, L. Jia, A. Datta, Policy Auditing over Incomplete Logs: Theory, Implementation and Applications, in Proceedings of 18th ACM Conference on Computer and Communications Security, October 2011 [Paper] [Full Version]
  • J. Blocki, N. Christin, A. Datta, A. Sinha, Audit Mechanisms for Privacy Protection in Healthcare Environments (Position Paper), in 2nd Usenix Workshop on Health Security and Privacy, August 2011 [Paper]
  • J. Blocki, N. Christin, A. Datta, A. Sinha, Regret Minimizing Audits: A Learning-Theoretic Basis for Privacy Protection, in Proceedings of 24th IEEE Computer Security Foundations Symposium, June 2011 [Paper]
  • M. C. Tschantz, D. Kaynar, A. Datta, Formal Verification of Differential Privacy for Interactive Systems, Extended abstract in Proceedings of the 27th Annual Conference on Mathematical Foundations of Programming Semantics, May 2011. Full Version [ Paper ] Invited Paper
  • H. DeYoung, D. Garg, L. Jia, D. Kaynar, A. Datta, Experiences in the Logical Specification of the HIPAA and GLBA Privacy Laws, in Proceedings of 9th ACM Workshop on Privacy in the Electronic Society, October 2010. [ Paper ] [ FullVersion ]
  • A. Datta, N. Dave, J. C. Mitchell, H. Nissenbaum, D. Sharma, Privacy Challenges in Patient-Centric Health Information Systems (Position Paper), in 1st Usenix Workshop on Health Security and Privacy, August 2010 [Paper]
  • A. Barth, A. Datta, J. C. Mitchell, S. Sundaram, Privacy and Utility in Business Processes, in Proceedings of 20th IEEE Computer Security Foundations Symposium, July 2007. [ Paper ]
  • A. Barth, A. Datta, J. C. Mitchell, H. Nissenbaum, Privacy and Contextual Integrity: Framework and Applications, in Proceedings of 27th IEEE Symposium on Security and Privacy , pp. 184-198, May 2006. [ Paper ]

Trustworthy Systems

  • A. Vasudevan, S. Chaki, L. Jia, J. McCune, J. Newsome, A. Datta. Design, Implementation and Verification of an eXtensible and Modular Hypervisor Framework, in Proceedings of 34th IEEE Symposium on Security and Privacy, May 2013. [ Paper]
  • J. Franklin, S. Chaki, A. Datta, J. McCune, A. Vasudevan, Parametric Verification of Address Space Separation, in Proceedings of ETAPS Conference on Principles of Security and Trust, March 2012. [ Paper] [Full Version] ETAPS Best Paper Nominee
  • D. Garg, J. Franklin, D. Kaynar, A. Datta, Compositional System Security with Interface-Confined Adversaries, in Proceedings of 26th Annual Conference on Mathematical Foundations of Programming Semantics, Electronic Notes in Theoretical Computer Science, May 2010. [ Paper] [ Full Version ] Invited Paper
  • J. Franklin, S. Chaki, A. Datta, A. Seshadri, Scalable Parametric Verification of Secure Systems: How to Verify Reference Monitors without Worrying about Data Structure Size, inProceedings of 31st IEEE Symposium on Security and Privacy, May 2010. [ Paper ]
  • J. McCune, Y. Li, N. Qu, Z. Zhou, A. Datta, V. Gligor, A. Perrig, TrustVisor: Efficient TCB Reduction and Attestation, in Proceedings of 31st IEEE Symposium on Security and Privacy, May 2010. [ Paper ]
  • K. Avijit, A. Datta, R. Harper, Distributed Programming with Distributed Authorization, in Proceedings of 5th ACM SIGPLAN Workshop on Types in Language Design and Implementation, January 2010. [ Paper ]
  • S. Chaki, A. Datta, ASPIER: An Automated Framework for Verifying Security Protocol Implementations, in Proceedings of 22nd IEEE Computer Security Foundations Symposium, July 2009. [ Paper ]
  • A. Datta, J. Franklin, D. Garg, D. Kaynar, A Logic of Secure Systems and its Application to Trusted Computing, in Proceedings of 30th IEEE Symposium on Security and Privacy, May 2009. [ Paper ] [Full Version]
  • D. Garg, J. Franklin, D. Kaynar, A. Datta, A Logic for Reasoning about Networked Secure Systems, in Joint Workshop FCS-ARSPA-WITS (co-located with CSF 2008 and LICS 2008),June 2008. [ Paper ] [ Full Version ]

Protocol Composition Logic

  • A. Roy, A. Datta, A. Derek, J. C. Mitchell, Inductive Trace Properties for Computational Security, in Journal of Computer Security18(6): 1035-1073 (2010). [ Paper]
  • A. Roy, A. Datta, J. C. Mitchell, Formal Proofs of Cryptographic Security of Diffie-Hellman based Protocols, in Proceedings of Symposium On Trustworthy Global Computing, November 2007. [ Paper ]
  • A. Roy, A. Datta, A. Derek, J. C. Mitchell, Inductive Proofs of Computational Secrecy, in Proceedings of 12th European Symposium On Research In Computer Security , September 2007. [ Paper ]
  • A. Datta, A. Derek, J. C. Mitchell, A. Roy, Protocol Composition Logic (PCL), in Electronic Notes in Theoretical Computer Science (Gordon D. Plotkin Festschrift), 2007. [ Paper ] Invited Paper
  • A. Roy, A. Datta, A. Derek, J. C. Mitchell, Inductive Trace Properties for Computational Security, in Proceedings of ACM SIGPLAN and IFIP WG 1.7 7th Workshop on Issues in the Theory of Security, March 2007. (Invited to Special Issue of Journal of Computer Security). [ Paper ] Award Paper
  • A. Roy, A. Datta, A. Derek, J. C. Mitchell, J.-P. Seifert, Secrecy Analysis in Protocol Composition Logic, in Proceedings of 11th Annual Asian Computing Science Conference, December 2006. [ Paper ]
  • A. Datta, A. Derek, J. C. Mitchell, B. Warinschi, Computationally Sound Compositional Logic for Key Exchange Protocols, in Proceedings of 19th IEEE Computer Security Foundations Workshop, pp. 321-334, July 2006. [ Paper ]
  • M. Backes, A. Datta, A. Derek, J. C. Mitchell, M. Turuani, Compositional Analysis of Contract-Signing Protocols, in Theoretical Computer Science, 367(1-2), pp. 33-56, 2006. [ Paper ]
  • C. He, M. Sundararajan, A. Datta, A. Derek, J. C. Mitchell, A Modular Correctness Proof of TLS and IEEE 802.11i, in Proceedings of 12th ACM Conference on Computer and Communications Security, pp. 2-15, November 2005. (Invited to ACM Transactions on Information and System Security, Special Issue of Selected Papers from CCS'05.) [ Paper ] Award Paper
  • A. Datta, A. Derek, J. C. Mitchell, V. Shmatikov, M. Turuani, Probabilistic Polynomial-time Semantics for a Protocol Security Logic, in Proceedings of 32nd International Colloquium on Automata, Languages and Programming, pp. 16-29, July 2005. [ Paper ] Invited Paper
  • A. Datta, A. Derek, J. C. Mitchell, D. Pavlovic, A Derivation System and Compositional Logic for Security Protocols, Journal of Computer Security (Special Issue of Selected Papers from CSFW-16), Vol. 13, pp. 423-482, 2005. [ Paper ]
  • M. Backes, A. Datta, A. Derek, J. C. Mitchell, M. Turuani, Compositional Analysis of Contract-Signing Protocols, in Proceedings of 18th IEEE Computer Security Foundations Workshop, pp. 94-110, June 2005. [ Paper ]
  • A. Datta, A. Derek, J. C. Mitchell, D. Pavlovic, Abstraction and Refinement in Protocol Derivation, in Proceedings of 17th IEEE Computer Security Foundations Workshop, pp. 30-45, June 2004. [ Paper ]
  • A. Datta, A. Derek, J. C. Mitchell, D. Pavlovic, Secure Protocol Composition.
    • In Proceedings of 19th Annual Conference on Mathematical Foundations of Programming Semantics, Electronic Notes in Theoretical Computer Science, Vol. 83, 2004. [ Paper ]
    • Extended abstract in Proceedings of ACM Workshop on Formal Methods in Security Engineering, pp. 11-23, October 2003. [ Paper ]
  • A. Datta, A. Derek, J. C. Mitchell, D. Pavlovic, A Derivation System for Security Protocols and its Logical Formalization, in Proceedings of 16th IEEE Computer Security Foundations Workshop, pp. 109-125, June 2003. (Invited to Journal of Computer Security, Special Issue of Selected Papers from CSFW-16) [ Paper ] Award Paper

Program Equivalence, Games, and Universal Composability


Patent:

  • L. M. Fagan, D. C. Berrios, E. Chou, A. Datta, S. Surendran, Improvements to a System and Method for Indexing Electronic Text, US Patent 6928432, August 2005.

Theses:

  • A. Datta, Security Analysis of Network Protocols: Compositional Reasoning and Complexity-theoretic Foundations, PhD Thesis, Computer Science Department, Stanford University, September 2005. [PS] [PDF]
  • A. Datta, Studies in Authenticated Key Establishment Protocols, MS Thesis, Computer Science Department, Stanford University, May 2002. [ Full thesis ]