Skip to main content

Anupam Datta

Associate Professor, Electrical and Computer Engineering, School of Computer Science, and CyLab

[Email]

Anupam Datta

Research Areas

Next Generation Secure and Available Networks, Privacy Protection, Trustworthy Computing Platforms and Devices

Cross Cutting Thrusts

Business Risk Analysis and Economic Implications, Cryptography, Formal Methods, Software Security

Biography

Anupam Datta is an Associate Professor at Carnegie Mellon University where he holds a joint appointment in the Computer Science and Electrical and Computer Engineering Departments. His research focuses on the scientific foundations of security and privacy. Datta’s work has led to new principles for securely composing cryptographic protocols and software systems; applications of these principles have influenced several IEEE and IETF standards. His work on privacy protection has led to formalizations of privacy as contextual integrity and purpose restrictions on information use; accountability mechanisms for privacy protection; and their applications in healthcare and Web privacy. Datta has authored a book and over 40 other publications on these topics. He serves on the Steering Committee and as the 2013-14 Program Co-Chair of the IEEE Computer Security Foundations Symposium. Datta obtained Ph.D. (2005) and M.S. (2002) degrees from Stanford University and a B.Tech. (2000) from IIT Kharagpur, all in Computer Science.

Education

PhD 2005. Computer Science, Stanford University
MS 2002. Computer Science, Stanford University
BTech 2000. Computer Science & Engineering, IIT Kharagpur

Additional Resources

Research Projects

Compositional Security

Research Area: Trustworthy Computing Platforms and Devices
Cross Cutting Thrusts: Formal Methods | Software Security
Researchers: Anupam Datta, Limin Jia, Amit Vasudevan, Sagar Chaki

Deterrence via Intermittent Auditing

Research Area: Next Generation Secure and Available Networks
Researchers: Anupam Datta, Virgil Gligor

Privacy, Audit and Accountability

Research Area: Privacy Protection
Researchers: Anupam Datta, Limin Jia

Trustworthy Computing Platforms and Devices

Research Area: Trustworthy Computing Platforms and Devices
Researchers: Virgil Gligor, Anupam Datta, Adrian Perrig, Amit Vasudevan, Limin Jia

Verifiable Properties of Computations Outsourced to the Cloud

Cross Cutting Thrusts: Cryptography
Researchers: Virgil Gligor, Anupam Datta, Amit Vasudevan

Techniques for Compositional Security: Foundations, Mechanized Reasoning and Applications

Research Area: Trustworthy Computing Platforms and Devices
Cross Cutting Thrusts: Formal Methods | Software Security
Researchers: Anupam Datta, Limin Jia, Deepak-Garg

Formalizing and Enforcing Privacy

Research Area: Privacy Protection
Cross Cutting Thrusts: Formal Methods
Researchers: Anupam Datta, Limin Jia, Jeremiah Blocki, Zeliha Dilsun Kaynar, Divya Sharma, Arunesh Sinha, Michael Tschantz

Designing Security Kernels for Verification

Research Area: Trustworthy Computing Platforms and Devices
Researchers: Anupam Datta, Jonathan McCune

Principled Approach to Web Security

Cross Cutting Thrusts: Software Security | Formal Methods
Researchers: Anupam Datta, Limin Jia, Deepak Garg

On Privacy and Compliance

Research Area: Privacy Protection
Cross Cutting Thrusts: Cryptography
Researchers: Anupam Datta, Zeliha Dilsun Kaynar

Security and Privacy Risk Management in Organizations

Cross Cutting Thrusts: Business Risk Analysis and Economic Implications
Researchers: Nicolas Christin, Anupam Datta

Trusted Computing

Research Area: Trustworthy Computing Platforms and Devices
Researchers: Anupam Datta, Adrian Perrig, Virgil Gligor, Amit Vasudevan

Publications

 "Privacy-preserving audit for broker-based health information exchange". S. E. Oh, J. Y. Chun, L. Jia, D. Garg, C. A. Gunter, and A. Datta, in Fourth ACM Conference on Data and Application Security and Privacy, CODASPY’14, San Antonio, TX, USA - March 03 - 05, 2014, pp. 313–320, 2014.

"Temporal Mode-Checking for Runtime Monitoring of Privacy Policies". O. Chowdhury, L. Jia, D. Garg, and A. Datta, in Proceedings of the 16th International Conference on Computer Aided Verification - Volume 8559, New York, NY, USA: Springer-Verlag New York, Inc., pp. 131–149, 2014.

"Power napping with loud neighbors: optimal energy-constrained jamming and anti-jamming". B. DeBruhl, C. Kroer, A. Datta, T. Sandholm, and P. Tague, Proceedings of 7th ACM Conference on Security & Privacy in Wireless and Mobile Networks, 2014.

"Privacy through Accountability: A Computer Science Perspective". A. Datta, Proceedings of 10th International Conference on Distributed Computing and Internet Technology, 2014.

"Bootstrapping Privacy Compliance in Big Data Systems". S. Sen, S. Guha, A. Datta, S. Rajamani, J. Tsai, and J. M. Wing, Proceedings of 35th IEEE Symposium on Security and Privacy, 2014.

"A Methodology for Information Flow Experiments". M. C. Tschantz, A. Datta, A. Datta, and J. M. Wing,  2014.

"Human Computable Passwords". J. Blocki, M. Blum, A. Datta, and S. Vempala,  2014.

"Adaptive Regret Minimization in Bounded-Memory Games". Datta, A., Blocki, J., Sinha, A., & Christin, N. (2013). Conference on Decision and Game Theory for Security (GameSec).

"Differentially Private Data Analysis of Social Networks via Restricted Sensitivity". Blocki, J., Blum, A., Datta, A., & Sheffet, O. (2013). 4th Innocations in Theoretical Computer Science Conference

"GOTCHA Passwork Hackers! ". Datta, A., Blocki, J., & Blum, M. (2013). ACM: Proceedings of the Annual Conference.

"Naturally Rehearsing Passwords". Datta, A., Blocki, J., & Blum, M. (2013). ASIACCS: Proceedings of the ACM Symposium on Information, Computer and Communication Security