Next Generation Secure and Available Networks, Privacy Protection, Trustworthy Computing Platforms and Devices
Cross Cutting Thrusts
Business Risk Analysis and Economic Implications, Cryptography, Formal Methods, Software Security
Anupam Datta is an Associate Professor at Carnegie Mellon University where he holds a joint appointment in the Computer Science and Electrical and Computer Engineering Departments. His research focuses on the scientific foundations of security and privacy. Datta’s work has led to new principles for securely composing cryptographic protocols and software systems; applications of these principles have influenced several IEEE and IETF standards. His work on privacy protection has led to formalizations of privacy as contextual integrity and purpose restrictions on information use; accountability mechanisms for privacy protection; and their applications in healthcare and Web privacy. Datta has authored a book and over 40 other publications on these topics. He serves on the Steering Committee and as the 2013-14 Program Co-Chair of the IEEE Computer Security Foundations Symposium. Datta obtained Ph.D. (2005) and M.S. (2002) degrees from Stanford University and a B.Tech. (2000) from IIT Kharagpur, all in Computer Science.
PhD 2005. Computer Science, Stanford University
MS 2002. Computer Science, Stanford University
BTech 2000. Computer Science & Engineering, IIT Kharagpur
Research Area: Trustworthy Computing Platforms and Devices
Cross Cutting Thrusts: Formal Methods | Software Security
Researchers: Anupam Datta, Limin Jia, Amit Vasudevan, Sagar ChakiResearch Area: Next Generation Secure and Available Networks
Researchers: Anupam Datta, Virgil GligorResearch Area: Privacy Protection
Researchers: Anupam Datta, Limin JiaResearch Area: Trustworthy Computing Platforms and Devices
Researchers: Virgil Gligor, Anupam Datta, Adrian Perrig, Amit Vasudevan, Limin JiaCross Cutting Thrusts: Cryptography
Researchers: Virgil Gligor, Anupam Datta, Amit VasudevanResearch Area: Trustworthy Computing Platforms and Devices
Cross Cutting Thrusts: Formal Methods | Software Security
Researchers: Anupam Datta, Limin Jia, Deepak-GargResearch Area: Privacy Protection
Cross Cutting Thrusts: Formal Methods
Researchers: Anupam Datta, Limin Jia, Jeremiah Blocki, Zeliha Dilsun Kaynar, Divya Sharma, Arunesh Sinha, Michael TschantzResearch Area: Trustworthy Computing Platforms and Devices
Researchers: Anupam Datta, Jonathan McCuneCross Cutting Thrusts: Software Security | Formal Methods
Researchers: Anupam Datta, Limin Jia, Deepak GargResearch Area: Privacy Protection
Cross Cutting Thrusts: Cryptography
Researchers: Anupam Datta, Zeliha Dilsun KaynarCross Cutting Thrusts: Business Risk Analysis and Economic Implications
Researchers: Nicolas Christin, Anupam DattaResearch Area: Trustworthy Computing Platforms and Devices
Researchers: Anupam Datta, Adrian Perrig, Virgil Gligor, Amit Vasudevan
"Privacy-preserving audit for broker-based health information exchange". S. E. Oh, J. Y. Chun, L. Jia, D. Garg, C. A. Gunter, and A. Datta, in Fourth ACM Conference on Data and Application Security and Privacy, CODASPY’14, San Antonio, TX, USA - March 03 - 05, 2014, pp. 313–320, 2014.
"Temporal Mode-Checking for Runtime Monitoring of Privacy Policies". O. Chowdhury, L. Jia, D. Garg, and A. Datta, in Proceedings of the 16th International Conference on Computer Aided Verification - Volume 8559, New York, NY, USA: Springer-Verlag New York, Inc., pp. 131–149, 2014.
"Power napping with loud neighbors: optimal energy-constrained jamming and anti-jamming". B. DeBruhl, C. Kroer, A. Datta, T. Sandholm, and P. Tague, Proceedings of 7th ACM Conference on Security & Privacy in Wireless and Mobile Networks, 2014.
"Privacy through Accountability: A Computer Science Perspective". A. Datta, Proceedings of 10th International Conference on Distributed Computing and Internet Technology, 2014.
"Bootstrapping Privacy Compliance in Big Data Systems". S. Sen, S. Guha, A. Datta, S. Rajamani, J. Tsai, and J. M. Wing, Proceedings of 35th IEEE Symposium on Security and Privacy, 2014.
"A Methodology for Information Flow Experiments". M. C. Tschantz, A. Datta, A. Datta, and J. M. Wing, 2014.
"Human Computable Passwords". J. Blocki, M. Blum, A. Datta, and S. Vempala, 2014.
"Adaptive Regret Minimization in Bounded-Memory Games".
Datta, A., Blocki, J., Sinha, A., & Christin, N. (2013). Conference on Decision and Game Theory for Security (GameSec).
"Differentially Private Data Analysis of Social Networks via Restricted Sensitivity".
Blocki, J., Blum, A., Datta, A., & Sheffet, O. (2013). 4th Innocations in Theoretical Computer Science Conference
"GOTCHA Passwork Hackers! ".
Datta, A., Blocki, J., & Blum, M. (2013). ACM: Proceedings of the Annual Conference.
"Naturally Rehearsing Passwords".
Datta, A., Blocki, J., & Blum, M. (2013). ASIACCS: Proceedings of the ACM Symposium on Information, Computer and Communication Security
- Carnegie Mellon Transparency Reports Make AI Decision-Making Accountable
- Carnegie Mellon, Stanford Researchers Devise Method To Share Password Data Safely
- Ed Felten Advocates Making Privacy Work for Everyone in Celebration of Data Privacy Day
- CyLab Researchers Present at ACM Conference on Computer and Communications Security
- Research Tool AdFisher Monitors Online Ad Ecosystem
CyLab Tech Reports
- (CMU-CyLab-16-004) Tracing Actual Causes
- (CMU-CyLab-15-001) Influence in Classification via Cooperative Game Theory
- (CMU-CyLab-14-005) Temporal Mode-Checking for Runtime Monitoring of Privacy Policies
- (CMU-CyLab-13-005) Purpose Restrictions on Information Use
- (CMU-CyLab-13-004) Audit Games
- CyLab Researchers Share Compelling Work with Silicon Valley Thought Leaders, Technical Experts, Law Enforcement Officials and Media at Fall 2014 Executive Briefing
- Anupam Datta on Impact and Implications of IEEE Award Winning Paper, "Bootstrapping Privacy Compliance in Big Data Systems"
- CyLab Research Sheds Light on Heartbleed and Its Implications
- CyLab's Strong Presence Continues at Annual IEEE Symposium on Security and Privacy
- CyLab's Strong Presence at IEEE Security and Privacy 2012 Packs A Wallop