Attila Altay Yavuz 

NCSU-CoE-CS

Home

Affiliations

Education
Research Interests
Current Research 
Collaborations
Publications
Teaching and Mentoring
Professional Experiences
  Previous  Research 
Professional Services
CV
Research Statement (available upon request)
Teaching Statement
Personal

 

 

Peng Ning

Attila Altay Yavuz, PhD

Robert Bosch LLC,  North America
Research And Technology Center (RTC3)

Work Address: 2835 East Carson St., Suite 210, Pittsburgh, PA 15203.

Personal: 3245 Beechwood Blvd, Apt C-22, Pittsburgh, PA 15217

URL:  http://www4.ncsu.edu/~aayavuz/
E-mail:  attila.yavuz(AT)gmail.com



Employment

I am a research scientist within the security and privacy research group of Robert Bosch Research and Technology Center. I conduct applied cryptography and network security research. My current focus is to develop and execute a research agenda to address the security and privacy requirements of big data technologies (e.g., cloud computing, data outsourcing and analysis) and smart infrastructures (e.g., internet of things and systems, cyber-physical systems).

Affiliations

Adjunct Faculty, University of Pittsburgh, School of Information Sciences, Pittsburgh, PA, USA.

Education

  • North Carolina State University, Raleigh, North Carolina USA
    •  PhD, Computer Science,  January 2007-August 2011,
    • Thesis: Efficient, Compromise Resilient and Compact Cryptographic Constructions for Digital Forensics,
    • Advisor: Prof. Dr. Peng Ning and Prof. Dr. Michael Reiter (University of North Carolina at Chapel Hill).

  • Bogazici University, Istanbul, Turkey 
    • M.S., Computer Science,  September 2004-June 2006,
    • Thesis: Novel Methods for Security Protocols and Key Management Techniques in MANETs based on Signcryption and Hybrid Cryptography,
    • Advisor: Prof. Dr. Fatih Alagoz and Prof. Dr. Emin Anarim.
  • Yildiz Technical University, Istanbul, Turkey
    •  B.S., Computer Science and Engineering,  2004,
    • Thesis: Implementation of a Large Number Arithmetic and RSA Digital Signature Library.

Research Interests

I am interested in design, analysis and application of cryptographic tools and protocols to enhance the security of computer networks and systems. My current research focuses on the following topics: Privacy enhancing technologies (e.g., dynamic symmetric and public key based searchable encryption), security in cloud computing, authentication and integrity mechanisms for resource-constrained devices and large-distributed systems, efficient cryptographic protocols for wireless sensor networks.

Current Research

Efficient Privacy Enhancing Technologies (PETs) for Big Data Technologies
        o Role:
Co-PI,   
        o Duration: 2014-2017,
A fundamental problem in information security is how to achieve the usability (e.g., search and analysis) and privacy of sensitive data simultaneously. Satisfactory solutions to this problem will play a key role for the emergence of applications that rely on secure data outsourcing. Consider a cloud-based application, in which the client outsources some data to the cloud. The client must encrypt the sensitive data to ensure its privacy. However, if only standard encryption methods are used, it is not possible to perform search/analysis on the encrypted data. Privacy Enhancing Technologies (PETs) aim to address these limitations. However, existing PETs are computation or communication/storage costly, therefore cannot meet the requirements of real-life applications.

To address these limitations, I pursue research on Searchable Encryption (SE). I develop Dynamic Symmetric SE (DSSE) and Public Key Encryption with Keyword Search (PEKS) methods to enable practical search on encrypted data. I also develop a searchable encrypted database system and deploy it for Bosch-wide applications. Please see [AY21, AY22, AY23].

Secure Cyber-Physical Systems (CPSs) with Efficient Cryptography (2014-2016)
        o Role: Research Scientist,
        o Duration: 2014-2016,

The security and reliability of CPSs (e.g., smart-grid) have a critical impact on society. The distributed and real-time nature of CPSs creates security and performance challenges. For instance, an emergency shut-down command sent from a control-center should be processed immediately by a large number of peripheral devices. It is therefore, vital to provide efficient authentication and integrity for such systems. Unfortunately, existing security mechanisms are either computationally costly (e.g., standard signatures) or unscalable (e.g., one-time, offline/online signatures). To address these limitations, I have been developing efficient cryptographic schemes. Please see [AY1, AY7, AY8, AY9, AY18, AY19, AY20].

Collaborations

  • University of California Irvine (UCI): Privacy Enhancing Technologies (PETs) and authentication/attestation techniques (with Prof. Dr. Gene Tsudik).
  • University of North Carolina at Chapel Hill: New user friendly authentication methods (with Prof. Dr. Michael K. Reiter).
  • University of Pittsburgh: Security in smart-grid systems (with Prof. Dr. David Tipper) and applied cryptography (with Prof. Dr. James Joshi).

Publications

 Copyright Note: The articles are copyrighted by the respective publishers and may be downloaded only for personal use.

    Journal Papers (SCI/SCI-E)
  • (AY6) Attila A. Yavuz, Emin Anarim and Fatih  Alagoz, "Improved  Merkle  Cryptosystem (IMC),"  Vol.  4263, Lecture Notes in Computer Science (LNCS), page 924-934, Springer-Verlag, November 2006.
   International Conference Papers
  • (AY14) Attila A. Yavuz, Fatih Alagoz and Emin Anarim, "Three-Tier Satellite Security Multicast Security Protocol  Based on  ECMQV  and  IMC  Methods",  Computer-Aided  Modeling,  Analysis  and Design of Communication Links and Networks, (IEEE CAMAD'06), Italy, April 2006.
  • (AY16) Attila  A.  Yavuz,  Fatih  Alagoz,  Emin  Anarim,  "A  New  Multicast  Security  Protocol",  GAP, International V. Engineering Congress, 2006.
  • (AY17) Goksel Biricik, Attila A. Yavuz, Omur Kartal, Oya Kalipsiz,  "Developing Information System with  N-Tier   Architecture:  Hospital  Management   Information  System",  Biltek  International Informatik Congress, 2005.
    Edited Books
    Patents
  • (AY18) Attila A. Yavuz, “System and Method for Message Verification in Broadcast and Multicast Networks”, May 2012.
  • (AY19) Attila A. Yavuz, “System and Method for Counter Mode Encrypted Communication with Reduced Bandwidth”, October 2012 (with Jorge Guajardo, Glas Benjamin, Ihle Markus, Hamit Hacioglu, Wehefritz Karsten).
  • (AY21) Attila A. Yavuz, “A Method and System to Search on Encrypted Data with Secure and Fast Updates”, September 2013 (with Jorge Guajardo and Anvesh Ragi).
  • (AY22) Attila A. Yavuz, “A Method and System to Search on Encrypted Data with Fast Searches”, September 2013 (with Jorge Guajardo and Anvesh Ragi).
  • (AY23) Attila A. Yavuz, “A Method and System to Search on Encrypted Data with Oblivious Search Patterns”, September 2013 (with Jorge Guajardo and Anvesh Ragi).
    Work in Progress
  • Velin Kounev, David Tipper, Attila A. Yavuz, Bradon M. Grainger, Gregory F. Reed, “A Secure Communication Architecture for Distributed Microgrid Control”, IEEE Transactions on Smart Grid on Cyber Physical Systems and Security for Smart Grid” (special issue), under revision,  November 2013.
  • Panos Kampanakis, Attila A. Yavuz, “PPL-BAF: A Practical Cryptographic Secure Audit Logging Scheme for Digital Forensics”, International Journal of Information Security, under revision, September 2013.
  • Attila A. Yavuz and Jorge Guajardo, “Practical Public key Encryption with Keyword Search (PEKS) via Trapdoor Permutations by using Trusted Hardware”, to be submitted to ACM Transactions on Information and Systems Security (TISSEC).
  • Attila A. Yavuz and Shalabh Jain, “Highly Efficient Digital Signatures via Condensed-RSA with Random Masks”, to be submitted Financial Cryptography.
  • Attila A. Yavuz, Peng Ning and Michael Reiter, “I-LogFAS: Improved Cryptographic Constructions for Compromise Resiliency and Compactness”, to be submitted to IEEE Transactions on Information Forensics and Security (TIFS).

Teaching and Mentoring

I served as a Teaching Assistant (TA) for various courses in the Department of Computer Science, NC State University:
  • CSC 226 Discrete Mathematics with Dr. Robert Rodman (Spring 2007).
  • CSC 574 Network Security with Dr. Ting Yu and Dr. Peng Ning, (Fall 2008, Fall 2009, and Spring 2011, respectively).
  • CSC 501 Operating Systems with Dr. Douglas Pase (Fall 2008).
  • CSC 774 Advanced Network Security with Dr. Peng Ning (Spring 2008 and Spring 2009).
  • CSC 579 Computer Performance Modelling with Dr. Billy Stewart (Spring 2011).
In my current position, I guide PhD and MS students on various research projects:
  • Mr. Anvesh Ragi is a MS student at the University of Texas at Dallas, Department of Computer Science. We work on “Efficient Symmetric Searchable Encryption Schemes”.
  • Mr. Shalabh Jain is a PhD candidate at the University of Maryland College Park, Department of Electrical and Computer Engineering. We work on “Efficient Digital Signatures for Real-time Multicast Systems”.
  • Ms. Alana Libonati is a PhD candidate at the University of Chapel Hill at North Carolina, Department of Computer Science. We work on “User Friendly Authentication Methods”.
  • Mr. Yi Ding is a PhD student at the Georgia Technical University, the School of Computer Science. We work on “Efficient and Secure Face Recognition via Multi-Party Computation”.
  • Mr. Velin Kounev is a PhD candidate at the University of Pittsburgh, School of Information Sciences. We work on “Secure Communication Methods for Microgid Systems”.

Professional Experiences

  • Research Scientist, Robert Bosch Research and Technology Center (December 2011-Present)
  • Research Assistant, Department of Computer Science, NC State University (2007-2011).
  • Teaching Assistant, Department of Computer Science, NC State University (2007-2011).
  • Research Engineer, Satellite Networks Research Laboratory (SATLAB), Bogazici University, Turkey, (2005-2006)
    • Cryptographic protocol design for satellite networks and Military MANETS
  • Summer Intern, Department of Computer Science, NC State University, USA, 2003
    • A Simulation Project in C++ and Research on Simulation Techniques
    • Ipv6 Implementations on Linux Based Networks
  • Summer Intern, Vestelnet Software Engineering, Turkey, 2002
    • Cryptographic applications in C Languages and Vcare software system

Previous Research

  • PhD Thesis: Compromise Resilient, Compact, and Efficient Cryptographic Constructions for Digital Forensics
 Providing security of audit logs in resource-constraint systems is a challenging task, especially in the presence of active adversaries. To fulfill this need, we develop a series of forward-secure and aggregate cryptographic constructions, which achieve high computational efficiency, compactness, and public verifiability at the same time. Our schemes are shown to be significantly more efficient, scalable and secure than all of their counterparts for secure audit logging in resource-constraint environments as well as large-distributed systems.

  • MS Thesis:  Novel Methods for Security Protocols and Key Management Techniques in Wireless Networks Based on Signcryption and Hybrid Cryptography
Military Ad-Hoc NETworks (MANETs) are expected to play a central role in Future Combat Systems (FCSs). In this thesis, we develop a set of novel satellite supported multi-tiered military MANET security protocols. Proposing new key management and hybrid cryptography techniques, our protocols are demonstrated to be more efficient and scalable than their counterparts, and therefore are ideal choice to provide security in FCSs.

  • BS Thesis:
    • Design and Implementation of a Large Number Arithmetic Library and RSA Digital Signature Software Packet, Yildiz Technical University. (January-June 2003)
    • A Multi-tiered Hospital Information System (Developed for Istinye Government Hospital), Yildiz Technical University, (January-June 2004)
  • Previous Projects
    • Design, Analysis and Implementation of Simulation Systems (Machine Interference Problem), North Carolina State University (June-September 2003), with Dr. Harry Perros.
    • Comparative Study on Face Recognition Algorithms under Partially Occlusion Problems, Bogazici University (August-December 2004), with Dr. Lale Akarun.
    • A New Algorithm to Detect Communities in a Complex System and its application to Macaque/Cat Brain Connectivity, Bogazici University (July 2005-June 2006) with Dr. Haluk Bingol.
    • Design and Analysis of Stream Ciphers based on LFSR and T-functions, Bogazici University (January 2005-June 2005), with Dr. Emin Anarim.

Professional Services

    Reviews in Committees and Conference/Journals:
  • 17th International Conference on Financial Cryptography and Data Security (FC 2013), April 1-5, 2013, Okinawa, Japan.
  • International Journal of Distributed Sensor Networks (IJDSN), Hindawi, (2013).
  • Journal of Algorithms, Open Access Journal by MPDI (2013).
  • 5th International Symposium on Cyberspace Safety and Security (CSS 2013). Zhangjiajie, China, 2013.
  •  Invited talk at 6th BEO-AK 251 Workshop, Robert Bosch Research, “Challenges of security and privacy in Internet of Things”, December 2012.
  •  IEEE Transactions on Computers (2012).
  •  Journal of Energies, Open Access Journal by MPDI (2012).
  • 9th International Symposium on Wireless Communication Systems (ISWCS) (2012).
  • Concurrency and Computation: Practice and Experience, February 2011.
  • NC State Application Review Committee (2010).
  • 5th ACM Symposium on Information, Computer and Communications Security (ASIACSS '10), April 2010, Beijing, China.
  • 2th ACM Conference on Wireless Network Security (WiSec '09), March 2009, Zurich, Switzerland.
  • 7th International Conference on Information, Communications and Signal Processing (ICICS '09), Macau, 2009.
  • Journal of System and Software,  2007 and 2011.
  • IEEE Transactions on Information Technology in Biomedicine, April 2007.
  • 21th  International Symposium on Computer and Information Sciences (ISCIS '07), Istanbul, Turkey, Nov. 2006.
  • 7th  International Symposium on Computer Networks (ISCN '06), Istanbul, Turkey, June 2006.
  • Professional memberships
    •  Institute of Electrical and Electronics Engineers (IEEE) (seven years)
    • Association for Computing Machinery (ACM) (two years)
    • International Association for Cryptologic Research (IACR)

Personal

  •  Birth Date/Place: 06/21/1982, Ankara, Turkey 
  •  Martial Status: Single
  •  Hobbies: Philosophy, music, reading and chess

Last Updated: December 4, 2013 .