Attila Altay Yavuz 

                                

Home
Teaching
Education
Professional Experiences
Affiliations
Current Research
Publications
Collaborations
Professional Services
  Previous  Research and Mentoring
  Professional  Membership
CV
Research Statement (available upon request)
Teaching Statement
Personal

 

 

Attila Altay Yavuz

Attila Altay Yavuz, PhD

Assistant  Professor
School of Electrical Engineering and Computer Science 
Oregon State University
Kelley Engineering Center 3065
Corvallis, OR 97331 
Tel:  541-737-3341
Fax: 541-737-1300

E-mail:  Attila.Yavuz(AT)oregonstate.edu

I am an assistant professor at the School of Electrical Engineering and Computer Science, Oregon State University.  I am interested in design, analysis and application of cryptographic tools and protocols to enhance the security of computer networks and systems. My current research focuses on the following topics: Privacy enhancing technologies (e.g., dynamic symmetric and public key based searchable encryption), security in cloud computing, authentication and integrity mechanisms for resource-constrained devices and large-distributed systems, efficient cryptographic protocols for wireless sensor networks.

Looking for Talended and Hardworking PhD Students

I am looking for a couple of motivated PhD students interested in applied cryptography and network security research. Please send your resume, transcripts and/or published research materials (very important) to me or drop by my office if you are already enrolled.

Please see my current research activities described below for prospective research directions and read my publications for the details (important to identify whether our interests match).

Teaching

I am currently teaching the following courses:
  • CS 519/ECE 599: Advanced Network Security

Education

  • North Carolina State University, Raleigh, North Carolina USA
    •  PhD, Computer Science,  January 2007-August 2011,
    • Thesis: Efficient, Compromise Resilient and Compact Cryptographic Constructions for Digital Forensics,
    • Advisor: Prof. Dr. Peng Ning and Prof. Dr. Michael Reiter (University of North Carolina at Chapel Hill).

  • Bogazici University, Istanbul, Turkey 
    • M.S., Computer Science,  September 2004-June 2006,
    • Thesis: Novel Methods for Security Protocols and Key Management Techniques in MANETs based on Signcryption and Hybrid Cryptography,
    • Advisor: Prof. Dr. Fatih Alagoz and Prof. Dr. Emin Anarim.
  • Yildiz Technical University, Istanbul, Turkey
    •  B.S., Computer Science and Engineering,  2004,
    • Thesis: Implementation of a Large Number Arithmetic and RSA Digital Signature Library

Professional Experiences

  • Research Scientist, Robert Bosch Research and Technology Center (December 2011- July 2014)
  • Research Assistant, Department of Computer Science, NC State University (2007-2011).
  • Teaching Assistant, Department of Computer Science, NC State University (2007-2011).
  • Research Engineer, Satellite Networks Research Laboratory (SATLAB), Bogazici University, Turkey, (2005-2006)
    • Cryptographic protocol design for satellite networks and Military MANETS
  • Summer Intern, Department of Computer Science, NC State University, USA, 2003
    • A Simulation Project in C++ and Research on Simulation Techniques
    • Ipv6 Implementations on Linux Based Networks
  • Summer Intern, Vestelnet Software Engineering, Turkey, 2002
    • Cryptographic applications in C Languages and Vcare software system

Affiliations

Adjunct Faculty, University of Pittsburgh, School of Information Sciences, Pittsburgh, PA, USA

Robert Bosch Research and Technology Center North America, Academic Research Collaborator

Current Research

Efficient Privacy Enhancing Technologies (PETs) for Big Data Technologies: A fundamental problem in information security is how to achieve the usability (e.g., search and analysis) and privacy of sensitive data simultaneously. Satisfactory solutions to this problem will play a key role for the emergence of applications that rely on secure data outsourcing. Consider a cloud-based application, in which the client outsources some data to the cloud. The client must encrypt the sensitive data to ensure its privacy. However, if only standard encryption methods are used, it is not possible to perform search/analysis on the encrypted data. Privacy Enhancing Technologies (PETs) aim to address these limitations. However, existing PETs are computation or communication/storage costly, therefore cannot meet the requirements of real-life applications.

To address these limitations, I pursue research on Searchable Encryption (SE). I develop Dynamic Symmetric SE (DSSE) and Public Key Encryption with Keyword Search (PEKS) methods to enable practical search on encrypted data. I also develop a searchable encrypted database system and deploy it for Bosch-wide applications. Please see [AY21, AY22, AY23].

Secure Cyber-Physical Systems (CPSs) with Efficient Cryptography: The security and reliability of CPSs (e.g., smart-grid) have a critical impact on society. The distributed and real-time nature of CPSs creates security and performance challenges. For instance, an emergency shut-down command sent from a control-center should be processed immediately by a large number of peripheral devices. It is therefore, vital to provide efficient authentication and integrity for such systems. Unfortunately, existing security mechanisms are either computationally costly (e.g., standard signatures) or unscalable (e.g., one-time, offline/online signatures). To address these limitations, I have been developing efficient cryptographic schemes. Please see [AY1, AY7, AY8, AY9, AY18, AY19, AY20].

Publications

 Copyright Note: The articles are copyrighted by the respective publishers and may be downloaded only for personal use.

    Journal Papers (SCI/SCI-E)
  • (AY6) Attila A. Yavuz, Emin Anarim and Fatih  Alagoz, "Improved  Merkle  Cryptosystem (IMC),"  Vol.  4263, Lecture Notes in Computer Science (LNCS), page 924-934, Springer-Verlag, November 2006.
   International Conference Papers
  • (AY14) Attila A. Yavuz, Fatih Alagoz and Emin Anarim, "Three-Tier Satellite Security Multicast Security Protocol  Based on  ECMQV  and  IMC  Methods",  Computer-Aided  Modeling,  Analysis  and Design of Communication Links and Networks, (IEEE CAMAD'06), Italy, April 2006.
  • (AY16) Attila  A.  Yavuz,  Fatih  Alagoz,  Emin  Anarim,  "A  New  Multicast  Security  Protocol",  GAP, International V. Engineering Congress, 2006.
  • (AY17) Goksel Biricik, Attila A. Yavuz, Omur Kartal, Oya Kalipsiz,  "Developing Information System with  N-Tier   Architecture:  Hospital  Management   Information  System",  Biltek  International Informatik Congress, 2005.
    Edited Books
    Patents
  • (AY18) Attila A. Yavuz, "System and Method for Message Verification in Broadcast and Multicast Networks", May 2012.
  • (AY19) Attila A. Yavuz, "System and Method for Counter Mode Encrypted Communication with Reduced Bandwidth", October 2012 (with Jorge Guajardo, Glas Benjamin, Ihle Markus, Hamit Hacioglu, Wehefritz Karsten).
  • (AY21) Attila A. Yavuz, "A Method and System to Search on Encrypted Data with Secure and Fast Updates", September 2013 (with Jorge Guajardo and Anvesh Ragi).
  • (AY22) Attila A. Yavuz, "A Method and System to Search on Encrypted Data with Fast Searches", September 2013 (with Jorge Guajardo and Anvesh Ragi).
  • (AY23) Attila A. Yavuz, "A Method and System to Search on Encrypted Data with Oblivious Search Patterns", September 2013 (with Jorge Guajardo and Anvesh Ragi).
    Work in Progress
  • Attila A. Yavuz, "Immutable Authentication and Integrity Schemes for Outsourced Databases", under revision, IEEE Transactions on Transactions on Dependable and Secure Computing, July 2014.
  • Velin Kounev, David Tipper, Attila A. Yavuz, Bradon M. Grainger, Gregory F. Reed, "A Secure Communication Architecture for Distributed Microgrid Control, IEEE Transactions on Smart Grid on Cyber Physical Systems and Security for Smart Grid", under revision,  November 2013.
  • Panos Kampanakis, Attila A. Yavuz, "PPL-BAF: A Practical Cryptographic Secure Audit Logging Scheme for Digital Forensics", International Journal of Information Security, under revision, September 2013.
  • Attila A. Yavuz and Shalabh Jain, "Highly Efficient Digital Signatures via Condensed-RSA with Random Masks", to be submitted.
  • Attila A. Yavuz, Peng Ning and Michael Reiter, "I-LogFAS: Improved Cryptographic Constructions for Compromise Resiliency and Compactness", to be submitted.

Collaborations

  • Robert Bosch, Research and Technology Center: Desing, anaysis and deployment of practical Searchable Encryption (SE) methods.
  • University of California Irvine (UCI): Privacy Enhancing Technologies (PETs) and authentication/attestation techniques (with Prof. Dr. Gene Tsudik).
  • University of North Carolina at Chapel Hill: New user friendly authentication methods (with Prof. Dr. Michael K. Reiter).
  • University of Pittsburgh: Security in smart-grid systems (with Prof. Dr. David Tipper) and applied cryptography (with Prof. Dr. James Joshi).

Professional Services

    Reviewer in Journals:
  • IEEE Transactions on Parallel and Distributed Systems (2014).
  • IEEE Transactions on Smart Grid (2014).
  • IEEE Transactions on Information Forensics and Security (2014).
  • Journal of Computer Security (2013-2014).
  • International Journal of Communication Systems by Wiley (2013-2014).
  • International Journal of Distributed Sensor Networks by Hindawi (2013-2014).
  • International Journal of Distributed Sensor Networks (IJDSN), Hindawi (2013).
  • Journal of Algorithms, Open Access Journal by MPDI (2013).
  •  IEEE Transactions on Computers (2012-2014).
  •  Journal of Energies, Open Access Journal by MPDI (2012).
  • Concurrency and Computation: Practice and Experience (2011).
  • Journal of System and Software  (2007-2011).
  • IEEE Transactions on Information Technology in Biomedicine (2007).
    Reviews in Committees and Conference:
  • ACM International Workshop on Trustworthy Embedded Devices (TrustED), Scottsdale, Arizona, USA, November 2014.
  • 3rd International Workshop on Collaborative Cloud (CollabCloud), Miami, Florida, USA, October 2014.
  • The Thrid ASE International Conference on Cyber Security, Stanford, CA, USA, May 2014.
  • Advanced Intrusion Detection and Prevention Workshop, Marrakech, Morocco, June 2014.
  • 17th International Conference on Financial Cryptography and Data Security (FC 2013), April 1-5, 2013, Okinawa, Japan.
  • 5th International Symposium on Cyberspace Safety and Security (CSS 2013). Zhangjiajie, China, 2013.
  •  Invited talk at 6th BEO-AK 251 Workshop, Robert Bosch Research, Challenges of security and privacy in Internet of Things, December 2012.
  • 9th International Symposium on Wireless Communication Systems (ISWCS) (2012).
  • NC State Application Review Committee (2010).
  • 5th ACM Symposium on Information, Computer and Communications Security (ASIACSS '10), April 2010, Beijing, China.
  • 2th ACM Conference on Wireless Network Security (WiSec '09), March 2009, Zurich, Switzerland.
  • 7th International Conference on Information, Communications and Signal Processing (ICICS '09), Macau, 2009.
  • 21th  International Symposium on Computer and Information Sciences (ISCIS '07), Istanbul, Turkey, Nov. 2006.
  • 7th  International Symposium on Computer Networks (ISCN '06), Istanbul, Turkey, June 2006. 

Previous Research and Mentoring

  • PhD Thesis: Compromise Resilient, Compact, and Efficient Cryptographic Constructions for Digital Forensics
 Providing security of audit logs in resource-constraint systems is a challenging task, especially in the presence of active adversaries. To fulfill this need, we develop a series of forward-secure and aggregate cryptographic constructions, which achieve high computational efficiency, compactness, and public verifiability at the same time. Our schemes are shown to be significantly more efficient, scalable and secure than all of their counterparts for secure audit logging in resource-constraint environments as well as large-distributed systems.

  • MS Thesis:  Novel Methods for Security Protocols and Key Management Techniques in Wireless Networks Based on Signcryption and Hybrid Cryptography
Military Ad-Hoc NETworks (MANETs) are expected to play a central role in Future Combat Systems (FCSs). In this thesis, we develop a set of novel satellite supported multi-tiered military MANET security protocols. Proposing new key management and hybrid cryptography techniques, our protocols are demonstrated to be more efficient and scalable than their counterparts, and therefore are ideal choice to provide security in FCSs.

  • BS Thesis:
    • Design and Implementation of a Large Number Arithmetic Library and RSA Digital Signature Software Packet, Yildiz Technical University. (January-June 2003)
    • A Multi-tiered Hospital Information System (Developed for Istinye Government Hospital), Yildiz Technical University, (January-June 2004)
  • Previous Projects
    • Design, Analysis and Implementation of Simulation Systems (Machine Interference Problem), North Carolina State University (June-September 2003), with Dr. Harry Perros.
    • Comparative Study on Face Recognition Algorithms under Partially Occlusion Problems, Bogazici University (August-December 2004), with Dr. Lale Akarun.
    • A New Algorithm to Detect Communities in a Complex System and its application to Macaque/Cat Brain Connectivity, Bogazici University (July 2005-June 2006) with Dr. Haluk Bingol.
    • Design and Analysis of Stream Ciphers based on LFSR and T-functions, Bogazici University (January 2005-June 2005), with Dr. Emin Anarim.
I have guided PhD and MS students on various research projects:
  • Mr. Anvesh Ragi is a MS student at the University of Texas at Dallas, Department of Computer Science. We work on "Efficient Symmetric Searchable Encryption Schemes".
  • Mr. Shalabh Jain is a PhD candidate at the University of Maryland College Park, Department of Electrical and Computer Engineering. We work on "Efficient Digital Signatures for Real-time Multicast Systems".
  • Ms. Alana Libonati is a PhD candidate at the University of Chapel Hill at North Carolina, Department of Computer Science. We work on "User Friendly Authentication Methods".
  • Mr. Yi Ding is a PhD student at the Georgia Technical University, the School of Computer Science. We work on "Efficient and Secure Face Recognition via Multi-Party Computation".
  • Mr. Velin Kounev is a PhD candidate at the University of Pittsburgh, School of Information Sciences. We work on "Secure Communication Methods for Microgid Systems".

Professional Memberships

  • Institute of Electrical and Electronics Engineers (IEEE) (seven years)
  • Association for Computing Machinery (ACM) (two years)
  • International Association for Cryptologic Research (IACR)

Personal

  •  Birth Date/Place: 06/21/1982, Ankara, Turkey 
  •  Martial Status: Single
  •  Hobbies: Philosophy, music, reading and chess

Last Updated: December 4, 2013 .