Mikhail ("Mike") Atallah's recent research focus has been
on secure protocols, information hiding, software security,
and intrusion detection.
He has designed, with his students, many protocols for secure and
privacy-preserving cooperative computations. This is the framework
where multiple parties are interacting online for the purpose of
cooperatively carrying out a computation or achieving desired
system-wide goals without revealing the private information of any of the parties,
even though the jointly-computed answers and decisions depend on the
information of all the parties. He has also designed protocols for the
related framework in which all the data is with a single party, but
that party has very little computing power and needs to use some other
party's computational resources without revealing to the latter its own
data or the answer to the computation. This differs primarily in the
asymmetry of computing power (whereas no such asymmetry was assumed for
the previous framework): One side now has very little computing power
(but has all the data), while the other side has plenty of it (but has
no data). This "secure outsourcing of computations" is applicable
to mobile computing, sensors, and any other situation where
there are weak computational devices that need to carry out heavy-duty
computing by using the computational power of a powerful but untrusted
server, without revealing to the latter either their data or the
computed answer.
He has also designed, with his student Kevin Du, protocols for private
database access with approximate searching, where a server has a
database on which a client wants to perform a query of the "approximate
searching" kind. He has designed, with his student Florian Kerschbaum,
protocols for private remote biometric matching (where two fingerprints
are compared without either fingerprint being revealed to the other
party), and for the string-edit types of computations that arise in
biological sequence comparisons.
In joint work with his CERIAS colleague Victor Raskin and their
students, he gave the first resilient scheme for watermarking natural
language text. The watermark remains even after translation to a
foreign language, because it is embedded in the semantic tree structure
of the text. The techniques also work for steganography, where the
very existence of the mark has to be concealed, and also for
tamper-detection. Other contributions to watermarking include work
with his student Radu Sion on watermarking relational databases,
numeric sets, and XML documents, and a technique designed with Stefano
Lonardi for marking (for the purpose of authentication) LZ-77
compressed data.
Professor Atallah received a Presidential Young Investigator Award
from the National Science Foundation in 1985. A Fellow of the IEEE, he
has served on many top computer science journal editorial boards (eight
in total), and was on the program committees of twenty-five
international conferences and workshops (including seven as chair or
co-chair). He was "Distinguished lecture series" speaker at six top
research universities, and was keynote and invited speaker at seventeen
international conferences and workshops. In 1999 he was selected as
one of the best teachers in the history of Purdue University and
included in Purdue's Book of Great Teachers, a permanent wall display
of 200 Purdue teachers past and present. In June 2001 he co-founded
Arxan Technologies Inc., a startup in the software security products
space, that in 2002 secured funding from a top-tier venture capital
firm.