Skip to main content

Arnab Roy

Arnab Roy Arnab Roy is a Member of Research Staff at Fujitsu Laboratories of America focusing on security and encryption technologies. He holds a B.Tech. and M.Tech. in Computer Science and Engineering from the Indian Institute of Technology, Kharagpur and a Ph.D. in Computer Science from Stanford University. He also worked as a Post-Doctoral Researcher at IBM Thomas J. Watson Research Center.

Arnab has received several honors for his work including the First Patent Invention Achievement Award from IBM Research in 2011, he was a student delegate to the 45th International Achievement Summit in 2006, represented Stanford Computer Science as a Siebel Scholar in the class of 2006, and was awarded a Prime Minister of India Gold Medal from IIT Kharagpur for academic performance in 2004.

Book Chapters and Theses

  1. A. Datta, J. C. Mitchell, A. Roy and S. H. Stiller, "Protocol Composition Logic," IOS Press, July 2010.
  2. A. Roy, "Formal Proofs of Cryptographic Security of Network Protocols," PhD Thesis, Computer Science Department, Stanford University, December 2009.
  3. A. Roy, A. Datta, A. Derek, J. C. Mitchell, and J.-P. Seifert, "Secrecy Analysis in Protocol Composition Logic," in Formal Logical Methods for System Security and Correctness, IOS Press, 2008. Volume based on presentations at Summer School 2007, Formal Logical Methods for System Security and Correctness, Marktoberdorf, Germany.

Journal Articles

  1. A. Roy, A. Datta, A. Derek and J. C. Mitchell, "Inductive Trace Properties for Computational Security," Journal of Computer Security 18(6): 1035-1073 (2010).
  2. J. C. Mitchell, A. Roy and M. Sundararajan, "An Automated Approach for Proving PCL Invariants," Electr. Notes Theor. Comput. Sci. 234: 93-113 (2009).
  3. S. K. Panda, A. Roy, P. P. Chakrabarti and R. Kumar, "Simulation-based verification using Temporally Attributed Boolean Logic," ACM Trans. Design Autom. Electr. Syst. 13(4): (2008).
  4. A. Datta, A. Derek, J. C. Mitchell and A. Roy, "Protocol Composition Logic (PCL)," Electronic Notes in Theoretical Computer Science, Volume 172 , 1 April 2007, Pages 311-358. Computation, Meaning, and Logic: Articles dedicated to Gordon Plotkin.
  5. A. Roy, S. K. Panda, R. Kumar, P. P. Chakrabarti, "A framework for systematic validation and debugging of pipeline simulators," ACM Trans. Design Autom. Electr. Syst. 10(3): 462-491 (2005).

Proceedings

  1. C.S. Jutla and A. Roy, "Decision Procedures for Simulatability," in Proceedings of ESORICS 2012: 573-590.
  2. C.S. Jutla and A. Roy, "Relatively-Sound NIZKs and Password-Based Key-Exchange," in Proceedings of Public Key Cryptography (PKC) 2012: 485-503.
  3. R. Canetti, S. Chari, S. Halevi, B. Pfitzmann, A. Roy, M. Steiner and W. Venema, "Composable Security Analysis of OS Services," Proceedings of Applied Cryptography and Network Security 2011.
  4. H. Zhao, J. Lobo, A. Roy and S. Bellovin, "Policy Refinement of Network Services for MANETs," Proceedings of 12th IFIP/IEEE International Symposium on Integrated Network Management (IM'2011).
  5. Y. Gurevich and A. Roy, "Operational Semantics for DKAL: Application and Analysis," in Proceedings of TrustBus 2009: 149-158.
  6. J. C. Mitchell, A. Roy, P. Rowe and A. Scedrov, "Analysis of EAP-GPSK Authentication Protocol," in Proceedings of Applied Cryptography and Network Security, 6th International Conference, pp. 309-327, June 2008.
  7. A. Roy, A. Datta and J. C. Mitchell, "Formal Proofs of Cryptographic Security of Diffie-Hellman-based Protocols," in Proceedings of 3rd Symposium on Trustworthy Global Computing, November 2007.
  8. A. Roy, A. Datta, A. Derek and J. C. Mitchell, "Inductive Proofs of Computational Secrecy," in Proceedings of 12th European Symposium On Research In Computer Security, September 2007.
  9. S. K. Panda, A. Roy, P. P. Chakrabarti, R. Kumar, "Simulation Based Verification using Temporally Attributed Boolean Logic," in Proceedings of VLSI Design 2007: 57-62.
  10. A. Roy, A. Datta, A. Derek and J. C. Mitchell, "Inductive Trace Properties for Computational Security," in ACM SIGPLAN and IFIP WG 1.7 7th Workshop on Issues in the Theory of Security, March 2007. (Invited to special issue of Journal of Computer Security.)
  11. A. Roy, A. Datta, A. Derek, J. C. Mitchell and J.-P. Seifert, "Secrecy Analysis in Protocol Composition Logic," in Proceedings of 11th Annual Asian Computing Science Conference, December 2006.