Quantitative program analysis involves computing numerical quantities about individual or col-lections of program executions. An example of such a computation is quantitative information flow analysis, where one estimates the amount of information leaked about secret data through a program’s output channels. Such information can be quantified in several ways, including channel capacity and (Shannon) entropy. In this paper, we formalize a class of quantitative analysis problems defined over a weighted control flow graph of a loop-free program. These problems can be solved using a combi-nation of path enumeration, SMT solving, and model counting. However, existing methods can only handle very small programs, primarily because the number of ex...
A crucial problem in software security is the detection of side-channels. Information gained by obse...
A common attack point in a program is the input exposed to the user. The adversary crafts a maliciou...
In recent work we have proposed a software reliability analy-sis technique that uses symbolic execut...
Quantitative program analysis involves computing numerical quantities about individual or col-lectio...
Quantitative program analysis is an emerging area with applications to software testing and security...
We present a new technique for determining how much information abouta program's secret inputs is re...
We consider the quantitative analysis problem for interprocedural control-flow graphs (ICFGs). The i...
AbstractThe “profitability” of code optimizations is defined in terms of a Markov model of program f...
In this paper we start by reviewing both classical and probabilistic/quantitative approaches to prog...
Quantitative information flow measurement techniques have been proven to be successful in detecting ...
Researchers have proposed formal definitions of quantitative informa-tion flow based on information ...
We report on our work-in-progress into the use of reliabil-ity analysis to quantify information leak...
We present a novel method for Quantitative Information Flow analysis. We show how the problem of com...
Quantitative theories of information flow give us an approach to relax the absolute confidentiality ...
Hyperproperties are properties of sets of computation traces. In this paper, we study quantitative h...
A crucial problem in software security is the detection of side-channels. Information gained by obse...
A common attack point in a program is the input exposed to the user. The adversary crafts a maliciou...
In recent work we have proposed a software reliability analy-sis technique that uses symbolic execut...
Quantitative program analysis involves computing numerical quantities about individual or col-lectio...
Quantitative program analysis is an emerging area with applications to software testing and security...
We present a new technique for determining how much information abouta program's secret inputs is re...
We consider the quantitative analysis problem for interprocedural control-flow graphs (ICFGs). The i...
AbstractThe “profitability” of code optimizations is defined in terms of a Markov model of program f...
In this paper we start by reviewing both classical and probabilistic/quantitative approaches to prog...
Quantitative information flow measurement techniques have been proven to be successful in detecting ...
Researchers have proposed formal definitions of quantitative informa-tion flow based on information ...
We report on our work-in-progress into the use of reliabil-ity analysis to quantify information leak...
We present a novel method for Quantitative Information Flow analysis. We show how the problem of com...
Quantitative theories of information flow give us an approach to relax the absolute confidentiality ...
Hyperproperties are properties of sets of computation traces. In this paper, we study quantitative h...
A crucial problem in software security is the detection of side-channels. Information gained by obse...
A common attack point in a program is the input exposed to the user. The adversary crafts a maliciou...
In recent work we have proposed a software reliability analy-sis technique that uses symbolic execut...