Abstract. The quantification of information leakage provides a quan-titative evaluation of the security of a system. We propose the usage of Markovian processes to model and analyze the information leakage of deterministic and probabilistic systems. We show that this method generalizes the lattice of information approach and is a natural framework for modeling refined attackers capable to observe the internal behavior of the system. We also use our method to obtain an algorithm for the computation of channel capacity from our Markovian models. Finally, we show how to use the method to analyze timed and non-timed attacks on the Onion Routing protocol.
We present a formal analysis technique for probabilistic security properties of peer-to-peer communi...
We put forward a general model intended for assessment of system security against passive eavesdropp...
Formal analysis has a long and successful track record in the automated verification of security pro...
International audienceThe quantification of information leakage provides a quantitative evaluation o...
Quantification of information leakage is a successful approach for evaluating the security of a syst...
International audienceIn recent years, quantitative security techniques have been providing effectiv...
Despite the variety of tools and techniques deployed in order to protect sensitive data, ranging fro...
Side-channels are unanticipated information flows that present a significant threatto security of sy...
Information theory provides a range of useful methods to analyse probability distributions and these...
AbstractWe propose a probabilistic framework for the analysis of security protocols. The proposed fr...
Part 3: Security AnalysisInternational audienceWe put forward a model of action-based randomization ...
We study the asymptotic behaviour of (a) information leakage and (b) adversary’s error probability i...
ii In most secure communication standards today, additional latency is kept to a minimum to preserve...
Abstract—The outputs of a program that processes secret data may reveal information about the values...
We present a formal analysis technique for probabilistic security properties of peer-to-peer communi...
We put forward a general model intended for assessment of system security against passive eavesdropp...
Formal analysis has a long and successful track record in the automated verification of security pro...
International audienceThe quantification of information leakage provides a quantitative evaluation o...
Quantification of information leakage is a successful approach for evaluating the security of a syst...
International audienceIn recent years, quantitative security techniques have been providing effectiv...
Despite the variety of tools and techniques deployed in order to protect sensitive data, ranging fro...
Side-channels are unanticipated information flows that present a significant threatto security of sy...
Information theory provides a range of useful methods to analyse probability distributions and these...
AbstractWe propose a probabilistic framework for the analysis of security protocols. The proposed fr...
Part 3: Security AnalysisInternational audienceWe put forward a model of action-based randomization ...
We study the asymptotic behaviour of (a) information leakage and (b) adversary’s error probability i...
ii In most secure communication standards today, additional latency is kept to a minimum to preserve...
Abstract—The outputs of a program that processes secret data may reveal information about the values...
We present a formal analysis technique for probabilistic security properties of peer-to-peer communi...
We put forward a general model intended for assessment of system security against passive eavesdropp...
Formal analysis has a long and successful track record in the automated verification of security pro...