In recent work we have proposed a software reliability analy-sis technique that uses symbolic execution and model count-ing to quantify the probability of reaching designated pro-gram states, e.g. assert violations, under uncertainty con-ditions in the environment. The technique has many ap-plications beyond reliability analysis, ranging from program understanding and debugging to analysis of cyber-physical systems. In this paper we report on a novel application of the technique, namely Quantitative Information Flow anal-ysis (QIF). The goal of QIF is to measure information leak-age of a program by using information-theoretic metrics such as Shannon entropy or Rényi entropy. We exploit the model counting engine of the reliability analyser ...
Despite the variety of tools and techniques deployed in order to protect sensitive data, ranging fro...
Information-flow analysis is a powerful technique for rea-soning about the sensitive information exp...
This paper provides a survey of recent work on adapting techniques for program analysis to compute p...
We report on our work-in-progress into the use of reliabil-ity analysis to quantify information leak...
acmid: 2632367 keywords: Model Counting, Quantitative Information Flow, Reliability Analysis, Symbol...
acmid: 2382791 issue_date: November 2012 keywords: algorithms, security, verification numpages: 5acm...
Quantitative program analysis is an emerging area with applications to software testing and security...
Information flow analysis is a powerful technique for reasoning about the sensitive information expo...
We present a novel method for Quantitative Information Flow analysis. We show how the problem of com...
International audienceSeveral measures have been proposed in literature for quantifying the informat...
Quantified information flow (QIF) has emerged as a rigorous approach to quantitatively measure confi...
Quantitative Information Flow (QIF) is a powerful approach to quantify leaks of confidential informa...
acmid: 2590328 keywords: model checking, quantitative information flow, satisfiability modulo theori...
The security infrastructure underpinning our society relies on encryption, which relies on the corre...
Quantitative information flow measurement techniques have been proven to be successful in detecting ...
Despite the variety of tools and techniques deployed in order to protect sensitive data, ranging fro...
Information-flow analysis is a powerful technique for rea-soning about the sensitive information exp...
This paper provides a survey of recent work on adapting techniques for program analysis to compute p...
We report on our work-in-progress into the use of reliabil-ity analysis to quantify information leak...
acmid: 2632367 keywords: Model Counting, Quantitative Information Flow, Reliability Analysis, Symbol...
acmid: 2382791 issue_date: November 2012 keywords: algorithms, security, verification numpages: 5acm...
Quantitative program analysis is an emerging area with applications to software testing and security...
Information flow analysis is a powerful technique for reasoning about the sensitive information expo...
We present a novel method for Quantitative Information Flow analysis. We show how the problem of com...
International audienceSeveral measures have been proposed in literature for quantifying the informat...
Quantified information flow (QIF) has emerged as a rigorous approach to quantitatively measure confi...
Quantitative Information Flow (QIF) is a powerful approach to quantify leaks of confidential informa...
acmid: 2590328 keywords: model checking, quantitative information flow, satisfiability modulo theori...
The security infrastructure underpinning our society relies on encryption, which relies on the corre...
Quantitative information flow measurement techniques have been proven to be successful in detecting ...
Despite the variety of tools and techniques deployed in order to protect sensitive data, ranging fro...
Information-flow analysis is a powerful technique for rea-soning about the sensitive information exp...
This paper provides a survey of recent work on adapting techniques for program analysis to compute p...