Abstract—A metric is proposed for quantifying leakage of information about secrets and about how secrets change over time. The metric is used with a model of information flow for probabilistic, interactive systems with adaptive adversaries. The model and metric are implemented in a probabilistic program-ming language and used to analyze several examples. The analysis demonstrates that adaptivity increases information flow. Keywords—dynamic secret, quantitative information flow, prob-abilistic programming, gain function, vulnerability I
International audienceIn recent years, there has been a growing interest in considering the probabil...
Information leakage occurs when a system exposes its secret information to an unauthorised entity. I...
This thesis contributes to the field of language-based information flow analysis with a focus on det...
Abstract—A metric is proposed for quantifying leakage of information about secrets and about how sec...
Despite the variety of tools and techniques deployed in order to protect sensitive data, ranging fro...
Part 3: Security AnalysisInternational audienceWe put forward a model of action-based randomization ...
Part 3: Security AnalysisInternational audienceWe put forward a model of action-based randomization ...
Abstract—Metrics for quantifying information leakage as-sume that an adversary’s gain is the defende...
Abstract—Metrics for quantifying information leakage as-sume that an adversary’s gain is the defende...
To reason about information flow, a new model is developed that describes how attacker beliefs chang...
To reason about information flow, a new model is developed that describes how attacker beliefs chan...
We report on our work-in-progress into the use of reliabil-ity analysis to quantify information leak...
Information leakage traditionally has been defined to occur when uncertainty about secret data is re...
Abstract—The outputs of a program that processes secret data may reveal information about the values...
International audienceIn recent years, there has been a growing interest in considering the probabil...
International audienceIn recent years, there has been a growing interest in considering the probabil...
Information leakage occurs when a system exposes its secret information to an unauthorised entity. I...
This thesis contributes to the field of language-based information flow analysis with a focus on det...
Abstract—A metric is proposed for quantifying leakage of information about secrets and about how sec...
Despite the variety of tools and techniques deployed in order to protect sensitive data, ranging fro...
Part 3: Security AnalysisInternational audienceWe put forward a model of action-based randomization ...
Part 3: Security AnalysisInternational audienceWe put forward a model of action-based randomization ...
Abstract—Metrics for quantifying information leakage as-sume that an adversary’s gain is the defende...
Abstract—Metrics for quantifying information leakage as-sume that an adversary’s gain is the defende...
To reason about information flow, a new model is developed that describes how attacker beliefs chang...
To reason about information flow, a new model is developed that describes how attacker beliefs chan...
We report on our work-in-progress into the use of reliabil-ity analysis to quantify information leak...
Information leakage traditionally has been defined to occur when uncertainty about secret data is re...
Abstract—The outputs of a program that processes secret data may reveal information about the values...
International audienceIn recent years, there has been a growing interest in considering the probabil...
International audienceIn recent years, there has been a growing interest in considering the probabil...
Information leakage occurs when a system exposes its secret information to an unauthorised entity. I...
This thesis contributes to the field of language-based information flow analysis with a focus on det...