Information flow analysis is a powerful technique for reasoning about the sensitive information exposed by a program during its execution. While past work has proposed information theoretic metrics (e.g., Shannon entropy, min-entropy, guessing entropy, etc.) to quantify such information leakage, we argue that some of these measures not only result in counter-intuitive measures of leakage, but also are inherently prone to conflicts when comparing two programs P1 and P2 − say Shannon entropy predicts higher leakage for program P1, while guessing entropy predicts higher leakage for program P2. This paper presents the first attempt towards addressing such conflicts and derives solutions for conflict-free comparison of finite order deterministic...
To reason about information flow, a new model is developed that describes how attacker beliefs chan...
A confidential program should not allow any information about its secret inputs to be inferred from ...
To reason about information flow, a new model is developed that describes how attacker beliefs chang...
Protecting confidential information from improper disclosure is a fundamental security goal. While e...
We report on our work-in-progress into the use of reliabil-ity analysis to quantify information leak...
Secrecy is fundamental to computer security, but real systems often cannot avoid leaking some secret...
Abstract. Information flow analysis plays a vital role in obtaining quan-titative bounds on informat...
Researchers have proposed formal definitions of quantitative informa-tion flow based on information ...
Several measures have been proposed in literature for quantifying the information leaked by the publ...
The main problem addressed by this thesis is that of characterising information leakage channels in...
Secrecy is fundamental to computer security, but real systems often cannot avoid leaking some secret...
In recent work we have proposed a software reliability analy-sis technique that uses symbolic execut...
International audienceQualitative information flow aims at detecting information leaks, whereas the ...
Information flow is the branch of security that studies the leakage ofinformation due to correlation...
We consider the problem of quantifying information flow in interactive systems, modelled as finite-s...
To reason about information flow, a new model is developed that describes how attacker beliefs chan...
A confidential program should not allow any information about its secret inputs to be inferred from ...
To reason about information flow, a new model is developed that describes how attacker beliefs chang...
Protecting confidential information from improper disclosure is a fundamental security goal. While e...
We report on our work-in-progress into the use of reliabil-ity analysis to quantify information leak...
Secrecy is fundamental to computer security, but real systems often cannot avoid leaking some secret...
Abstract. Information flow analysis plays a vital role in obtaining quan-titative bounds on informat...
Researchers have proposed formal definitions of quantitative informa-tion flow based on information ...
Several measures have been proposed in literature for quantifying the information leaked by the publ...
The main problem addressed by this thesis is that of characterising information leakage channels in...
Secrecy is fundamental to computer security, but real systems often cannot avoid leaking some secret...
In recent work we have proposed a software reliability analy-sis technique that uses symbolic execut...
International audienceQualitative information flow aims at detecting information leaks, whereas the ...
Information flow is the branch of security that studies the leakage ofinformation due to correlation...
We consider the problem of quantifying information flow in interactive systems, modelled as finite-s...
To reason about information flow, a new model is developed that describes how attacker beliefs chan...
A confidential program should not allow any information about its secret inputs to be inferred from ...
To reason about information flow, a new model is developed that describes how attacker beliefs chang...