We show how information theory can be used to give a quantitative definition of interference between variables in imperative programming languages. In this paper we focus on a particular case of this definition of interference: leakage of information from private variables to public ones in While language programs. The major result of the paper is a quantitative analysis for this language that employs a use-definition graph to calculate bounds on the leakage into each variable
Abstract—The outputs of a program that processes secret data may reveal information about the values...
Interference and dependence are closely related concepts: interference being the observable phenomen...
Current tools for analysing information flow in programs build upon ideas going back to Denning\u27s...
We show how information theory can be used to give a quantitative definition of interference between...
AbstractWe show how information theory can be used to give a quantitative definition of interference...
We propose an approach to quantify interference in a simple imperative language that includes a loop...
AbstractBasic information theory is used to analyse the amount of confidential information which may...
In this paper, we provide an inductive proof system for a notion of abstractnon-interference which f...
Basic information theory is used to analyse the amount of confidential information which may be leak...
Classical quantitative information flow analysis often considers a system as an information-theoreti...
In this paper we introduce the notion of abstract non-interference as a general theory for reasoning...
Noninterference, a strong security property for a computation process, informally says that the proc...
A common attack point in a program is the input exposed to the user. The adversary crafts a maliciou...
Current tools for analysing information flow in programs build upon ideas going back to Denning's wo...
Part 1: Full PapersInternational audienceConstant-time programming is a countermeasure to prevent ca...
Abstract—The outputs of a program that processes secret data may reveal information about the values...
Interference and dependence are closely related concepts: interference being the observable phenomen...
Current tools for analysing information flow in programs build upon ideas going back to Denning\u27s...
We show how information theory can be used to give a quantitative definition of interference between...
AbstractWe show how information theory can be used to give a quantitative definition of interference...
We propose an approach to quantify interference in a simple imperative language that includes a loop...
AbstractBasic information theory is used to analyse the amount of confidential information which may...
In this paper, we provide an inductive proof system for a notion of abstractnon-interference which f...
Basic information theory is used to analyse the amount of confidential information which may be leak...
Classical quantitative information flow analysis often considers a system as an information-theoreti...
In this paper we introduce the notion of abstract non-interference as a general theory for reasoning...
Noninterference, a strong security property for a computation process, informally says that the proc...
A common attack point in a program is the input exposed to the user. The adversary crafts a maliciou...
Current tools for analysing information flow in programs build upon ideas going back to Denning's wo...
Part 1: Full PapersInternational audienceConstant-time programming is a countermeasure to prevent ca...
Abstract—The outputs of a program that processes secret data may reveal information about the values...
Interference and dependence are closely related concepts: interference being the observable phenomen...
Current tools for analysing information flow in programs build upon ideas going back to Denning\u27s...