International audienceSeveral measures have been proposed in literature for quantifying the information leaked bythe public outputs of a program with secret inputs. We consider the problem of computinginformation leaked by a deterministic or probabilistic program when the measure of informationis based on (a) min-entropy and (b) Shannon entropy. The key challenge in computing thesemeasures is that we need the total number of possible outputs and, for each possible output, thenumber of inputs that lead to it. A direct computation of these quantities is infeasible because ofthe state-explosion problem. We therefore propose symbolic algorithms based on binary decisiondiagrams (BDDs). The advantage of our approach is that these symbolic algorit...
Information-flow analysis is a powerful technique for rea-soning about the sensitive information exp...
This thesis contributes to the field of language-based information flow analysis with a focus on det...
The security infrastructure underpinning our society relies on encryption, which relies on the corre...
Several measures have been proposed in literature for quantifying the information leaked by the publ...
We report on our work-in-progress into the use of reliabil-ity analysis to quantify information leak...
We present a novel method for Quantitative Information Flow analysis. We show how the problem of com...
Information flow analysis is a powerful technique for reasoning about the sensitive information expo...
In recent work we have proposed a software reliability analy-sis technique that uses symbolic execut...
In this thesis, we present efficient implementation techniques for probabilistic model checking, a m...
Quantitative Information Flow (QIF) is a powerful approach to quantify leaks of confidential informa...
Protecting confidential information from improper disclosure is a fundamental security goal. While e...
A confidential program should not allow any information about its secret inputs to be inferred from ...
Quantified information flow (QIF) has emerged as a rigorous approach to quantitatively measure confi...
acmid: 2632367 keywords: Model Counting, Quantitative Information Flow, Reliability Analysis, Symbol...
acmid: 2590328 keywords: model checking, quantitative information flow, satisfiability modulo theori...
Information-flow analysis is a powerful technique for rea-soning about the sensitive information exp...
This thesis contributes to the field of language-based information flow analysis with a focus on det...
The security infrastructure underpinning our society relies on encryption, which relies on the corre...
Several measures have been proposed in literature for quantifying the information leaked by the publ...
We report on our work-in-progress into the use of reliabil-ity analysis to quantify information leak...
We present a novel method for Quantitative Information Flow analysis. We show how the problem of com...
Information flow analysis is a powerful technique for reasoning about the sensitive information expo...
In recent work we have proposed a software reliability analy-sis technique that uses symbolic execut...
In this thesis, we present efficient implementation techniques for probabilistic model checking, a m...
Quantitative Information Flow (QIF) is a powerful approach to quantify leaks of confidential informa...
Protecting confidential information from improper disclosure is a fundamental security goal. While e...
A confidential program should not allow any information about its secret inputs to be inferred from ...
Quantified information flow (QIF) has emerged as a rigorous approach to quantitatively measure confi...
acmid: 2632367 keywords: Model Counting, Quantitative Information Flow, Reliability Analysis, Symbol...
acmid: 2590328 keywords: model checking, quantitative information flow, satisfiability modulo theori...
Information-flow analysis is a powerful technique for rea-soning about the sensitive information exp...
This thesis contributes to the field of language-based information flow analysis with a focus on det...
The security infrastructure underpinning our society relies on encryption, which relies on the corre...