Information leakage occurs when a system exposes its secret information to an unauthorised entity. Information flow analysis is concerned with tracking flows of information through systems to determine whether they process information securely or leak information. We present a novel information flow model that permits an arbitrary amount of secret and publicly-observable information to occur at any point and in any order in a system. This is an improvement over previous models, which generally assume that systems process a single piece of secret information present before execution and produce a single piece of publicly-observable information upon termination. Our model precisely quantifies the information leakage from secret to publicly...
Belief and min-entropy leakage are two well-known approaches to quantify information flow in securit...
A confidential program should not allow any information about its secret inputs to be inferred from ...
AbstractBasic information theory is used to analyse the amount of confidential information which may...
International audiencePrograms that process secret data may inadvertently reveal information about t...
International audiencePrograms that process secret data may inadvertently reveal information about t...
International audiencePrograms that process secret data may inadvertently reveal information about t...
Abstract. Programs that process secret data may inadvertently reveal information about those secrets...
PhDUnprecedented quantities of personal and business data are collected, stored, shared, and proces...
International audienceIn recent years, there has been a growing interest in considering the probabil...
International audienceIn recent years, there has been a growing interest in considering the probabil...
Abstract—The outputs of a program that processes secret data may reveal information about the values...
This thesis contributes to the field of language-based information flow analysis with a focus on det...
This thesis contributes to the field of language-based information flow analysis with a focus on det...
International audienceIn recent years, there has been a growing interest in considering the probabil...
International audienceBelief and min-entropy leakage are two well-known approaches to quantify infor...
Belief and min-entropy leakage are two well-known approaches to quantify information flow in securit...
A confidential program should not allow any information about its secret inputs to be inferred from ...
AbstractBasic information theory is used to analyse the amount of confidential information which may...
International audiencePrograms that process secret data may inadvertently reveal information about t...
International audiencePrograms that process secret data may inadvertently reveal information about t...
International audiencePrograms that process secret data may inadvertently reveal information about t...
Abstract. Programs that process secret data may inadvertently reveal information about those secrets...
PhDUnprecedented quantities of personal and business data are collected, stored, shared, and proces...
International audienceIn recent years, there has been a growing interest in considering the probabil...
International audienceIn recent years, there has been a growing interest in considering the probabil...
Abstract—The outputs of a program that processes secret data may reveal information about the values...
This thesis contributes to the field of language-based information flow analysis with a focus on det...
This thesis contributes to the field of language-based information flow analysis with a focus on det...
International audienceIn recent years, there has been a growing interest in considering the probabil...
International audienceBelief and min-entropy leakage are two well-known approaches to quantify infor...
Belief and min-entropy leakage are two well-known approaches to quantify information flow in securit...
A confidential program should not allow any information about its secret inputs to be inferred from ...
AbstractBasic information theory is used to analyse the amount of confidential information which may...