Despite the variety of tools and techniques deployed in order to protect sensitive data, ranging from security types in programming languages to anonymity protocols, data sanitisation, cryptographic algorithms, . . . , real-world systems tend to disclose part of the information they are meant to protect. This happens either by design - when the output of the system is public (e.g. a password checker) - or for reasons depending on their actual deployment and implementation (e.g. side-channel attacks against cryptographic devices). Our work aims to study methods for analysing from a quantitative point of view the behaviour of information flow in computing systems, that is, the leakage of sensible information via public outputs. In general, we...
Software side-channel attacks are able to recover confidential information by observing non-function...
Abstract—A metric is proposed for quantifying leakage of information about secrets and about how sec...
Abstract—A metric is proposed for quantifying leakage of information about secrets and about how sec...
We put forward a general model intended for assessment of system security against passive eavesdropp...
Cyber security threats are important and growing issues in computing systems nowadays. Among them ar...
Classical quantitative information flow analysis often considers a system as an information-theoreti...
Cyber security threats are important and growing issues in computing systems nowadays. Among them ar...
Cyber security threats are important and growing issues in computing systems nowadays. Among them ar...
Cyber security threats are important and growing issues in computing systems nowadays. Among them ar...
We study the security of probabilistic programsunder the assumption that an active adversary control...
A common attack point in a program is the input exposed to the user. The adversary crafts a maliciou...
A common attack point in a program is the input exposed to the user. The adversary crafts a maliciou...
Side-channels are unanticipated information flows that present a significant threatto security of sy...
Side-channels are unanticipated information flows that present a significant threatto security of sy...
We present a model of adaptive attacks which we combine with infor-mation-theoretic metrics to quant...
Software side-channel attacks are able to recover confidential information by observing non-function...
Abstract—A metric is proposed for quantifying leakage of information about secrets and about how sec...
Abstract—A metric is proposed for quantifying leakage of information about secrets and about how sec...
We put forward a general model intended for assessment of system security against passive eavesdropp...
Cyber security threats are important and growing issues in computing systems nowadays. Among them ar...
Classical quantitative information flow analysis often considers a system as an information-theoreti...
Cyber security threats are important and growing issues in computing systems nowadays. Among them ar...
Cyber security threats are important and growing issues in computing systems nowadays. Among them ar...
Cyber security threats are important and growing issues in computing systems nowadays. Among them ar...
We study the security of probabilistic programsunder the assumption that an active adversary control...
A common attack point in a program is the input exposed to the user. The adversary crafts a maliciou...
A common attack point in a program is the input exposed to the user. The adversary crafts a maliciou...
Side-channels are unanticipated information flows that present a significant threatto security of sy...
Side-channels are unanticipated information flows that present a significant threatto security of sy...
We present a model of adaptive attacks which we combine with infor-mation-theoretic metrics to quant...
Software side-channel attacks are able to recover confidential information by observing non-function...
Abstract—A metric is proposed for quantifying leakage of information about secrets and about how sec...
Abstract—A metric is proposed for quantifying leakage of information about secrets and about how sec...