Part 3: Security AnalysisInternational audienceWe put forward a model of action-based randomization mechanisms to analyse quantitative information flow (qif) under generic leakage functions, and under possibly adaptive adversaries. This model subsumes many of the qif models proposed so far. Our main contributions include the following: (1) we identify mild general conditions on the leakage function under which it is possible to derive general and significant results on adaptive qif; (2) we contrast the efficiency of adaptive and non-adaptive strategies, showing that the latter are as efficient as the former in terms of length up to an expansion factor bounded by the number of available actions; (3) we show that the maximum information leaka...
Abstract—Quantitative information-flow analysis (QIF) is an emerging technique for establishing info...
A common goal in the areas of secure information flow and privacy is to build effective defenses aga...
We present a model of adaptive attacks which we combine with infor-mation-theoretic metrics to quant...
Part 3: Security AnalysisInternational audienceWe put forward a model of action-based randomization ...
In the inference attacks studied in Quantitative Information Flow (QIF), the attacker typically trie...
In the inference attacks studied in Quantitative Information Flow (QIF), the attacker typically trie...
International audienceIn the inference attacks studied in Quantitative Information Flow (QIF), the a...
Despite the variety of tools and techniques deployed in order to protect sensitive data, ranging fro...
International audienceIn the inference attacks studied in Quantitative Information Flow (QIF), the a...
International audienceIn the inference attacks studied in Quantitative Information Flow (QIF), the a...
Abstract—A metric is proposed for quantifying leakage of information about secrets and about how sec...
Abstract—A metric is proposed for quantifying leakage of information about secrets and about how sec...
International audienceIn the inference attacks studied in Quantitative Information Flow (QIF), the a...
International audienceIn the inference attacks studied in Quantitative Information Flow (QIF), the a...
Abstract—Quantitative information-flow analysis (QIF) is an emerging technique for establishing info...
Abstract—Quantitative information-flow analysis (QIF) is an emerging technique for establishing info...
A common goal in the areas of secure information flow and privacy is to build effective defenses aga...
We present a model of adaptive attacks which we combine with infor-mation-theoretic metrics to quant...
Part 3: Security AnalysisInternational audienceWe put forward a model of action-based randomization ...
In the inference attacks studied in Quantitative Information Flow (QIF), the attacker typically trie...
In the inference attacks studied in Quantitative Information Flow (QIF), the attacker typically trie...
International audienceIn the inference attacks studied in Quantitative Information Flow (QIF), the a...
Despite the variety of tools and techniques deployed in order to protect sensitive data, ranging fro...
International audienceIn the inference attacks studied in Quantitative Information Flow (QIF), the a...
International audienceIn the inference attacks studied in Quantitative Information Flow (QIF), the a...
Abstract—A metric is proposed for quantifying leakage of information about secrets and about how sec...
Abstract—A metric is proposed for quantifying leakage of information about secrets and about how sec...
International audienceIn the inference attacks studied in Quantitative Information Flow (QIF), the a...
International audienceIn the inference attacks studied in Quantitative Information Flow (QIF), the a...
Abstract—Quantitative information-flow analysis (QIF) is an emerging technique for establishing info...
Abstract—Quantitative information-flow analysis (QIF) is an emerging technique for establishing info...
A common goal in the areas of secure information flow and privacy is to build effective defenses aga...
We present a model of adaptive attacks which we combine with infor-mation-theoretic metrics to quant...