Quantifying flow of information in a program involves calculating how much information (e.g. about secret inputs) can be leaked by observing the program's public outputs. Recently this field has attracted a lot of research interest, most of which makes use of Shannon's information theory, e.g. mutual information, conditional entropy, etc. Computability entails that any automated analysis of information is necessarily incomplete. Thus quantitative flow of analyses aim to compute upper bounds on the sizes of the flows in a program. Virtually all the current quantitative analyses treat program variables independently, which significantly limits the potential for deriving tight upper bounds. Our work is motivated by the intuition that knowledg...
Thesis (Ph. D.)--Massachusetts Institute of Technology, Dept. of Electrical Engineering and Computer...
Basic information theory is used to analyse the amount of confidential information which may be leak...
Protecting confidential information from improper disclosure is a fundamental security goal. While e...
International audienceQualitative information flow aims at detecting information leaks, whereas the ...
Information leakage occurs when a system exposes its secret information to an unauthorised entity. I...
Researchers have proposed formal definitions of quantitative informa-tion flow based on information ...
In this paper, we investigate the computational complexity of quantitative information flow (QIF) pr...
Information flow analysis is a powerful technique for reasoning about the sensitive information expo...
International audienceInformation flow is the branch of security that studies the leakage of informa...
Abstract—Quantitative information-flow analysis (QIF) is an emerging technique for establishing info...
Information-flow analysis is a powerful technique for rea-soning about the sensitive information exp...
PhDUnprecedented quantities of personal and business data are collected, stored, shared, and proces...
Abstract—Quantitative information-flow analysis (QIF) is an emerging technique for establishing info...
Information-theoretic measures based upon mutual information can be employed to quantify the informa...
AbstractBasic information theory is used to analyse the amount of confidential information which may...
Thesis (Ph. D.)--Massachusetts Institute of Technology, Dept. of Electrical Engineering and Computer...
Basic information theory is used to analyse the amount of confidential information which may be leak...
Protecting confidential information from improper disclosure is a fundamental security goal. While e...
International audienceQualitative information flow aims at detecting information leaks, whereas the ...
Information leakage occurs when a system exposes its secret information to an unauthorised entity. I...
Researchers have proposed formal definitions of quantitative informa-tion flow based on information ...
In this paper, we investigate the computational complexity of quantitative information flow (QIF) pr...
Information flow analysis is a powerful technique for reasoning about the sensitive information expo...
International audienceInformation flow is the branch of security that studies the leakage of informa...
Abstract—Quantitative information-flow analysis (QIF) is an emerging technique for establishing info...
Information-flow analysis is a powerful technique for rea-soning about the sensitive information exp...
PhDUnprecedented quantities of personal and business data are collected, stored, shared, and proces...
Abstract—Quantitative information-flow analysis (QIF) is an emerging technique for establishing info...
Information-theoretic measures based upon mutual information can be employed to quantify the informa...
AbstractBasic information theory is used to analyse the amount of confidential information which may...
Thesis (Ph. D.)--Massachusetts Institute of Technology, Dept. of Electrical Engineering and Computer...
Basic information theory is used to analyse the amount of confidential information which may be leak...
Protecting confidential information from improper disclosure is a fundamental security goal. While e...