Quantification of information leakage is a successful approach for evaluating the security of a system. It models the system to be analyzed as a channel with the secret as the input and an output as observable by the attacker as the output, and applies information theory to quantify the amount of information transmitted through such channel, thus effectively quantifying how many bits of the secret can be inferred by the attacker by analyzing the system’s output.Channels are usually encoded as matrices of conditional probabilities, known as channel matrices. Such matrices grow exponentially in the size of the secret and observables, are cumbersome to compute and store, encode both the behavior of the system and assumptions about the attacker...
In recent years, quantitative security techniques have been providing effective measures of the secu...
Secrecy is fundamental to computer security, but real systems often cannot avoid leaking some secret...
In this thesis, we investigate attack vectors against Markov decision processes anddynamical systems...
Quantification of information leakage is a successful approach for evaluating the security of a syst...
International audienceThe quantification of information leakage provides a quantitative evaluation o...
Abstract. The quantification of information leakage provides a quan-titative evaluation of the secur...
In recent years, quantitative security techniques have been providing effective measures of the secu...
Despite the variety of tools and techniques deployed in order to protect sensitive data, ranging fro...
We put forward a general model intended for assessment of system security against passive eavesdropp...
Abstract—The outputs of a program that processes secret data may reveal information about the values...
International audienceWe address the problem of computing the information leakage of a system in an ...
Abstract. The channel capacity of a deterministic system with confidential data is an upper bound on...
International audienceThe channel capacity of a deterministic system with confidential data is an up...
We study the asymptotic behaviour of (a) information leakage and (b) adversary’s error probability i...
In recent years, quantitative security techniques have been providing effective measures of the secu...
Secrecy is fundamental to computer security, but real systems often cannot avoid leaking some secret...
In this thesis, we investigate attack vectors against Markov decision processes anddynamical systems...
Quantification of information leakage is a successful approach for evaluating the security of a syst...
International audienceThe quantification of information leakage provides a quantitative evaluation o...
Abstract. The quantification of information leakage provides a quan-titative evaluation of the secur...
In recent years, quantitative security techniques have been providing effective measures of the secu...
Despite the variety of tools and techniques deployed in order to protect sensitive data, ranging fro...
We put forward a general model intended for assessment of system security against passive eavesdropp...
Abstract—The outputs of a program that processes secret data may reveal information about the values...
International audienceWe address the problem of computing the information leakage of a system in an ...
Abstract. The channel capacity of a deterministic system with confidential data is an upper bound on...
International audienceThe channel capacity of a deterministic system with confidential data is an up...
We study the asymptotic behaviour of (a) information leakage and (b) adversary’s error probability i...
In recent years, quantitative security techniques have been providing effective measures of the secu...
Secrecy is fundamental to computer security, but real systems often cannot avoid leaking some secret...
In this thesis, we investigate attack vectors against Markov decision processes anddynamical systems...