The observable output of a probabilistic system that processes a secret input might reveal some information about that input. The system can be modelled as an information-theoretic channel that specifies the probability of each output, given each input. Given a prior distribution on those inputs, entropy-like measures can then quantify the amount of information leakage caused by the channel. But it turns out that the conventional channel representation, as a matrix, contains structure that is redundant with respect to that leakage, such as the labeling of columns, and columns that are scalar multiples of each other. We therefore introduce abstract channels by quotienting over those redundancies. A fundamental question for channels is whethe...
The main problem addressed by this thesis is that of characterising information leakage channels in...
Quantification of information leakage is a successful approach for evaluating the security of a syst...
Information flow analysis is a powerful technique for reasoning about the sensitive information expo...
Secrecy is fundamental to computer security, but real systems often cannot avoid leaking some secret...
Secrecy is fundamental to computer security, but real systems often cannot avoid leaking some secret...
Information flow is the branch of security that studies the leakage ofinformation due to correlation...
This paper introduces g-leakage, a rich generalization of the min-entropy model of quantitative info...
International audienceThis paper introduces g-leakage, a rich general- ization of the min-entropy mo...
International audienceIn the min-entropy approach to quantitative information flow, the leakage is de...
This dissertation presents a survey of the theoretical and practical techniques necessary to provabl...
Protecting sensitive information from improper disclosure is a fundamental security goal. It is comp...
International audienceWe consider the problem of defining a measure of information leakage in intera...
International audienceWe consider the problem of defining the information leakage in interactive sys...
International audienceWe address the problem of computing the information leakage of a system in an ...
International audienceWe consider the problem of defining the information leakage in interactive sys...
The main problem addressed by this thesis is that of characterising information leakage channels in...
Quantification of information leakage is a successful approach for evaluating the security of a syst...
Information flow analysis is a powerful technique for reasoning about the sensitive information expo...
Secrecy is fundamental to computer security, but real systems often cannot avoid leaking some secret...
Secrecy is fundamental to computer security, but real systems often cannot avoid leaking some secret...
Information flow is the branch of security that studies the leakage ofinformation due to correlation...
This paper introduces g-leakage, a rich generalization of the min-entropy model of quantitative info...
International audienceThis paper introduces g-leakage, a rich general- ization of the min-entropy mo...
International audienceIn the min-entropy approach to quantitative information flow, the leakage is de...
This dissertation presents a survey of the theoretical and practical techniques necessary to provabl...
Protecting sensitive information from improper disclosure is a fundamental security goal. It is comp...
International audienceWe consider the problem of defining a measure of information leakage in intera...
International audienceWe consider the problem of defining the information leakage in interactive sys...
International audienceWe address the problem of computing the information leakage of a system in an ...
International audienceWe consider the problem of defining the information leakage in interactive sys...
The main problem addressed by this thesis is that of characterising information leakage channels in...
Quantification of information leakage is a successful approach for evaluating the security of a syst...
Information flow analysis is a powerful technique for reasoning about the sensitive information expo...