Thesis (Ph. D.)--Massachusetts Institute of Technology, Dept. of Electrical Engineering and Computer Science, 2008.This electronic version was submitted by the student author. The certified thesis is available in the Institute Archives and Special Collections.Includes bibliographical references (p. 99-105).An information-flow security policy constrains a computer system's end-to-end use of information, even as it is transformed in computation. For instance, a policy would not just restrict what secret data could be revealed directly, but restrict any output that might allow inferences about the secret. Expressing such a policy quantitatively, in terms of a specific number of bits of information, is often an effective program independent wa...
Protecting confidential information from improper disclosure is a fundamental security goal. While e...
Protecting confidential information from improper disclosure is a fundamental security goal. While e...
acmid: 2632367 keywords: Model Counting, Quantitative Information Flow, Reliability Analysis, Symbol...
We present a new technique for determining how much information abouta program's secret inputs is re...
We present a new approach for tracking programs' use of data througharbitrary calculations, to deter...
A common attack point in a program is the input exposed to the user. The adversary crafts a maliciou...
Despite the variety of tools and techniques deployed in order to protect sensitive data, ranging fro...
Noninterference, a strong security property for a computation process, informally says that the proc...
PhDUnprecedented quantities of personal and business data are collected, stored, shared, and proces...
This thesis contributes to the field of language-based information flow analysis with a focus on det...
Quantitative information flow measurement techniques have been proven to be successful in detecting ...
Information leakage occurs when a system exposes its secret information to an unauthorised entity. I...
We present a new approach for tracking programs ’ use of data through arbitrary calculations, to det...
International audienceQualitative information flow aims at detecting information leaks, whereas the ...
In today's information-based society, guaranteeing information security plays an important role in a...
Protecting confidential information from improper disclosure is a fundamental security goal. While e...
Protecting confidential information from improper disclosure is a fundamental security goal. While e...
acmid: 2632367 keywords: Model Counting, Quantitative Information Flow, Reliability Analysis, Symbol...
We present a new technique for determining how much information abouta program's secret inputs is re...
We present a new approach for tracking programs' use of data througharbitrary calculations, to deter...
A common attack point in a program is the input exposed to the user. The adversary crafts a maliciou...
Despite the variety of tools and techniques deployed in order to protect sensitive data, ranging fro...
Noninterference, a strong security property for a computation process, informally says that the proc...
PhDUnprecedented quantities of personal and business data are collected, stored, shared, and proces...
This thesis contributes to the field of language-based information flow analysis with a focus on det...
Quantitative information flow measurement techniques have been proven to be successful in detecting ...
Information leakage occurs when a system exposes its secret information to an unauthorised entity. I...
We present a new approach for tracking programs ’ use of data through arbitrary calculations, to det...
International audienceQualitative information flow aims at detecting information leaks, whereas the ...
In today's information-based society, guaranteeing information security plays an important role in a...
Protecting confidential information from improper disclosure is a fundamental security goal. While e...
Protecting confidential information from improper disclosure is a fundamental security goal. While e...
acmid: 2632367 keywords: Model Counting, Quantitative Information Flow, Reliability Analysis, Symbol...