Secrecy is fundamental to computer security, but real systems often cannot avoid leaking some secret information. For this reason, the past decade has seen growing interest in quantitative theories of information flow that allow us to quantify the information being leaked. Within these theories, the system is modeled as an information-theoretic channel that specifies the probability of each output, given each input. Given a prior distribution on those inputs, entropy-like measures quantify the amount of information leakage caused by the channel. This thesis presents new results in the theory of min-entropy leakage. First, we study the perspective of secrecy as a resource that is gradually consumed by a system. We explore this intuition thro...
International audienceSecure information flow is the problem of ensuring that the information made p...
International audienceKöpf and Basin have discussed the relation between brute-force guessing attack...
International audienceProtecting sensitive information from improper disclosure is a fundamental sec...
Secrecy is fundamental to computer security, but real systems often cannot avoid leaking some secret...
Information flow is the branch of security that studies the leakage ofinformation due to correlation...
International audienceIn the min-entropy approach to quantitative information flow, the leakage is de...
International audienceThis paper introduces g-leakage, a rich general- ization of the min-entropy mo...
The observable output of a probabilistic system that processes a secret input might reveal some info...
Protecting confidential information from improper disclosure is a fundamental security goal. While e...
This paper introduces g-leakage, a rich generalization of the min-entropy model of quantitative info...
Information leakage occurs when a system exposes its secret information to an unauthorised entity. I...
Belief and min-entropy leakage are two well-known approaches to quantify information flow in securit...
Protecting confidential information from improper disclosure is a fundamental security goal. While e...
AbstractRecent research in quantitative theories for information-hiding topics, such as Anonymity an...
International audienceRecent research in quantitative theories for information-hiding topics, such a...
International audienceSecure information flow is the problem of ensuring that the information made p...
International audienceKöpf and Basin have discussed the relation between brute-force guessing attack...
International audienceProtecting sensitive information from improper disclosure is a fundamental sec...
Secrecy is fundamental to computer security, but real systems often cannot avoid leaking some secret...
Information flow is the branch of security that studies the leakage ofinformation due to correlation...
International audienceIn the min-entropy approach to quantitative information flow, the leakage is de...
International audienceThis paper introduces g-leakage, a rich general- ization of the min-entropy mo...
The observable output of a probabilistic system that processes a secret input might reveal some info...
Protecting confidential information from improper disclosure is a fundamental security goal. While e...
This paper introduces g-leakage, a rich generalization of the min-entropy model of quantitative info...
Information leakage occurs when a system exposes its secret information to an unauthorised entity. I...
Belief and min-entropy leakage are two well-known approaches to quantify information flow in securit...
Protecting confidential information from improper disclosure is a fundamental security goal. While e...
AbstractRecent research in quantitative theories for information-hiding topics, such as Anonymity an...
International audienceRecent research in quantitative theories for information-hiding topics, such a...
International audienceSecure information flow is the problem of ensuring that the information made p...
International audienceKöpf and Basin have discussed the relation between brute-force guessing attack...
International audienceProtecting sensitive information from improper disclosure is a fundamental sec...