International audienceQualitative information flow aims at detecting information leaks, whereas the emerging quantitative techniques target the estimation of information leaks. Quantifying information flow in the presence of low inputs is challenging, since the traditional techniques of approximating and counting the reachable states of a program no longer suffice. This paper proposes an automated quantitative information flow analysis for imperative deterministic programs with low inputs. The approach relies on a novel abstract domain, the cardinal abstraction, in order to compute a precise upper-bound over the maximum leakage of batch-job programs. We prove the soundness of the cardinal abstract domain by relying on the framework of abstr...
A confidential program should not allow any information about its secret inputs to be inferred from ...
Information-flow analysis is a powerful technique for rea-soning about the sensitive information exp...
Thesis (Ph. D.)--Massachusetts Institute of Technology, Dept. of Electrical Engineering and Computer...
International audienceQualitative information flow aims at detecting information leaks, whereas the ...
Information-theoretic measures based upon mutual information can be employed to quantify the informa...
Quantitative information flow measurement techniques have been proven to be successful in detecting ...
Information leakage occurs when a system exposes its secret information to an unauthorised entity. I...
AbstractIn a batch program, information about confidential inputs may flow to insecure outputs. The ...
PhDUnprecedented quantities of personal and business data are collected, stored, shared, and proces...
AbstractBasic information theory is used to analyse the amount of confidential information which may...
This thesis contributes to the field of language-based information flow analysis with a focus on det...
Quantifying flow of information in a program involves calculating how much information (e.g. about s...
Information flow analysis is a powerful technique for reasoning about the sensitive information expo...
Basic information theory is used to analyse the amount of confidential information which may be leak...
We present a new technique for determining how much information abouta program's secret inputs is re...
A confidential program should not allow any information about its secret inputs to be inferred from ...
Information-flow analysis is a powerful technique for rea-soning about the sensitive information exp...
Thesis (Ph. D.)--Massachusetts Institute of Technology, Dept. of Electrical Engineering and Computer...
International audienceQualitative information flow aims at detecting information leaks, whereas the ...
Information-theoretic measures based upon mutual information can be employed to quantify the informa...
Quantitative information flow measurement techniques have been proven to be successful in detecting ...
Information leakage occurs when a system exposes its secret information to an unauthorised entity. I...
AbstractIn a batch program, information about confidential inputs may flow to insecure outputs. The ...
PhDUnprecedented quantities of personal and business data are collected, stored, shared, and proces...
AbstractBasic information theory is used to analyse the amount of confidential information which may...
This thesis contributes to the field of language-based information flow analysis with a focus on det...
Quantifying flow of information in a program involves calculating how much information (e.g. about s...
Information flow analysis is a powerful technique for reasoning about the sensitive information expo...
Basic information theory is used to analyse the amount of confidential information which may be leak...
We present a new technique for determining how much information abouta program's secret inputs is re...
A confidential program should not allow any information about its secret inputs to be inferred from ...
Information-flow analysis is a powerful technique for rea-soning about the sensitive information exp...
Thesis (Ph. D.)--Massachusetts Institute of Technology, Dept. of Electrical Engineering and Computer...