International audienceQualitative information flow aims at detecting information leaks, whereas the emerging quantitative techniques target the estimation of information leaks. Quantifying information flow in the presence of low inputs is challenging, since the traditional techniques of approximating and counting the reachable states of a program no longer suffice. This paper proposes an automated quantitative information flow analysis for imperative deterministic programs with low inputs. The approach relies on a novel abstract domain, the cardinal abstraction, in order to compute a precise upper-bound over the maximum leakage of batch-job programs. We prove the soundness of the cardinal abstract domain by relying on the framework of abstr...
Thesis (Ph. D.)--Massachusetts Institute of Technology, Dept. of Electrical Engineering and Computer...
acmid: 2632367 keywords: Model Counting, Quantitative Information Flow, Reliability Analysis, Symbol...
We report on our work-in-progress into the use of reliabil-ity analysis to quantify information leak...
International audienceQualitative information flow aims at detecting information leaks, whereas the ...
Quantitative information flow measurement techniques have been proven to be successful in detecting ...
PhDUnprecedented quantities of personal and business data are collected, stored, shared, and proces...
Information-theoretic measures based upon mutual information can be employed to quantify the informa...
AbstractBasic information theory is used to analyse the amount of confidential information which may...
Quantifying flow of information in a program involves calculating how much information (e.g. about s...
Information leakage occurs when a system exposes its secret information to an unauthorised entity. I...
Information flow analysis is a powerful technique for reasoning about the sensitive information expo...
Basic information theory is used to analyse the amount of confidential information which may be leak...
AbstractIn a batch program, information about confidential inputs may flow to insecure outputs. The ...
This thesis contributes to the field of language-based information flow analysis with a focus on det...
A confidential program should not allow any information about its secret inputs to be inferred from ...
Thesis (Ph. D.)--Massachusetts Institute of Technology, Dept. of Electrical Engineering and Computer...
acmid: 2632367 keywords: Model Counting, Quantitative Information Flow, Reliability Analysis, Symbol...
We report on our work-in-progress into the use of reliabil-ity analysis to quantify information leak...
International audienceQualitative information flow aims at detecting information leaks, whereas the ...
Quantitative information flow measurement techniques have been proven to be successful in detecting ...
PhDUnprecedented quantities of personal and business data are collected, stored, shared, and proces...
Information-theoretic measures based upon mutual information can be employed to quantify the informa...
AbstractBasic information theory is used to analyse the amount of confidential information which may...
Quantifying flow of information in a program involves calculating how much information (e.g. about s...
Information leakage occurs when a system exposes its secret information to an unauthorised entity. I...
Information flow analysis is a powerful technique for reasoning about the sensitive information expo...
Basic information theory is used to analyse the amount of confidential information which may be leak...
AbstractIn a batch program, information about confidential inputs may flow to insecure outputs. The ...
This thesis contributes to the field of language-based information flow analysis with a focus on det...
A confidential program should not allow any information about its secret inputs to be inferred from ...
Thesis (Ph. D.)--Massachusetts Institute of Technology, Dept. of Electrical Engineering and Computer...
acmid: 2632367 keywords: Model Counting, Quantitative Information Flow, Reliability Analysis, Symbol...
We report on our work-in-progress into the use of reliabil-ity analysis to quantify information leak...