Quantified information flow (QIF) has emerged as a rigorous approach to quantitatively measure confidentiality; the information-theoretic underpinning of QIF allows the end-users to link the computed quantities with the computational effort required on the part of the adversary to gain access to desired confidential information. In this work, we focus on the estimation of Shannon entropy for a given program P. As a first step, we focus on the case wherein a Boolean formula F(X,Y) captures the relationship between inputs X and output Y of P. Such formulas F(X,Y) have the property that there exists exactly one valuation to Y such that F is satisfied. The existing techniques require O(2^m) model counting queries, where m =|Y|. We propose the f...
International audienceThe channel capacity of a deterministic system with confidential data is an up...
It was recently shown that estimating the Shannon entropy H(p) of a discrete k-symbol distribution p...
In this paper, we investigate the computational complexity of quantitative information flow (QIF) pr...
Several measures have been proposed in literature for quantifying the information leaked by the publ...
In recent work we have proposed a software reliability analy-sis technique that uses symbolic execut...
We report on our work-in-progress into the use of reliabil-ity analysis to quantify information leak...
This paper describes the method which allows an estimation of information entropy in the meaning of ...
Guesswork forms the mathematical framework for quantifying computational security subject to brute-f...
Guesswork forms the mathematical framework for quantifying computational security subject to brute-f...
Protecting confidential information from improper disclosure is a fundamental security goal. While e...
Information flow analysis is a powerful technique for reasoning about the sensitive information expo...
The security infrastructure underpinning our society relies on encryption, which relies on the corre...
Guesswork forms the mathematical framework for quantifying computational security subject to brute-...
Abstract. The channel capacity of a deterministic system with confidential data is an upper bound on...
It was recently shown that estimating the Shannon entropy H(p) of a discrete k-symbol distribution p...
International audienceThe channel capacity of a deterministic system with confidential data is an up...
It was recently shown that estimating the Shannon entropy H(p) of a discrete k-symbol distribution p...
In this paper, we investigate the computational complexity of quantitative information flow (QIF) pr...
Several measures have been proposed in literature for quantifying the information leaked by the publ...
In recent work we have proposed a software reliability analy-sis technique that uses symbolic execut...
We report on our work-in-progress into the use of reliabil-ity analysis to quantify information leak...
This paper describes the method which allows an estimation of information entropy in the meaning of ...
Guesswork forms the mathematical framework for quantifying computational security subject to brute-f...
Guesswork forms the mathematical framework for quantifying computational security subject to brute-f...
Protecting confidential information from improper disclosure is a fundamental security goal. While e...
Information flow analysis is a powerful technique for reasoning about the sensitive information expo...
The security infrastructure underpinning our society relies on encryption, which relies on the corre...
Guesswork forms the mathematical framework for quantifying computational security subject to brute-...
Abstract. The channel capacity of a deterministic system with confidential data is an upper bound on...
It was recently shown that estimating the Shannon entropy H(p) of a discrete k-symbol distribution p...
International audienceThe channel capacity of a deterministic system with confidential data is an up...
It was recently shown that estimating the Shannon entropy H(p) of a discrete k-symbol distribution p...
In this paper, we investigate the computational complexity of quantitative information flow (QIF) pr...