International audienceInformation flow is the branch of security that studies the leakage of information due to correlation between secrets and observables. Since in general such correlation cannot be avoided completely, it is important to quantify the leakage. The most followed approaches to defining appropriate measures are those based on information theory. In particular, one of the most successful approaches is the recently proposed g-leakage framework, which encompasses most of the information-theoretic ones. A problem with g-leakage, however, is that it is defined in terms of a minimization problem, which, in the case of large systems, can be computationally rather heavy. In this paper we study the case in which the channel associated...
Abstract—Protecting sensitive information from improper disclosure is a fundamental security goal. I...
The main problem addressed by this thesis is that of characterising information leakage channels in...
International audienceBelief and min-entropy leakage are two well-known approaches to quantify infor...
International audienceInformation flow is the branch of security that studies the leakage of informa...
International audienceIn the min-entropy approach to quantitative information flow, the leakage is de...
Secrecy is fundamental to computer security, but real systems often cannot avoid leaking some secret...
Secrecy is fundamental to computer security, but real systems often cannot avoid leaking some secret...
This paper introduces g-leakage, a rich generalization of the min-entropy model of quantitative info...
International audienceThis paper introduces g-leakage, a rich general- ization of the min-entropy mo...
International audiencePreventing information leakage is a fundamental goal in achieving confidential...
International audienceQuantitative information flow aims to assess and control the leakage of sensit...
Quantitative information flow aims to assess and control the leakage of sensitive information by com...
Protecting sensitive information from improper disclosure is a fundamental security goal. It is comp...
Protecting confidential information from improper disclosure is a fundamental security goal. While e...
The observable output of a probabilistic system that processes a secret input might reveal some info...
Abstract—Protecting sensitive information from improper disclosure is a fundamental security goal. I...
The main problem addressed by this thesis is that of characterising information leakage channels in...
International audienceBelief and min-entropy leakage are two well-known approaches to quantify infor...
International audienceInformation flow is the branch of security that studies the leakage of informa...
International audienceIn the min-entropy approach to quantitative information flow, the leakage is de...
Secrecy is fundamental to computer security, but real systems often cannot avoid leaking some secret...
Secrecy is fundamental to computer security, but real systems often cannot avoid leaking some secret...
This paper introduces g-leakage, a rich generalization of the min-entropy model of quantitative info...
International audienceThis paper introduces g-leakage, a rich general- ization of the min-entropy mo...
International audiencePreventing information leakage is a fundamental goal in achieving confidential...
International audienceQuantitative information flow aims to assess and control the leakage of sensit...
Quantitative information flow aims to assess and control the leakage of sensitive information by com...
Protecting sensitive information from improper disclosure is a fundamental security goal. It is comp...
Protecting confidential information from improper disclosure is a fundamental security goal. While e...
The observable output of a probabilistic system that processes a secret input might reveal some info...
Abstract—Protecting sensitive information from improper disclosure is a fundamental security goal. I...
The main problem addressed by this thesis is that of characterising information leakage channels in...
International audienceBelief and min-entropy leakage are two well-known approaches to quantify infor...