AbstractBuilding on simple information-theoretic concepts, we study two quantitative models of information leakage in the pi-calculus. The first model presupposes an attacker with an essentially unlimited computational power. The resulting notion of absolute leakage, measured in bits, is in agreement with secrecy as defined by Abadi and Gordon: a process has an absolute leakage of zero precisely when it satisfies secrecy. The second model assumes a restricted observation scenario, inspired by the testing equivalence framework, where the attacker can only conduct repeated success-or-failure experiments on processes. Moreover, each experiment has a cost in terms of communication effort. The resulting notion of leakage rate, measured in bits p...
Noninterference, a strong security property for a computation process, informally says that the proc...
A confidential program should not allow any information about its secret inputs to be inferred from ...
International audienceQuantitative information flow aims to assess and control the leakage of sensit...
AbstractBasic information theory is used to analyse the amount of confidential information which may...
International audienceIn recent years, quantitative security techniques have been providing effectiv...
Basic information theory is used to analyse the amount of confidential information which may be leak...
Despite the variety of tools and techniques deployed in order to protect sensitive data, ranging fro...
Information leakage occurs when a system exposes its secret information to an unauthorised entity. I...
We put forward a general model intended for assessment of system security against passive eavesdropp...
PhDUnprecedented quantities of personal and business data are collected, stored, shared, and proces...
International audienceIn the inference attacks studied in Quantitative Information Flow (QIF), the a...
International audienceWe address the problem of computing the information leakage of a system in an ...
Current tools for analysing information flow in programs build upon ideas going back to Denning's wo...
acmid: 2590328 keywords: model checking, quantitative information flow, satisfiability modulo theori...
This thesis contributes to the field of language-based information flow analysis with a focus on det...
Noninterference, a strong security property for a computation process, informally says that the proc...
A confidential program should not allow any information about its secret inputs to be inferred from ...
International audienceQuantitative information flow aims to assess and control the leakage of sensit...
AbstractBasic information theory is used to analyse the amount of confidential information which may...
International audienceIn recent years, quantitative security techniques have been providing effectiv...
Basic information theory is used to analyse the amount of confidential information which may be leak...
Despite the variety of tools and techniques deployed in order to protect sensitive data, ranging fro...
Information leakage occurs when a system exposes its secret information to an unauthorised entity. I...
We put forward a general model intended for assessment of system security against passive eavesdropp...
PhDUnprecedented quantities of personal and business data are collected, stored, shared, and proces...
International audienceIn the inference attacks studied in Quantitative Information Flow (QIF), the a...
International audienceWe address the problem of computing the information leakage of a system in an ...
Current tools for analysing information flow in programs build upon ideas going back to Denning's wo...
acmid: 2590328 keywords: model checking, quantitative information flow, satisfiability modulo theori...
This thesis contributes to the field of language-based information flow analysis with a focus on det...
Noninterference, a strong security property for a computation process, informally says that the proc...
A confidential program should not allow any information about its secret inputs to be inferred from ...
International audienceQuantitative information flow aims to assess and control the leakage of sensit...