Measuring information leakage using generalized gain functions
SA M'rio, K Chatzikokolakis… - 2012 IEEE 25th …, 2012 - ieeexplore.ieee.org
This paper introduces g-leakage, a rich generalization of the min-entropy model of
quantitative information flow. In g-leakage, the benefit that an adversary derives from a …
quantitative information flow. In g-leakage, the benefit that an adversary derives from a …
Qflow: Quantitative information flow for security-aware hardware design in verilog
The enormous amount of code required to design modern hardware implementations often
leads to critical vulnerabilities being overlooked. Especially vulnerabilities that compromise …
leads to critical vulnerabilities being overlooked. Especially vulnerabilities that compromise …
[HTML][HTML] Min-entropy as a resource
Secrecy is fundamental to computer security, but real systems often cannot avoid leaking
some secret information. For this reason, it is useful to model secrecy quantitatively, thinking …
some secret information. For this reason, it is useful to model secrecy quantitatively, thinking …
Lagrange multipliers and maximum information leakage in different observational models
This paper explores two fundamental issues in Language based security. The first is to
provide a quantitative definition of information leakage valid in several attacker's models. We …
provide a quantitative definition of information leakage valid in several attacker's models. We …
Quantifying information leakage in process calculi
M Boreale - Information and Computation, 2009 - Elsevier
Building on simple information-theoretic concepts, we study two quantitative models of
information leakage in the pi-calculus. The first model presupposes an attacker with an …
information leakage in the pi-calculus. The first model presupposes an attacker with an …
Quantitative analysis of leakage for multi-threaded programs
We present a quantitative analysis of information flow for a multi-threaded language based
on a probabilistic scheduler. The analysis consists of two steps. First, multi-threaded …
on a probabilistic scheduler. The analysis consists of two steps. First, multi-threaded …
Metrics for differential privacy in concurrent systems
Originally proposed for privacy protection in the context of statistical databases, differential
privacy is now widely adopted in various models of computation. In this paper we investigate …
privacy is now widely adopted in various models of computation. In this paper we investigate …
Quantitative analysis of secure information flow via probabilistic semantics
C Mu, D Clark - 2009 International Conference on Availability …, 2009 - ieeexplore.ieee.org
We present an automatic analyzer for measuring information flow within software systems. In
this paper, we quantify leakage in terms of information theory and incorporate this …
this paper, we quantify leakage in terms of information theory and incorporate this …
Quantifying maximal loss of anonymity in protocols
There is a natural intuitive match between anonymity and information theory. In particular,
the maximal anonymity loss in anonymity protocols can be matched to the information …
the maximal anonymity loss in anonymity protocols can be matched to the information …
An interval-based abstraction for quantifying information flow
C Mu, D Clark - Electronic Notes in Theoretical Computer Science, 2009 - Elsevier
In a batch program, information about confidential inputs may flow to insecure outputs. The
size of this leakage, considered as a Shannon measure, may be automatically and exactly …
size of this leakage, considered as a Shannon measure, may be automatically and exactly …