Measuring information leakage using generalized gain functions

SA M'rio, K Chatzikokolakis… - 2012 IEEE 25th …, 2012 - ieeexplore.ieee.org
This paper introduces g-leakage, a rich generalization of the min-entropy model of
quantitative information flow. In g-leakage, the benefit that an adversary derives from a …

Qflow: Quantitative information flow for security-aware hardware design in verilog

LM Reimann, L Hanel, D Sisejkovic… - 2021 IEEE 39th …, 2021 - ieeexplore.ieee.org
The enormous amount of code required to design modern hardware implementations often
leads to critical vulnerabilities being overlooked. Especially vulnerabilities that compromise …

[HTML][HTML] Min-entropy as a resource

B Espinoza, G Smith - Information and Computation, 2013 - Elsevier
Secrecy is fundamental to computer security, but real systems often cannot avoid leaking
some secret information. For this reason, it is useful to model secrecy quantitatively, thinking …

Lagrange multipliers and maximum information leakage in different observational models

P Malacaria, H Chen - Proceedings of the third ACM SIGPLAN workshop …, 2008 - dl.acm.org
This paper explores two fundamental issues in Language based security. The first is to
provide a quantitative definition of information leakage valid in several attacker's models. We …

Quantifying information leakage in process calculi

M Boreale - Information and Computation, 2009 - Elsevier
Building on simple information-theoretic concepts, we study two quantitative models of
information leakage in the pi-calculus. The first model presupposes an attacker with an …

Quantitative analysis of leakage for multi-threaded programs

H Chen, P Malacaria - Proceedings of the 2007 workshop on …, 2007 - dl.acm.org
We present a quantitative analysis of information flow for a multi-threaded language based
on a probabilistic scheduler. The analysis consists of two steps. First, multi-threaded …

Metrics for differential privacy in concurrent systems

L Xu, K Chatzikokolakis, H Lin - International Conference on Formal …, 2014 - Springer
Originally proposed for privacy protection in the context of statistical databases, differential
privacy is now widely adopted in various models of computation. In this paper we investigate …

Quantitative analysis of secure information flow via probabilistic semantics

C Mu, D Clark - 2009 International Conference on Availability …, 2009 - ieeexplore.ieee.org
We present an automatic analyzer for measuring information flow within software systems. In
this paper, we quantify leakage in terms of information theory and incorporate this …

Quantifying maximal loss of anonymity in protocols

H Chen, P Malacaria - Proceedings of the 4th International Symposium …, 2009 - dl.acm.org
There is a natural intuitive match between anonymity and information theory. In particular,
the maximal anonymity loss in anonymity protocols can be matched to the information …

An interval-based abstraction for quantifying information flow

C Mu, D Clark - Electronic Notes in Theoretical Computer Science, 2009 - Elsevier
In a batch program, information about confidential inputs may flow to insecure outputs. The
size of this leakage, considered as a Shannon measure, may be automatically and exactly …