Language-based information-flow security

A Sabelfeld, AC Myers - IEEE Journal on selected areas in …, 2003 - ieeexplore.ieee.org
Current standard security practices do not provide substantial assurance that the end-to-end
behavior of a computing system satisfies important security policies such as confidentiality …

On the foundations of quantitative information flow

G Smith - International Conference on Foundations of Software …, 2009 - Springer
There is growing interest in quantitative theories of information flow in a variety of contexts,
such as secure information flow, anonymity protocols, and side-channel analysis. Such …

An information-theoretic model for adaptive side-channel attacks

B Köpf, D Basin - Proceedings of the 14th ACM conference on Computer …, 2007 - dl.acm.org
We present a model of adaptive side-channel attacks which we combine with information-
theoretic metrics to quantify the information revealed to an attacker. This allows us to …

Declassification: Dimensions and principles

A Sabelfeld, D Sands - Journal of Computer Security, 2009 - journals.sagepub.com
Computing systems often deliberately release (or declassify) sensitive information. A
principal security concern for systems permitting information release is whether this release …

Botnet tracking: Exploring a root-cause methodology to prevent distributed denial-of-service attacks

FC Freiling, T Holz, G Wicherski - … Security, Milan, Italy, September 12-14 …, 2005 - Springer
Abstract Denial-of-Service (DoS) attacks pose a significant threat to the Internet today
especially if they are distributed, ie, launched simultaneously at a large number of systems …

A model for delimited information release

A Sabelfeld, AC Myers - Software Security-Theories and Systems: Second …, 2004 - Springer
Much work on security-typed languages lacks a satisfactory account of intentional
information release. In the context of confidentiality, a typical security guarantee provided by …

Dimensions and principles of declassification

A Sabelfeld, D Sands - 18th IEEE Computer Security …, 2005 - ieeexplore.ieee.org
Computing systems often deliberately release (or declassify) sensitive information. A
principal security concern for systems permitting information release is whether this release …

Probabilistic relational reasoning for differential privacy

G Barthe, B Köpf, F Olmedo… - Proceedings of the 39th …, 2012 - dl.acm.org
Differential privacy is a notion of confidentiality that protects the privacy of individuals while
allowing useful computations on their private data. Deriving differential privacy guarantees …

A perspective on information-flow control

D Hedin, A Sabelfeld - Software safety and security, 2012 - ebooks.iospress.nl
Abstract Information-flow control tracks how information propagates through the program
during execution to make sure that the program handles the information securely. Secure …

Anonymity protocols as noisy channels

K Chatzikokolakis, C Palamidessi… - Information and …, 2008 - Elsevier
We consider a framework in which anonymity protocols are interpreted as noisy channels in
the information-theoretic sense, and we explore the idea of using the notion of capacity as a …