Automated generation of attack trees
Attack trees are widely used to represent threat scenarios in a succinct and intuitive manner,
suitable for conveying security information to non-experts. The manual construction of such …
suitable for conveying security information to non-experts. The manual construction of such …
Model checking quantitative hyperproperties
Hyperproperties are properties of sets of computation traces. In this paper, we study
quantitative hyperproperties, which we define as hyperproperties that express a bound on …
quantitative hyperproperties, which we define as hyperproperties that express a bound on …
Leakwatch: Estimating information leakage from java programs
Programs that process secret data may inadvertently reveal information about those secrets
in their publicly-observable output. This paper presents LeakWatch, a quantitative …
in their publicly-observable output. This paper presents LeakWatch, a quantitative …
Scalable approximation of quantitative information flow in programs
Quantitative information flow measurement techniques have been proven to be successful in
detecting leakage of confidential information from programs. Modern approaches are based …
detecting leakage of confidential information from programs. Modern approaches are based …
A model counter for constraints over unbounded strings
Model counting is the problem of determining the number of solutions that satisfy a given set
of constraints. Model counting has numerous applications in the quantitative analyses of …
of constraints. Model counting has numerous applications in the quantitative analyses of …
Abstract model counting: a novel approach for quantification of information leaks
We present a novel method for Quantitative Information Flow analysis. We show how the
problem of computing information leakage can be viewed as an extension of the …
problem of computing information leakage can be viewed as an extension of the …
Model counting for recursively-defined strings
We present a new algorithm for model counting of a class of string constraints. In addition to
the classic operation of concatenation, our class includes some recursively defined …
the classic operation of concatenation, our class includes some recursively defined …
Time-aware subgroup matrix decomposition: Imputing missing data using forecasting events
Deep neural network models, especially Long Short Term Memory (LSTM), have shown
great success in analyzing Electronic Health Records (EHRs) due to their ability to capture …
great success in analyzing Electronic Health Records (EHRs) due to their ability to capture …
Mining for mutation operators for reduction of information flow control violations
The unintentional flow of confidential data to unauthorised users is a serious software
security vulnerability. Detection and repair of such errors is a non-trivial task that has been …
security vulnerability. Detection and repair of such errors is a non-trivial task that has been …
Probabilistic point-to-point information leakage
The outputs of a program that processes secret data may reveal information about the
values of these secrets. This paper develops an information leakage model that can …
values of these secrets. This paper develops an information leakage model that can …