Automated generation of attack trees

R Vigo, F Nielson, HR Nielson - 2014 IEEE 27th computer …, 2014 - ieeexplore.ieee.org
Attack trees are widely used to represent threat scenarios in a succinct and intuitive manner,
suitable for conveying security information to non-experts. The manual construction of such …

Model checking quantitative hyperproperties

B Finkbeiner, C Hahn, H Torfah - International Conference on Computer …, 2018 - Springer
Hyperproperties are properties of sets of computation traces. In this paper, we study
quantitative hyperproperties, which we define as hyperproperties that express a bound on …

Leakwatch: Estimating information leakage from java programs

T Chothia, Y Kawamoto, C Novakovic - … 7-11, 2014. Proceedings, Part II …, 2014 - Springer
Programs that process secret data may inadvertently reveal information about those secrets
in their publicly-observable output. This paper presents LeakWatch, a quantitative …

Scalable approximation of quantitative information flow in programs

F Biondi, MA Enescu, A Heuser, A Legay… - … , Model Checking, and …, 2018 - Springer
Quantitative information flow measurement techniques have been proven to be successful in
detecting leakage of confidential information from programs. Modern approaches are based …

A model counter for constraints over unbounded strings

L Luu, S Shinde, P Saxena, B Demsky - Proceedings of the 35th ACM …, 2014 - dl.acm.org
Model counting is the problem of determining the number of solutions that satisfy a given set
of constraints. Model counting has numerous applications in the quantitative analyses of …

Abstract model counting: a novel approach for quantification of information leaks

QS Phan, P Malacaria - Proceedings of the 9th ACM symposium on …, 2014 - dl.acm.org
We present a novel method for Quantitative Information Flow analysis. We show how the
problem of computing information leakage can be viewed as an extension of the …

Model counting for recursively-defined strings

MT Trinh, DH Chu, J Jaffar - … , CAV 2017, Heidelberg, Germany, July 24-28 …, 2017 - Springer
We present a new algorithm for model counting of a class of string constraints. In addition to
the classic operation of concatenation, our class includes some recursively defined …

Time-aware subgroup matrix decomposition: Imputing missing data using forecasting events

X Yang, Y Zhang, M Chi - … Conference on Big Data (Big Data), 2018 - ieeexplore.ieee.org
Deep neural network models, especially Long Short Term Memory (LSTM), have shown
great success in analyzing Electronic Health Records (EHRs) due to their ability to capture …

Mining for mutation operators for reduction of information flow control violations

I Kosorukov, D Blackwell, D Clark, MB Cohen… - Proceedings of the 39th …, 2024 - dl.acm.org
The unintentional flow of confidential data to unauthorised users is a serious software
security vulnerability. Detection and repair of such errors is a non-trivial task that has been …

Probabilistic point-to-point information leakage

T Chothia, Y Kawamoto, C Novakovic… - 2013 IEEE 26th …, 2013 - ieeexplore.ieee.org
The outputs of a program that processes secret data may reveal information about the
values of these secrets. This paper develops an information leakage model that can …