On the foundations of quantitative information flow

G Smith - International Conference on Foundations of Software …, 2009 - Springer
There is growing interest in quantitative theories of information flow in a variety of contexts,
such as secure information flow, anonymity protocols, and side-channel analysis. Such …

Measures and models of nicotine dependence: positive reinforcement

S Glautier - Addiction, 2004 - Wiley Online Library
This paper addresses the problem of assessing nicotine dependence. The main objective is
to develop theory‐led suggestions for measures that will be relevant in the early phases of …

Shining light in dark places: Understanding the Tor network

D McCoy, K Bauer, D Grunwald, T Kohno… - … Symposium, PETS 2008 …, 2008 - Springer
To date, there has yet to be a study that characterizes the usage of a real deployed
anonymity service. We present observations and analysis obtained by participating in the …

An information-theoretic model for adaptive side-channel attacks

B Köpf, D Basin - Proceedings of the 14th ACM conference on Computer …, 2007 - dl.acm.org
We present a model of adaptive side-channel attacks which we combine with information-
theoretic metrics to quantify the information revealed to an attacker. This allows us to …

On the relation between identifiability, differential privacy, and mutual-information privacy

W Wang, L Ying, J Zhang - IEEE Transactions on Information …, 2016 - ieeexplore.ieee.org
This paper investigates the relation between three different notions of privacy: identifiability,
differential privacy, and mutual-information privacy. Under a unified privacydistortion …

Automatic discovery and quantification of information leaks

M Backes, B Köpf… - 2009 30th IEEE …, 2009 - ieeexplore.ieee.org
Information-flow analysis is a powerful technique for reasoning about the sensitive
information exposed by a program during its execution. We present the first automatic …

Differential privacy: on the trade-off between utility and information leakage

MS Alvim, ME Andrés, K Chatzikokolakis… - Formal Aspects of …, 2012 - Springer
Differential privacy is a notion of privacy that has become very popular in the database
community. Roughly, the idea is that a randomized query mechanism provides sufficient …

A perspective on information-flow control

D Hedin, A Sabelfeld - Software safety and security, 2012 - ebooks.iospress.nl
Abstract Information-flow control tracks how information propagates through the program
during execution to make sure that the program handles the information securely. Secure …

Quantitative notions of leakage for one-try attacks

C Braun, K Chatzikokolakis, C Palamidessi - Electronic Notes in …, 2009 - Elsevier
Recent research in quantitative theories for information-hiding topics, such as Anonymity
and Secure Information Flow, tend to converge towards the idea of modeling the system as a …

Assessing security threats of looping constructs

P Malacaria - Proceedings of the 34th annual ACM SIGPLAN …, 2007 - dl.acm.org
There is a clear intuitive connection between the notion of leakage of information in a
program and concepts from information theory. This intuition has not been satisfactorily …