An operational approach to information leakage

I Issa, AB Wagner, S Kamath - IEEE Transactions on …, 2019 - ieeexplore.ieee.org
Given two random variables X and Y, an operational approach is undertaken to quantify the
“leakage” of information from X to Y. The resulting measure L (X→ Y) is called maximal …

Cacheaudit: A tool for the static analysis of cache side channels

G Doychev, B Köpf, L Mauborgne… - ACM Transactions on …, 2015 - dl.acm.org
We present CacheAudit, a versatile framework for the automatic, static analysis of cache
side channels. CacheAudit takes as input a program binary and a cache configuration and …

Measures and models of nicotine dependence: positive reinforcement

S Glautier - Addiction, 2004 - Wiley Online Library
This paper addresses the problem of assessing nicotine dependence. The main objective is
to develop theory‐led suggestions for measures that will be relevant in the early phases of …

Measuring information leakage using generalized gain functions

SA M'rio, K Chatzikokolakis… - 2012 IEEE 25th …, 2012 - ieeexplore.ieee.org
This paper introduces g-leakage, a rich generalization of the min-entropy model of
quantitative information flow. In g-leakage, the benefit that an adversary derives from a …

Differential privacy: on the trade-off between utility and information leakage

MS Alvim, ME Andrés, K Chatzikokolakis… - Formal Aspects of …, 2012 - Springer
Differential privacy is a notion of privacy that has become very popular in the database
community. Roughly, the idea is that a randomized query mechanism provides sufficient …

Generalization Error Bounds via Rényi-, f-Divergences and Maximal Leakage

AR Esposito, M Gastpar, I Issa - IEEE Transactions on …, 2021 - ieeexplore.ieee.org
In this work, the probability of an event under some joint distribution is bounded by
measuring it with the product of the marginals instead (which is typically easier to analyze) …

Estimation efficiency under privacy constraints

S Asoodeh, M Diaz, F Alajaji… - IEEE Transactions on …, 2018 - ieeexplore.ieee.org
We investigate the problem of estimating a random variable Y under a privacy constraint
dictated by another correlated random variable X. When X and Y are discrete, we express …

An operational measure of information leakage

I Issa, S Kamath, AB Wagner - 2016 Annual Conference on …, 2016 - ieeexplore.ieee.org
Given two discrete random variables X and Y, an operational approach is undertaken to
quantify the “leakage” of information from X to Y. The resulting measure ℒ (X→ Y) is called …

Automatic quantification of cache side-channels

B Köpf, L Mauborgne, M Ochoa - … , CAV 2012, Berkeley, CA, USA, July 7 …, 2012 - Springer
The latency gap between caches and main memory has been successfully exploited for
recovering sensitive input to programs, such as cryptographic keys from implementation of …

Pointwise maximal leakage

S Saeidian, G Cervia, TJ Oechtering… - IEEE Transactions on …, 2023 - ieeexplore.ieee.org
We introduce a privacy measure called pointwise maximal leakage, generalizing the pre-
existing notion of maximal leakage, which quantifies the amount of information leaking about …