An operational approach to information leakage
Given two random variables X and Y, an operational approach is undertaken to quantify the
“leakage” of information from X to Y. The resulting measure L (X→ Y) is called maximal …
“leakage” of information from X to Y. The resulting measure L (X→ Y) is called maximal …
Eliminating timing side-channel leaks using program repair
We propose a method, based on program analysis and transformation, for eliminating timing
side channels in software code that implements security-critical applications. Our method …
side channels in software code that implements security-critical applications. Our method …
Pointwise maximal leakage
We introduce a privacy measure called pointwise maximal leakage, generalizing the pre-
existing notion of maximal leakage, which quantifies the amount of information leaking about …
existing notion of maximal leakage, which quantifies the amount of information leaking about …
Local differential privacy on metric spaces: optimizing the trade-off with utility
M Alvim, K Chatzikokolakis… - 2018 IEEE 31st …, 2018 - ieeexplore.ieee.org
Local differential privacy (LPD) is a distributed variant of differential privacy (DP) in which the
obfuscation of the sensitive information is done at the level of the individual records, and in …
obfuscation of the sensitive information is done at the level of the individual records, and in …
Recent developments in quantitative information flow (invited tutorial)
G Smith - 2015 30th Annual ACM/IEEE Symposium on Logic in …, 2015 - ieeexplore.ieee.org
In computer security, it is frequently necessary in practice to accept some leakage of
confidential information. This motivates the development of theories of Quantitative …
confidential information. This motivates the development of theories of Quantitative …
An operational approach to information leakage via generalized gain functions
We introduce a gain function viewpoint of information leakage by proposing maximal-
leakage, a rich class of operationally meaningful leakage measures that subsumes recently …
leakage, a rich class of operationally meaningful leakage measures that subsumes recently …
Expressing information flow properties
Industries and governments are increasingly compelled by regulations and public pressure
to handle sensitive information responsibly. Regulatory requirements and user expectations …
to handle sensitive information responsibly. Regulatory requirements and user expectations …
The laplace mechanism has optimal utility for differential privacy over continuous queries
N Fernandes, A McIver… - 2021 36th Annual ACM …, 2021 - ieeexplore.ieee.org
Differential Privacy protects individuals' data when statistical queries are published from
aggregated databases: applying" obfuscating" mechanisms to the query results makes the …
aggregated databases: applying" obfuscating" mechanisms to the query results makes the …
Transforming out timing leaks, more or less
H Mantel, A Starostin - … --ESORICS 2015: 20th European Symposium on …, 2015 - Springer
We experimentally evaluate program transformations for removing timing side-channel
vulnerabilities wrt. security and overhead. Our study of four well-known transformations …
vulnerabilities wrt. security and overhead. Our study of four well-known transformations …
Axioms for information leakage
Quantitative information flow aims to assess and control the leakage of sensitive information
by computer systems. A key insight in this area is that no single leakage measure is …
by computer systems. A key insight in this area is that no single leakage measure is …