An operational approach to information leakage

I Issa, AB Wagner, S Kamath - IEEE Transactions on …, 2019 - ieeexplore.ieee.org
Given two random variables X and Y, an operational approach is undertaken to quantify the
“leakage” of information from X to Y. The resulting measure L (X→ Y) is called maximal …

Eliminating timing side-channel leaks using program repair

M Wu, S Guo, P Schaumont, C Wang - Proceedings of the 27th ACM …, 2018 - dl.acm.org
We propose a method, based on program analysis and transformation, for eliminating timing
side channels in software code that implements security-critical applications. Our method …

Pointwise maximal leakage

S Saeidian, G Cervia, TJ Oechtering… - IEEE Transactions on …, 2023 - ieeexplore.ieee.org
We introduce a privacy measure called pointwise maximal leakage, generalizing the pre-
existing notion of maximal leakage, which quantifies the amount of information leaking about …

Local differential privacy on metric spaces: optimizing the trade-off with utility

M Alvim, K Chatzikokolakis… - 2018 IEEE 31st …, 2018 - ieeexplore.ieee.org
Local differential privacy (LPD) is a distributed variant of differential privacy (DP) in which the
obfuscation of the sensitive information is done at the level of the individual records, and in …

Recent developments in quantitative information flow (invited tutorial)

G Smith - 2015 30th Annual ACM/IEEE Symposium on Logic in …, 2015 - ieeexplore.ieee.org
In computer security, it is frequently necessary in practice to accept some leakage of
confidential information. This motivates the development of theories of Quantitative …

An operational approach to information leakage via generalized gain functions

GR Kurri, L Sankar, O Kosut - IEEE Transactions on Information …, 2023 - ieeexplore.ieee.org
We introduce a gain function viewpoint of information leakage by proposing maximal-
leakage, a rich class of operationally meaningful leakage measures that subsumes recently …

Expressing information flow properties

E Kozyri, S Chong, AC Myers - Foundations and Trends® in …, 2022 - nowpublishers.com
Industries and governments are increasingly compelled by regulations and public pressure
to handle sensitive information responsibly. Regulatory requirements and user expectations …

The laplace mechanism has optimal utility for differential privacy over continuous queries

N Fernandes, A McIver… - 2021 36th Annual ACM …, 2021 - ieeexplore.ieee.org
Differential Privacy protects individuals' data when statistical queries are published from
aggregated databases: applying" obfuscating" mechanisms to the query results makes the …

Transforming out timing leaks, more or less

H Mantel, A Starostin - … --ESORICS 2015: 20th European Symposium on …, 2015 - Springer
We experimentally evaluate program transformations for removing timing side-channel
vulnerabilities wrt. security and overhead. Our study of four well-known transformations …

Axioms for information leakage

MS Alvim, K Chatzikokolakis, A McIver… - 2016 IEEE 29th …, 2016 - ieeexplore.ieee.org
Quantitative information flow aims to assess and control the leakage of sensitive information
by computer systems. A key insight in this area is that no single leakage measure is …