메뉴 건너뛰기




Volumn , Issue , 2009, Pages 73-85

Measuring channel capacity to distinguish undue influence

Author keywords

Channel capacity; Model counting; Quantitative information flow

Indexed keywords

COMMODITY SOFTWARE; CONTROL VALUES; CONTROL-FLOW; DECISION PROCEDURE; FALSE NEGATIVE ERRORS; FALSE POSITIVE; FUNCTION POINTERS; MEASURING CHANNEL; MEASURING TECHNIQUE; NETWORK SERVER; PRACTICAL IMPLEMENTATION; PROBABILISTIC BOUNDS; QUANTITATIVE INFORMATION; QUANTITATIVE INFORMATION FLOW; QUANTITATIVE MEASURES; SAT SOLVERS; SECURITY APPLICATION; SQL SLAMMER;

EID: 70450252184     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1145/1554339.1554349     Document Type: Conference Paper
Times cited : (75)

References (34)
  • 2
    • 0003400255 scopus 로고
    • Integrity considerations for secure computer systems
    • The Mitre Corporation, Apr.
    • K. J. Biba. Integrity considerations for secure computer systems. Technical Report MTR-3153, The Mitre Corporation, Apr. 1977.
    • (1977) Technical Report MTR-3153
    • Biba., K.J.1
  • 3
  • 4
    • 85077688456 scopus 로고    scopus 로고
    • Towards automatic discovery of deviations in binary implementations with applications to error detection and fingerprint generation
    • Aug.
    • D. Brumley, J. Caballero, Z. Liang, J. Newsome, and D. Song. Towards automatic discovery of deviations in binary implementations with applications to error detection and fingerprint generation. In Proceedings of USENIX Security Symposium, Aug. 2007.
    • (2007) Proceedings of USENIX Security Symposium
    • Brumley, D.1    Caballero, J.2    Liang, Z.3    Newsome, J.4    Song., D.5
  • 15
    • 70450259147 scopus 로고    scopus 로고
    • Adjusting likelihood ratio confidence intervals for parameters near boundaries applied to the binomial
    • Aug.
    • S. Dorai-Raj and S. Graves. Adjusting likelihood ratio confidence intervals for parameters near boundaries applied to the binomial. In Joint Statistical Meeting (JSM), Aug. 2006.
    • (2006) Joint Statistical Meeting (JSM)
    • Dorai-Raj, S.1    Graves, S.2
  • 21
    • 57349116220 scopus 로고    scopus 로고
    • Lagrange multipliers and maximum information leakage in different observational models
    • June
    • P. Malacaria and H. Chen. Lagrange multipliers and maximum information leakage in different observational models. In Workshop on Programming Languages and Analysis for Security, pages 135-146, June 2008.
    • (2008) Workshop on Programming Languages and Analysis for Security , pp. 135-146
    • Malacaria, P.1    Chen, H.2
  • 30
    • 12844267418 scopus 로고    scopus 로고
    • Secure program execution via dynamic information flow tracking
    • Oct.
    • G. E. Suh, J. Lee, and S. Devadas. Secure program execution via dynamic information flow tracking. In ASPLOS XI, Oct. 2004.
    • (2004) ASPLOS XI
    • Suh, G.E.1    Lee, J.2    Devadas., S.3
  • 33
    • 85038810709 scopus 로고    scopus 로고
    • Taint-enhanced policy enforcement: A practical approach to defeat a wide range of attacks
    • W. Xu, S. Bhatkar, and R. Sekar. Taint-enhanced policy enforcement: a practical approach to defeat a wide range of attacks. In 15th USENIX Security Symposium, 2006.
    • (2006) 15th USENIX Security Symposium
    • Xu, W.1    Bhatkar, S.2    Sekar., R.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.