-
1
-
-
70449625216
-
Automatic discovery and quantification of information leaks
-
Backes, M., Köpf, B., Rybalchenko, A.: Automatic discovery and quantification of information leaks. In: IEEE Symposium on Security and Privacy, pp. 141-153 (2009)
-
(2009)
IEEE Symposium on Security and Privacy
, pp. 141-153
-
-
Backes, M.1
Köpf, B.2
Rybalchenko, A.3
-
2
-
-
0036039066
-
The SLAM project: Debugging system software via static analysis
-
Ball, T., Rajamani, S. K.: The SLAM project: debugging system software via static analysis. In: POPL, pp. 1-3 (2002)
-
(2002)
POPL
, pp. 1-3
-
-
Ball, T.1
Rajamani, S.K.2
-
3
-
-
4944265699
-
Secure information flow by self-composition
-
Barthe, G., D'Argenio, P. R., Rezk, T.: Secure information flow by self-composition. In: CSFW, pp. 100-114 (2004)
-
(2004)
CSFW
, pp. 100-114
-
-
Barthe, G.1
D'Argenio, P.R.2
Rezk, T.3
-
4
-
-
35348951470
-
The software model checker Blast
-
Beyer, D., Henzinger, T. A., Jhala, R., Majumdar, R.: The software model checker Blast. STTT 9 (5-6), 505-525 (2007)
-
(2007)
STTT
, vol.9
, Issue.5-6
, pp. 505-525
-
-
Beyer, D.1
Henzinger, T.A.2
Jhala, R.3
Majumdar, R.4
-
5
-
-
11344288540
-
Quantified interference for a while language
-
Clark, D., Hunt, S., Malacaria, P.: Quantified interference for a while language. Electr. Notes Theor. Comput. Sci. 112, 149-166 (2005)
-
(2005)
Electr. Notes Theor. Comput. Sci.
, vol.112
, pp. 149-166
-
-
Clark, D.1
Hunt, S.2
Malacaria, P.3
-
6
-
-
34249899908
-
A static analysis for quantifying information flow in a simple imperative language
-
Clark, D., Hunt, S., Malacaria, P.: A static analysis for quantifying information flow in a simple imperative language. Journal of Computer Security 15(3), 321-371 (2007)
-
(2007)
Journal of Computer Security
, vol.15
, Issue.3
, pp. 321-371
-
-
Clark, D.1
Hunt, S.2
Malacaria, P.3
-
7
-
-
28144442041
-
Belief in information flow
-
Clarkson, M. R., Myers, A. C., Schneider, F. B.: Belief in information flow. In: CSFW, pp. 31-45 (2005)
-
(2005)
CSFW
, pp. 31-45
-
-
Clarkson, M.R.1
Myers, A.C.2
Schneider, F.B.3
-
9
-
-
84976675687
-
Information transmission in computational systems
-
Cohen, E. S.: Information transmission in computational systems. In: SOSP, pp. 133-139 (1977)
-
(1977)
SOSP
, pp. 133-139
-
-
Cohen, E.S.1
-
10
-
-
24644445710
-
A theorem proving approach to analysis of secure information flow
-
Hutter, D., Ullmann, M. eds., Springer, Heidelberg
-
Darvas, Á., Hähnle, R., Sands, D.: A theorem proving approach to analysis of secure information flow. In: Hutter, D., Ullmann, M. (eds.) SPC 2005. LNCS, vol. 3450, pp. 193-209. Springer, Heidelberg (2005)
-
(2005)
SPC 2005. LNCS
, vol.3450
, pp. 193-209
-
-
Darvas, Á.1
Hähnle, R.2
Sands, D.3
-
11
-
-
0004238984
-
-
Addison-Wesley Longman Publishing Co., Inc., Amsterdam
-
Denning, D. E. R.: Cryptography and data security. Addison-Wesley Longman Publishing Co., Inc., Amsterdam (1982)
-
(1982)
Cryptography and Data Security
-
-
Denning, D.E.R.1
-
13
-
-
0036041563
-
Lazy abstraction
-
Henzinger, T. A., Jhala, R., Majumdar, R., Sutre, G.: Lazy abstraction. In: POPL, pp. 58-70 (2002)
-
(2002)
POPL
, pp. 58-70
-
-
Henzinger, T.A.1
Jhala, R.2
Majumdar, R.3
Sutre, G.4
-
14
-
-
67650696756
-
An information-theoretic model for adaptive side-channel attacks
-
Köpf, B., Basin, D.: An information-theoretic model for adaptive side-channel attacks. In: CCS, pp. 286-296 (2007)
-
(2007)
CCS
, pp. 286-296
-
-
Köpf, B.1
Basin, D.2
-
15
-
-
34548282543
-
Assessing security threats of looping constructs
-
Malacaria, P.: Assessing security threats of looping constructs. In: POPL, pp. 225-235 (2007)
-
(2007)
POPL
, pp. 225-235
-
-
Malacaria, P.1
-
16
-
-
57349116220
-
Lagrange multipliers and maximum information leakage in different observational models
-
Malacaria, P., Chen, H.: Lagrange multipliers and maximum information leakage in different observational models. In: PLAS, pp. 135-146 (2008)
-
(2008)
PLAS
, pp. 135-146
-
-
Malacaria, P.1
Chen, H.2
-
17
-
-
84894313462
-
Guessing and entropy
-
Massey, J. L.: Guessing and entropy. In: ISIT, p. 204 (1994)
-
(1994)
ISIT
, pp. 204
-
-
Massey, J.L.1
-
18
-
-
57349180506
-
Quantitative information flow as network flow capacity
-
McCamant, S., Ernst, M. D.: Quantitative information flow as network flow capacity. In: PLDI, pp. 193-205 (2008)
-
(2008)
PLDI
, pp. 193-205
-
-
McCamant, S.1
Ernst, M.D.2
-
19
-
-
0028058408
-
A general theory of composition for trace sets closed under selective interleaving functions
-
McLean, J.: A general theory of composition for trace sets closed under selective interleaving functions. In: IEEE Security and Privacy, pp. 79-93 (1994)
-
(1994)
IEEE Security and Privacy
, pp. 79-93
-
-
McLean, J.1
-
20
-
-
33749856863
-
Lazy abstraction with interpolants
-
Ball, T., Jones, R. B. eds., Springer, Heidelberg
-
McMillan, K. L.: Lazy abstraction with interpolants. In: Ball, T., Jones, R. B. (eds.) CAV 2006. LNCS, vol. 4144, pp. 123-136. Springer, Heidelberg (2006)
-
(2006)
CAV 2006. LNCS
, vol.4144
, pp. 123-136
-
-
McMillan, K.L.1
-
21
-
-
33750232981
-
From coupling relations to mated invariants for checking information flow
-
Gollmann, D., Meier, J., Sabelfeld, A. eds., Springer, Heidelberg
-
Naumann, D. A.: From coupling relations to mated invariants for checking information flow. In: Gollmann, D., Meier, J., Sabelfeld, A. (eds.) ESORICS 2006. LNCS, vol. 4189, pp. 279-296. Springer, Heidelberg (2006)
-
(2006)
ESORICS 2006. LNCS
, vol.4189
, pp. 279-296
-
-
Naumann, D.A.1
-
22
-
-
70450252184
-
Measuring channel capacity to distinguish undue influence
-
Newsome, J., McCamant, S., Song, D.: Measuring channel capacity to distinguish undue influence. In: PLAS, pp. 73-85 (2009)
-
(2009)
PLAS
, pp. 73-85
-
-
Newsome, J.1
McCamant, S.2
Song, D.3
-
23
-
-
84856043672
-
A mathematical theory of communication
-
Shannon, C.: A mathematical theory of communication. Bell System Technical Journal 27, 379-423, 623-656 (1948)
-
(1948)
Bell System Technical Journal
, vol.27
, Issue.379-423
, pp. 623-656
-
-
Shannon, C.1
-
24
-
-
68549087948
-
On the foundations of quantitative information flow
-
de Alfaro, L. ed., Springer, Heidelberg
-
Smith, G.: On the foundations of quantitative information flow. In: de Alfaro, L. (ed.) FOSSACS 2009. LNCS, vol. 5504, pp. 288-302. Springer, Heidelberg (2009)
-
(2009)
FOSSACS 2009. LNCS
, vol.5504
, pp. 288-302
-
-
Smith, G.1
-
25
-
-
33646037706
-
Secure information flow as a safety problem
-
Hankin, C., Siveroni, I. eds., Springer, Heidelberg
-
Terauchi, T., Aiken, A.: Secure information flow as a safety problem. In: Hankin, C., Siveroni, I. (eds.) SAS 2005. LNCS, vol. 3672, pp. 352-367. Springer, Heidelberg (2005)
-
(2005)
SAS 2005. LNCS
, vol.3672
, pp. 352-367
-
-
Terauchi, T.1
Aiken, A.2
-
26
-
-
0026239342
-
PP is as hard as the polynomial-time hierarchy
-
Toda, S.: PP is as hard as the polynomial-time hierarchy. SIAM J. Comput. 20(5), 865-877 (1991)
-
(1991)
SIAM J. Comput.
, vol.20
, Issue.5
, pp. 865-877
-
-
Toda, S.1
-
27
-
-
33745935759
-
Combining type-based analysis and model checking for finding counterexamples against non-interference
-
Unno, H., Kobayashi, N., Yonezawa, A.: Combining type-based analysis and model checking for finding counterexamples against non-interference. In: PLAS, pp. 17-26 (2006)
-
(2006)
PLAS
, pp. 17-26
-
-
Unno, H.1
Kobayashi, N.2
Yonezawa, A.3
-
29
-
-
78049397439
-
Quantitative information flow - Verification hardness and possibilities
-
Yasuoka, H., Terauchi, T.: Quantitative information flow - verification hardness and possibilities. In: CSF (2010)
-
(2010)
CSF
-
-
Yasuoka, H.1
Terauchi, T.2
|