메뉴 건너뛰기




Volumn , Issue , 2010, Pages 261-269

Quantifying information leaks in software

Author keywords

information leakage; Linux kernel; quantitative information flow

Indexed keywords

LINUX; MODEL CHECKING;

EID: 78751504408     PISSN: 10639527     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1145/1920261.1920300     Document Type: Conference Paper
Times cited : (97)

References (19)
  • 3
    • 34249899908 scopus 로고    scopus 로고
    • A static analysis for quantifying information flow in a simple imperative language
    • David Clark, Sebastian Hunt, Pasquale Malacaria: A static analysis for quantifying information flow in a simple imperative language. Journal of Computer Security, Volume 15, Number 3 / 2007.
    • (2007) Journal of Computer Security , vol.15 , Issue.3
    • Clark, D.1    Hunt, S.2    Malacaria, P.3
  • 4
    • 20844445346 scopus 로고    scopus 로고
    • Quantitative information flow, relations and polymorphic types
    • Special Issue on Lambda-calculus, type theory and natural language
    • David Clark, Sebastian Hunt, and Pasquale Malacaria: Quantitative information flow, relations and polymorphic types. Journal of Logic and Computation, Special Issue on Lambda-calculus, type theory and natural language, 18(2):181-199, 2005.
    • (2005) Journal of Logic and Computation , vol.18 , Issue.2 , pp. 181-199
    • Clark, D.1    Hunt, S.2    Malacaria, P.3
  • 6
    • 85170001698 scopus 로고    scopus 로고
    • Checked 17 June
    • http://www.cprover.org/cbmc/applications.shtml - Checked 17 June 2010.
    • (2010)
  • 8
    • 77953239541 scopus 로고    scopus 로고
    • Applied Quantitative Information Flow and Statistical Databases
    • Jonathan Heusser and Pasquale Malacaria: Applied Quantitative Information Flow and Statistical Databases. Formal Aspects in Security and Trust 2009: 96-110
    • (2009) Formal Aspects in Security and Trust , pp. 96-110
    • Heusser, J.1    Malacaria, P.2
  • 9
    • 77957604761 scopus 로고    scopus 로고
    • Approximation and randomization for quantitative information-flow analysis
    • Boris Köpf and Andrey Rybalchenko: Approximation and randomization for quantitative information-flow analysis. In Proceedings CST 2010
    • Proceedings CST 2010
    • Köpf, B.1    Rybalchenko, A.2
  • 12
    • 57349116220 scopus 로고    scopus 로고
    • Lagrange multipliers and maximum information leakage in different observational models
    • Pasquale Malacaria, Han Chen: Lagrange multipliers and maximum information leakage in different observational models. PLAS 2008: 135-146
    • (2008) PLAS , pp. 135-146
    • Malacaria, P.1    Chen, H.2
  • 13
    • 79956286295 scopus 로고    scopus 로고
    • Information Theory and Security: Quantitative Information Flow
    • Formal Methods for Quantitative Aspects of Programming Languages, Springer Verlag
    • Pasquale Malacaria and Jonathan Heusser: Information Theory and Security: Quantitative Information Flow. In Formal Methods for Quantitative Aspects of Programming Languages, LNCS, Springer Verlag, 2010
    • (2010) LNCS
    • Malacaria, P.1    Heusser, J.2
  • 14
    • 67650065318 scopus 로고    scopus 로고
    • Quantitative information flow as network flow capacity
    • MIT Department of Electrical Engineering and Computer Science, Ph.D., Cambridge, MA, 2008
    • Stephen McCamant, Michael D. Ernst: Quantitative information flow as network flow capacity. PLDI 2008: 193-205 MIT Department of Electrical Engineering and Computer Science, Ph.D., Cambridge, MA, 2008.
    • (2008) PLDI , pp. 193-205
    • McCamant, S.1    Ernst, M.D.2
  • 15
    • 70450252184 scopus 로고    scopus 로고
    • Measuring channel capacity to distinguish undue influence
    • James Newsome, Stephen McCamant, Dawn Song: Measuring channel capacity to distinguish undue influence. PLAS 2009: 73-85
    • (2009) PLAS , pp. 73-85
    • Newsome, J.1    McCamant, S.2    Song, D.3
  • 16
    • 33846287594 scopus 로고    scopus 로고
    • Model Checking An Entire Linux Distribution for Security Violations
    • Benjamin Schwarz, Hao Chen, David Wagner, Jeremy Lin, Wei Tu, Geoff Morrison, Jacob West: Model Checking An Entire Linux Distribution for Security Violations. ACSAC 2005: 13-22
    • (2005) ACSAC , pp. 13-22
    • Schwarz, B.1    Chen, H.2    Wagner, D.3    Lin, J.4    Tu, W.5    Morrison, G.6    West, J.7
  • 18
    • 33646037706 scopus 로고    scopus 로고
    • Secure information flow as a safety problem
    • SAS
    • T. Terauchi and A. Aiken. Secure information flow as a safety problem: In SAS, volume 3672 of LNCS, pages 352-367, 2005.
    • (2005) LNCS , vol.3672 , pp. 352-367
    • Terauchi, T.1    Aiken, A.2
  • 19
    • 78049397439 scopus 로고    scopus 로고
    • Quantitative information flow - Verification hardness and possibilities
    • Hirotoshi Yasuoka and Tachio Terauchi Quantitative information flow - verification hardness and possibilities. In Proceedings CSF 2010.
    • Proceedings CSF 2010
    • Yasuoka, H.1    Terauchi, T.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.