@proceedings(DBLP:conf/csfw/2010, year = "2010", title = "Proceedings of the 23rd IEEE Computer Security Foundations Symposium, CSF 2010, Edinburgh, United Kingdom, July 17-19, 2010", publisher = "IEEE Computer Society", ) @article(DBLP:journals/apal/Abramsky91, author = "Samson Abramsky", year = "1991", title = "Domain Theory in Logical Form", journal = "Ann. Pure Appl. Logic", volume = "51", number = "1-2", pages = "1--77", url = "http://dx.doi.org/10.1016/0168-0072(91)90065-T", ) @inproceedings(DBLP:conf/ccs/SamaratiV10, author = "Michael Backes and Matthias Berg and Boris K\"{o}pf", year = "2011", title = "Non-uniform distributions in quantitative information-flow", booktitle = "Proceedings of the 6th ACM Symposium on Information, Computer and Communications Security", series = "ASIACCS '11", publisher = "ACM", address = "New York, NY, USA", pages = "367--375", url = "http://doi.acm.org/10.1145/1966913.1966960", ) @inproceedings(DBLP:conf/sp/BackesKR09, author = "Michael Backes and Boris K{\"o}pf and Andrey Rybalchenko", year = "2009", title = "Automatic Discovery and Quantification of Information Leaks", booktitle = "IEEE Symposium on Security and Privacy", publisher = "IEEE Computer Society", pages = "141--153", url = "http://dx.doi.org/10.1109/SP.2009.18", ) @inproceedings(barthe:csfw04, author = "Gilles Barthe and Pedro R. D'Argenio and Tamara Rezk", year = "2004", title = "Secure Information Flow by Self-Composition", booktitle = "CSFW", publisher = "IEEE Computer Society", pages = "100--114", url = "http://doi.ieeecomputersociety.org/10.1109/CSFW.2004.17", ) @article(DBLP:journals/entcs/BraunCP09, author = "Christelle Braun and Konstantinos Chatzikokolakis and Catuscia Palamidessi", year = "2009", title = "Quantitative Notions of Leakage for One-try Attacks", journal = "Electr. Notes Theor. Comput. Sci.", volume = "249", pages = "75--91", url = "http://dx.doi.org/10.1016/j.entcs.2009.07.085", ) @inproceedings(DBLP:conf/csfw/CernyCH11, author = "Pavol {\v C}ern\'y and Krishnendu Chatterjee and Thomas A. Henzinger", year = "2011", title = "The Complexity of Quantitative Information Flow Problems", booktitle = "CSF", publisher = "IEEE Computer Society", pages = "205--217", url = "http://doi.ieeecomputersociety.org/10.1109/CSF.2011.21", ) @article(clark05, author = "David Clark and Sebastian Hunt and Pasquale Malacaria", year = "2005", title = "Quantified Interference for a While Language", journal = "Electr. Notes Theor. Comput. Sci.", volume = "112", pages = "149--166", url = "http://dx.doi.org/10.1016/j.entcs.2004.01.018", ) @article(clarkjcs2007, author = "David Clark and Sebastian Hunt and Pasquale Malacaria", year = "2007", title = "A static analysis for quantifying information flow in a simple imperative language", journal = "J. Comput. Secur.", volume = "15", pages = "321--371", url = "http://dl.acm.org/citation.cfm?id=1370628.1370629", ) @inproceedings(clarkson:csf2005, author = "Michael R. Clarkson and Andrew C. Myers and Fred B. Schneider", year = "2005", title = "Belief in Information Flow", booktitle = "CSFW", publisher = "IEEE Computer Society", pages = "31--45", url = "http://dx.doi.org/10.1109/CSFW.2005.10", ) @article(DBLP:journals/jcs/ClarksonS10, author = "Michael R. Clarkson and Fred B. Schneider", year = "2010", title = "Hyperproperties", journal = "Journal of Computer Security", volume = "18", number = "6", pages = "1157--1210", url = "http://dx.doi.org/10.3233/JCS-2009-0393", ) @inproceedings(DBLP:conf/sosp/Cohen77, author = "Ellis S. Cohen", year = "1977", title = "Information Transmission in Computational Systems", booktitle = "SOSP", pages = "133--139", url = "http://doi.acm.org/10.1145/800214.806556", ) @inproceedings(darvas:spc05, author = "{\'A}d{\'a}m Darvas and Reiner H{\"a}hnle and David Sands", year = "2005", title = "A Theorem Proving Approach to Analysis of Secure Information Flow", editor = "Dieter Hutter and Markus Ullmann", booktitle = "SPC", series = "Lecture Notes in Computer Science", volume = "3450", publisher = "Springer", pages = "193--209", url = "http://dx.doi.org/10.1007/978-3-540-32004-3_20", ) @book(denning82, author = "Dorothy Elizabeth Robling Denning", year = "1982", title = "Cryptography and data security", publisher = "Addison-Wesley Longman Publishing Co., Inc.", address = "Boston, MA, USA", ) @inproceedings(DBLP:conf/popl/FlanaganS01, author = "Cormac Flanagan and James B. Saxe", year = "2001", title = "Avoiding exponential explosion: generating compact verification conditions", booktitle = "POPL", pages = "193--205", url = "http://doi.acm.org/10.1145/360204.360220", ) @inproceedings(goguen:sp1982, author = "Joseph A. Goguen and Jos{\'e} Meseguer", year = "1982", title = "Security Policies and Security Models", booktitle = "IEEE Symposium on Security and Privacy", pages = "11--20", ) @inproceedings(DBLP:conf/ifip1-7/HeusserM09, author = "Jonathan Heusser and Pasquale Malacaria", year = "2009", title = "Applied Quantitative Information Flow and Statistical Databases", editor = "Pierpaolo Degano and Joshua D. Guttman", booktitle = "Formal Aspects in Security and Trust", series = "Lecture Notes in Computer Science", volume = "5983", publisher = "Springer", pages = "96--110", url = "http://dx.doi.org/10.1007/978-3-642-12459-4_8", ) @inproceedings(kopf07, author = "Boris K{\"o}pf and David A. Basin", year = "2007", title = "An information-theoretic model for adaptive side-channel attacks", editor = "Peng Ning and Sabrina De Capitani di Vimercati and Paul F. Syverson", booktitle = "ACM Conference on Computer and Communications Security", publisher = "ACM", pages = "286--296", url = "http://doi.acm.org/10.1145/1315245.1315282", ) @inproceedings(DBLP:conf/csfw/KopfR10, author = "Boris K{\"o}pf and Andrey Rybalchenko", year = "2010", title = "Approximation and Randomization for Quantitative Information-Flow Analysis", booktitle = "CSF", pages = "3--14", url = "http://doi.ieeecomputersociety.org/10.1109/CSF.2010.8", ) @inproceedings(DBLP:conf/csfw/KopfS10, author = "Boris K{\"o}pf and Geoffrey Smith", year = "2010", title = "Vulnerability Bounds and Leakage Resilience of Blinded Cryptography under Timing Attacks", booktitle = "CSF", pages = "44--56", url = "http://doi.ieeecomputersociety.org/10.1109/CSF.2010.11", ) @article(DBLP:journals/ipl/Leino05, author = "K. Rustan M. Leino", year = "2005", title = "Efficient weakest preconditions", journal = "Inf. Process. Lett.", volume = "93", number = "6", pages = "281--288", url = "http://dx.doi.org/10.1016/j.ipl.2004.10.015", ) @inproceedings(malacaria:popl2007, author = "Pasquale Malacaria", year = "2007", title = "Assessing security threats of looping constructs", editor = "Martin Hofmann and Matthias Felleisen", booktitle = "POPL", publisher = "ACM", pages = "225--235", url = "http://doi.acm.org/10.1145/1190216.1190251", ) @inproceedings(malacaria08, author = "Pasquale Malacaria and Han Chen", year = "2008", title = "Lagrange multipliers and maximum information leakage in different observational models", editor = "{\'U}lfar Erlingsson and Marco Pistoia", booktitle = "PLAS", publisher = "ACM", pages = "135--146", url = "http://doi.acm.org/10.1145/1375696.1375713", ) @inproceedings(Massey94, author = "James L. Massey", year = "1994", title = "Guessing and Entropy", booktitle = "ISIT '94: Proceedings of the 1994 IEEE International Symposium on Information Theory", pages = "204", url = "http://dx.doi.org/10.1109/ISIT.1994.394764", ) @inproceedings(mccamant:pldi2008, author = "Stephen McCamant and Michael D. Ernst", year = "2008", title = "Quantitative information flow as network flow capacity", editor = "Rajiv Gupta and Saman P. Amarasinghe", booktitle = "PLDI", publisher = "ACM", pages = "193--205", url = "http://doi.acm.org/10.1145/1375581.1375606", ) @inproceedings(naumann:esorics06, author = "David A. Naumann", year = "2006", title = "From Coupling Relations to Mated Invariants for Checking Information Flow", editor = "Dieter Gollmann and Jan Meier and Andrei Sabelfeld", booktitle = "ESORICS", series = "Lecture Notes in Computer Science", volume = "4189", publisher = "Springer", pages = "279--296", url = "http://dx.doi.org/10.1007/11863908_18", ) @inproceedings(NMS2009, author = "James Newsome and Stephen McCamant and Dawn Song", year = "2009", title = "Measuring channel capacity to distinguish undue influence", editor = "Stephen Chong and David A. Naumann", booktitle = "PLAS", publisher = "ACM", pages = "73--85", url = "http://doi.acm.org/10.1145/1554339.1554349", ) @article(shannon48, author = "Claude Shannon", year = "1948", title = "A Mathematical Theory of Communication", journal = "Bell System Technical Journal", volume = "27", pages = "379--423, 623--656", url = "http://doi.acm.org/10.1145/584091.584093", ) @inproceedings(smith09, author = "Geoffrey Smith", year = "2009", title = "On the Foundations of Quantitative Information Flow", editor = "Luca de Alfaro", booktitle = "FOSSACS", series = "Lecture Notes in Computer Science", volume = "5504", publisher = "Springer", pages = "288--302", url = "http://dx.doi.org/10.1007/978-3-642-00596-1_21", ) @inproceedings(terauchi:sas05, author = "Tachio Terauchi and Alexander Aiken", year = "2005", title = "Secure Information Flow as a Safety Problem", editor = "Chris Hankin and Igor Siveroni", booktitle = "SAS", series = "Lecture Notes in Computer Science", volume = "3672", publisher = "Springer", pages = "352--367", url = "http://dx.doi.org/10.1007/11547662_24", ) @inproceedings(unno:plas2006, author = "Hiroshi Unno and Naoki Kobayashi and Akinori Yonezawa", year = "2006", title = "Combining type-based analysis and model checking for finding counterexamples against non-interference", editor = "Vugranam C. Sreedhar and Steve Zdancewic", booktitle = "PLAS", publisher = "ACM", pages = "17--26", url = "http://doi.acm.org/10.1145/1134744.1134750", ) @inproceedings(DBLP:conf/esorics/YasuokaT10, author = "Hirotoshi Yasuoka and Tachio Terauchi", year = "2010", title = "On Bounding Problems of Quantitative Information Flow", editor = "Dimitris Gritzalis and Bart Preneel and Marianthi Theoharidou", booktitle = "ESORICS", series = "Lecture Notes in Computer Science", volume = "6345", publisher = "Springer", pages = "357--372", url = "http://dx.doi.org/10.1007/978-3-642-15497-3_22", ) @inproceedings(DBLP:conf/csfw/YasuokaT10, author = "Hirotoshi Yasuoka and Tachio Terauchi", year = "2010", title = "Quantitative Information Flow - Verification Hardness and Possibilities", booktitle = "CSF", pages = "15--27", url = "http://doi.ieeecomputersociety.org/10.1109/CSF.2010.9", ) @article(yasuoka:jocssubmit, author = "Hirotoshi Yasuoka and Tachio Terauchi", year = "2011", title = "On Bounding Problems of Quantitative Information Flow (Extended version)", journal = "Journal of Computer Security", volume = "19", number = "6", pages = "1029--1082", url = "http://dx.doi.org/10.3233/JCS-2011-0437", ) @misc(longversion, author = "Hirotoshi Yasuoka and Tachio Terauchi", year = "2011", title = "Quantitative Information Flow as Safety and Liveness Hyperproperties", url = "{http://www.kb.ecei.tohoku.ac.jp/~yasuoka}", )