@misc(evils:www, note = {\url{http://www.cs.bham.ac.uk/research/projects/infotools/leakiest/ext/}}, ) @misc(lpsolve, title = {{\textsf{lp\_solve}{}} version 5.5}, note = {\url{http://lpsolve.sourceforge.net/}}, ) @inproceedings(Alvim:12:CSF, author = {M{\'a}rio S. Alvim and Konstantinos Chatzikokolakis and Catuscia Palamidessi and Geoffrey Smith}, year = {2012}, title = {Measuring Information Leakage Using Generalized Gain Functions}, booktitle = {Proc. of CSF}, publisher = {IEEE}, pages = {265--279}, doi = {10.1109/CSF.2012.26}, ) @article(andres:2011:hal-00573447:1, author = {Miguel Andres, E. and Catuscia Palamidessi and Ana Sokolova and Van Rossum, Peter}, year = {2011}, title = {{Information Hiding in Probabilistic Concurrent Systems}}, journal = {{Theor. Comp. Sci.}}, volume = {412}, number = {28}, pages = {3072--3089}, doi = {10.1016/j.tcs.2011.02.045}, ) @inproceedings(barthe2011information, author = {Gilles Barthe and Boris K\"opf}, year = {2011}, title = {Information-theoretic Bounds for Differentially Private Mechanisms}, booktitle = {Proc. of CSF}, publisher = {IEEE}, pages = {191--204}, doi = {10.1109/CSF.2011.20}, ) @inproceedings(BMLW13, author = {Fabrizio Biondi and Axel Legay and Pasquale Malacaria and Andrzej Wasowski}, year = {2013}, title = {Quantifying Information Leakage of Randomized Protocols}, booktitle = {Proc. of VMCAI}, pages = {68--87}, doi = {10.1007/978-3-642-35873-9\_7}, ) @article(Boreale:09:InfComput, author = {Michele Boreale}, year = {2009}, title = {Quantifying information leakage in process calculi}, journal = {Inf. Comput.}, volume = {207}, number = {6}, pages = {699--725}, doi = {10.1016/j.ic.2008.12.007}, ) @inproceedings(Boreale:11:FOSSACS, author = {Michele Boreale and Francesca Pampaloni and Michela Paolini}, year = {2011}, title = {Asymptotic Information Leakage under One-Try Attacks}, booktitle = {Proc. of FOSSACS}, pages = {396--410}, doi = {10.1007/978-3-642-19805-2\_27}, ) @inproceedings(Braun:09:MFPS, author = {Christelle Braun and Konstantinos Chatzikokolakis and Catuscia Palamidessi}, year = {2009}, title = {Quantitative Notions of Leakage for One-try Attacks}, booktitle = {Proc. of MFPS}, series = {ENTCS}, volume = {249}, publisher = {Elsevier}, pages = {75--91}, doi = {10.1016/j.entcs.2009.07.085}, ) @article(cgUCL-PLLKCSC08, author = {Ran Canetti and Ling Cheung and Dilsun Kirli Kaynar and Moses Liskov and Nancy A. Lynch and Olivier Pereira and Roberto Segala}, year = {2008}, title = {{Analyzing Security Protocols Using Time-Bounded Task-PIOAs}}, journal = {Discrete Event Dynamic Systems}, volume = {18}, pages = {111--159}, doi = {10.1007/s10626-007-0032-1}, ) @inproceedings(Chatzikokolakis07makingrandom, author = {Konstantinos Chatzikokolakis and Catuscia Palamidessi}, year = {2007}, title = {Making random choices invisible to the scheduler}, booktitle = {Proc. of CONCUR'07}, publisher = {Springer}, pages = {42--58}, doi = {10.1016/j.ic.2009.06.006}, ) @article(Chatzikokolakis:08:IC, author = {Konstantinos Chatzikokolakis and Catuscia Palamidessi and Prakash Panangaden}, year = {2008}, title = {Anonymity Protocols as Noisy Channels}, journal = {Inf. Comput.}, volume = {206}, number = {2--4}, pages = {378--401}, doi = {10.1016/j.ic.2007.07.003}, ) @article(Chaum:81, author = {David Chaum}, year = {1981}, title = {Untraceable electronic mail, return addresses, and digital pseudonyms}, journal = {Commun. {ACM}}, volume = {24}, number = {2}, pages = {84--90}, doi = {10.1145/358549.358563}, ) @inproceedings(chothia13:cav, author = {Tom Chothia and Yusuke Kawamoto and Chris Novakovic}, year = {2013}, title = {{A Tool for Estimating Information Leakage}}, booktitle = {{Proc. of CAV'13}}, doi = {10.1007/978-3-642-39799-8\_47}, ) @inproceedings(ChothiaKN14:esorics, author = {Tom Chothia and Yusuke Kawamoto and Chris Novakovic}, year = {2014}, title = {{LeakWatch}: {E}stimating Information Leakage from Java Programs}, booktitle = {{Proc. of ESORICS'14}}, pages = {219--236}, doi = {10.1007/978-3-319-11212-1\_13}, ) @inproceedings(ChothiaKawamoto2013, author = {Tom Chothia and Yusuke Kawamoto and Chris Novakovic and David Parker}, year = {2013}, title = {Probabilistic Point-to-Point Information Leakage}, booktitle = {Proc. of CSF}, publisher = {IEEE}, pages = {193--205}, doi = {10.1109/CSF.2013.20}, ) @inproceedings(Clark:01:QAPL, author = {David Clark and Sebastian Hunt and Pasquale Malacaria}, year = {2001}, title = {Quantitative Analysis of the Leakage of Confidential Data}, booktitle = {Proc. of QAPL'01}, series = {ENTCS}, volume = {59 (3)}, publisher = {Elsevier}, pages = {238--251}, doi = {10.1016/S1571-0661(04)00290-7}, ) @inproceedings(Espinoza:11:FAST, author = {Barbara Espinoza and Geoffrey Smith}, year = {2011}, title = {Min-Entropy Leakage of Channels in Cascade}, booktitle = {Proc. of FAST}, series = {LNCS}, volume = {7140}, publisher = {Springer}, pages = {70--84}, doi = {10.1007/978-3-642-29420-4\_5}, ) @article(espinoza2013min, author = {Barbara Espinoza and Geoffrey Smith}, year = {2013}, title = {Min-entropy as a resource}, journal = {Inf. Comput.}, doi = {10.1016/j.ic.2013.03.005}, ) @inproceedings(KawamotoCP14:qest, author = {Yusuke Kawamoto and Konstantinos Chatzikokolakis and Catuscia Palamidessi}, year = {2014}, title = {Compositionality Results for Quantitative Information Flow}, booktitle = {{Proc. of QEST'14}}, pages = {368--383}, doi = {10.1007/978-3-319-10696-0\_28}, ) @techreport(KawamotoGivenWilson:15:HAL, author = {Yusuke Kawamoto and Given-Wilson, Thomas}, year = {2015}, title = {Quantitative Information Flow for Scheduler-Dependent Systems}, type = {Research Report}, institution = {INRIA}, note = {Available at \url{http://hal.inria.fr/hal-01114778}}, ) @inproceedings(kocher1996timing, author = {Paul C Kocher}, year = {1996}, title = {Timing attacks on implementations of {Diffie-Hellman}, {RSA}, {DSS}, and other systems}, booktitle = {Proc. of CRYPTO'96}, organization = {Springer}, pages = {104--113}, doi = {10.1007/3-540-68697-5\_9}, ) @inproceedings(Koepf:07:CCS, author = {Boris K{\"o}pf and David A. Basin}, year = {2007}, title = {An information-theoretic model for adaptive side-channel attacks}, booktitle = {Proc. of CCS}, publisher = {ACM}, pages = {286--296}, doi = {10.1145/1315245.1315282}, ) @inproceedings(McIverMSEM14, author = {Annabelle McIver and Carroll Morgan and Geoffrey Smith and Barbara Espinoza and Larissa Meinicke}, year = {2014}, title = {Abstract Channels and Their Robust Information-Leakage Ordering}, booktitle = {Proc. of {POST}'14}, pages = {83--102}, doi = {10.1007/978-3-642-54792-8\_5}, ) @inproceedings(Smith:09:FOSSACS, author = {Geoffrey Smith}, year = {2009}, title = {On the Foundations of Quantitative Information Flow}, booktitle = {Proc. of FOSSACS}, series = {LNCS}, volume = {5504}, publisher = {Springer}, pages = {288--302}, doi = {10.1007/978-3-642-00596-1\_21}, ) @inproceedings(smith:qest11, author = {Geoffrey Smith}, year = {2011}, title = {{Quantifying Information Flow Using Min-Entropy}}, booktitle = {{Proc. of QEST'11}}, pages = {159--167}, doi = {10.1109/QEST.2011.31}, ) @inproceedings(Zhang:2010:MCI:2175554.2175561, author = {Lijun Zhang and Neuh\"{a}u{\ss}er, Martin R.}, year = {2010}, title = {Model Checking Interactive Markov Chains}, booktitle = {Proc. of TACAS'10}, publisher = {Springer-Verlag}, address = {Berlin, Heidelberg}, pages = {53--68}, doi = {10.1007/978-3-642-12002-2\_5}, )