![]() |
![]() |
University of Birmingham > Talks@bham > Computer Security Seminars > Probabilistic Point-to-Point Information Leakage
Probabilistic Point-to-Point Information LeakageAdd to your list(s) Download to your calendar using vCal
If you have a question about this talk, please contact Vincent Cheval. The outputs of a program that processes secret data may reveal information about the values of these secrets. We present an information leakage model that measures the leakage between specific points in a probabilistic program. To make our model precise, we base it on a simple probabilistic imperative language in which the values of variables may arbitrarily be marked as secret or observable by an attacker, and give semantics to the language that correspond to our leakage model. We then extend our model to address both non-terminating programs (with potentially infinite numbers of secret and observable values) and user input. Finally, we show how statistical approximation techniques can be used to estimate our leakage measures in real-world Java programs. This talk is part of the Computer Security Seminars series. This talk is included in these lists:
Note that ex-directory lists are not shown. |
Other listsComputer Science Distinguished Seminars Theoretical Physics Journal Club Optimisation and Numerical Analysis SeminarsOther talksModelling uncertainty in image analysis. Ultrafast, all-optical, and highly efficient imaging of molecular chirality Geometry of alternating projections in metric spaces with bounded curvature TBC TBC Sylow branching coefficients for symmetric groups |