Assessing security threats of looping constructs

Abstract

There is a clear intuitive connection between the notion of leakage of information in a program and concepts from information theory. This intuition has not been satisfactorily pinned down, until now. In particular, previous information-theoretic models of programs are imprecise, due to their overly conservative treatment of looping constructs. In this… (More)
DOI: 10.1145/1190216.1190251

Topics

3 Figures and Tables

Statistics

02040'06'07'08'09'10'11'12'13'14'15'16'17'18
Citations per Year

193 Citations

Semantic Scholar estimates that this publication has 193 citations based on the available data.

See our FAQ for additional information.

Slides referencing similar topics