Assessing security threats of looping constructs


There is a clear intuitive connection between the notion of leakage of information in a program and concepts from information theory. This intuition has not been satisfactorily pinned down, until now. In particular, previous information-theoretic models of programs are imprecise, due to their overly conservative treatment of looping constructs. In this… (More)
DOI: 10.1145/1190216.1190251


3 Figures and Tables


Citations per Year

193 Citations

Semantic Scholar estimates that this publication has 193 citations based on the available data.

See our FAQ for additional information.

Slides referencing similar topics