{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,5,2]],"date-time":"2025-05-02T04:16:13Z","timestamp":1746159373873,"version":"3.40.4"},"publisher-location":"Cham","reference-count":28,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319048963"},{"type":"electronic","value":"9783319048970"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014]]},"DOI":"10.1007\/978-3-319-04897-0_6","type":"book-chapter","created":{"date-parts":[[2014,2,18]],"date-time":"2014-02-18T08:34:38Z","timestamp":1392712478000},"page":"77-94","source":"Crossref","is-referenced-by-count":3,"title":["Quantitative Security Analysis for Programs with Low Input and Noisy Output"],"prefix":"10.1007","author":[{"given":"Tri Minh","family":"Ngo","sequence":"first","affiliation":[]},{"given":"Marieke","family":"Huisman","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"6_CR1","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"60","DOI":"10.1007\/978-3-642-22012-8_4","volume-title":"Automata, Languages and Programming","author":"M.S. Alvim","year":"2011","unstructured":"Alvim, M.S., Andr\u00e9s, M.E., Chatzikokolakis, K., Palamidessi, C.: On the relation between differential privacy and quantitative information flow. In: Aceto, L., Henzinger, M., Sgall, J. (eds.) ICALP 2011, Part II. LNCS, vol.\u00a06756, pp. 60\u201376. Springer, Heidelberg (2011)"},{"doi-asserted-by":"crossref","unstructured":"Alvim, M.S., Andr\u00e9s, M.E., Chatzikokolakis, K., Degano, P., Palamidessi, C.: Differential privacy: on the trade-off between utility and information leakage. CoRR, abs\/1103.5188 (2011)","key":"6_CR2","DOI":"10.1007\/978-3-642-29420-4_3"},{"key":"6_CR3","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"211","DOI":"10.1007\/978-3-642-23082-0_8","volume-title":"Foundations of Security Analysis and Design VI","author":"M.S. Alvim","year":"2011","unstructured":"Alvim, M.S., Andr\u00e9s, M.E., Chatzikokolakis, K., Palamidessi, C.: Quantitative information flow and applications to differential privacy. In: Aldini, A., Gorrieri, R. (eds.) FOSAD VI 2011. LNCS, vol.\u00a06858, pp. 211\u2013230. Springer, Heidelberg (2011)"},{"key":"6_CR4","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"102","DOI":"10.1007\/978-3-642-15375-4_8","volume-title":"CONCUR 2010 - Concurrency Theory","author":"M.S. Alvim","year":"2010","unstructured":"Alvim, M.S., Andr\u00e9s, M.E., Palamidessi, C.: Information flow in interactive systems. In: Gastin, P., Laroussinie, F. (eds.) CONCUR 2010. LNCS, vol.\u00a06269, pp. 102\u2013116. Springer, Heidelberg (2010)"},{"doi-asserted-by":"crossref","unstructured":"Alvim, M.S., Chatzikokolakis, K., Palamidessi, C., Smith, G.: Measuring information leakage using generalized gain functions. In: Proceedings of the IEEE 25th Computer Security Foundations Symposium, CSF 2012, pp. 265\u2013279. IEEE Computer Society (2012)","key":"6_CR5","DOI":"10.1109\/CSF.2012.26"},{"doi-asserted-by":"crossref","unstructured":"Andres, M.E., Palamidessi, C., Rossum, P., Sokolova, A.: Information hiding in probabilistic concurrent systems. In: Proceedings of the 2010 Seventh International Conference on the Quantitative Evaluation of Systems, QEST 2010, pp. 17\u201326. IEEE Computer Society (2010)","key":"6_CR6","DOI":"10.1109\/QEST.2010.11"},{"unstructured":"Cachin, C.: Entropy Measures and Unconditional Security in Cryptography. PhD thesis (1997)","key":"6_CR7"},{"key":"6_CR8","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"281","DOI":"10.1007\/978-3-540-75336-0_18","volume-title":"Trustworthy Global Computing","author":"K. Chatzikokolakis","year":"2007","unstructured":"Chatzikokolakis, K., Palamidessi, C., Panangaden, P.: Anonymity protocols as noisy channels. In: Montanari, U., Sannella, D., Bruni, R. (eds.) TGC 2006. LNCS, vol.\u00a04661, pp. 281\u2013300. Springer, Heidelberg (2007)"},{"key":"6_CR9","doi-asserted-by":"publisher","first-page":"181","DOI":"10.1093\/logcom\/exi009","volume":"15","author":"D. Clark","year":"2005","unstructured":"Clark, D., Hunt, S., Malacaria, P.: Quantitative information flow, relations and polymorphic types. J. Log. and Comput.\u00a015, 181\u2013199 (2005)","journal-title":"J. Log. and Comput."},{"doi-asserted-by":"crossref","unstructured":"Clarkson, M.R., Myers, A.C., Schneider, F.B.: Quantifying information flow with beliefs. J. Comput. Secur. (2009)","key":"6_CR10","DOI":"10.3233\/JCS-2009-0353"},{"doi-asserted-by":"crossref","unstructured":"Clarkson, M.R., Myers, A.C., Schneider, F.B.: Belief in information flow. In: In Proc. 18th IEEE Computer Security Foundations Workshop, pp. 31\u201345 (2005)","key":"6_CR11","DOI":"10.1109\/CSFW.2005.10"},{"doi-asserted-by":"crossref","unstructured":"Goguen, J.A., Meseguer, J.: Security policies and security models. In: IEEE Symposium on Security and Privacy, pp. 11\u201320 (1982)","key":"6_CR12","DOI":"10.1109\/SP.1982.10014"},{"doi-asserted-by":"crossref","unstructured":"Hamadou, S., Sassone, V., Palamidessi, C.: Reconciling belief and vulnerability in information flow. In: Proceedings of the 2010 IEEE Symposium on Security and Privacy, SP 2010, pp. 79\u201392. IEEE Computer Society (2010)","key":"6_CR13","DOI":"10.1109\/SP.2010.13"},{"key":"6_CR14","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"178","DOI":"10.1007\/978-3-642-31762-0_12","volume-title":"Formal Verification of Object-Oriented Software","author":"M. Huisman","year":"2012","unstructured":"Huisman, M., Ngo, T.M.: Scheduler-specific confidentiality for multi-threaded programs and its logic-based verification. In: Beckert, B., Damiani, F., Gurov, D. (eds.) FoVeOOS 2011. LNCS, vol.\u00a07421, pp. 178\u2013195. Springer, Heidelberg (2012)"},{"doi-asserted-by":"crossref","unstructured":"Hussein, S.H.: A precise information flow measure from imprecise probabilities. In: Proceedings of the 2012 IEEE Sixth International Conference on Software Security and Reliability, SERE 2012, pp. 128\u2013137. IEEE Computer Society (2012)","key":"6_CR15","DOI":"10.1109\/SERE.2012.25"},{"doi-asserted-by":"crossref","unstructured":"Hussein, S.H.: Refining a quantitative information flow metric. CoRR, abs\/1206.0886 (2012)","key":"6_CR16","DOI":"10.1109\/NTMS.2012.6208689"},{"doi-asserted-by":"crossref","unstructured":"K\u00f6pf, B., Basin, D.: An information-theoretic model for adaptive side-channel attacks. In: Proceedings of the 14th ACM Conference on Computer and Communications Security, CCS 2007, pp. 286\u2013296. ACM (2007)","key":"6_CR17","DOI":"10.1145\/1315245.1315282"},{"doi-asserted-by":"crossref","unstructured":"K\u00f6pf, B., D\u00fcrmuth, M.: A provably secure and efficient countermeasure against timing attacks. In: Proceedings of the 2009 22nd IEEE Computer Security Foundations Symposium, CSF 2009, pp. 324\u2013335. IEEE Computer Society (2009)","key":"6_CR18","DOI":"10.1109\/CSF.2009.21"},{"key":"6_CR19","doi-asserted-by":"crossref","first-page":"191","DOI":"10.3233\/JCS-2010-0360","volume":"18","author":"P. Malacaria","year":"2010","unstructured":"Malacaria, P.: Risk assessment of security threats for looping constructs. J. Comput. Secur.\u00a018, 191\u2013228 (2010)","journal-title":"J. Comput. Secur."},{"doi-asserted-by":"crossref","unstructured":"Malacaria, P., Chen, H.: Lagrange multipliers and maximum information leakage in different observational models. In: Proceedings of the Third ACM SIGPLAN Workshop on Programming Languages and Analysis for Security, PLAS 2008, pp. 135\u2013146. ACM (2008)","key":"6_CR20","DOI":"10.1145\/1375696.1375713"},{"doi-asserted-by":"crossref","unstructured":"Moskowitz, I.S., Newman, R.E., Crepeau, D.P., Miller, A.R.: Covert channels and anonymizing networks. In: Proceedings of the 2003 ACM Workshop on Privacy in the Electronic Society, WPES 2003, pp. 79\u201388. ACM (2003)","key":"6_CR21","DOI":"10.21236\/ADA465268"},{"doi-asserted-by":"crossref","unstructured":"Ngo, T.M., Huisman, M.: Quantitative security analysis for multi-threaded programs. CoRR, abs\/1306.2693 (2013)","key":"6_CR22","DOI":"10.4204\/EPTCS.117.3"},{"unstructured":"Shannon, C.E., Weaver, W.: A Mathematical Theory of Communication. University of Illinois Press (1963)","key":"6_CR23"},{"key":"6_CR24","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"288","DOI":"10.1007\/978-3-642-00596-1_21","volume-title":"Foundations of Software Science and Computational Structures","author":"G. Smith","year":"2009","unstructured":"Smith, G.: On the foundations of quantitative information flow. In: de Alfaro, L. (ed.) FOSSACS 2009. LNCS, vol.\u00a05504, pp. 288\u2013302. Springer, Heidelberg (2009)"},{"key":"6_CR25","doi-asserted-by":"crossref","first-page":"231","DOI":"10.3233\/JCS-1999-72-305","volume":"7","author":"D. Volpano","year":"1999","unstructured":"Volpano, D., Smith, G.: Probabilistic noninterference in a concurrent language. J. Comput. Secur.\u00a07, 231\u2013253 (1999)","journal-title":"J. Comput. Secur."},{"key":"6_CR26","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"357","DOI":"10.1007\/978-3-642-15497-3_22","volume-title":"Computer Security \u2013 ESORICS 2010","author":"H. Yasuoka","year":"2010","unstructured":"Yasuoka, H., Terauchi, T.: On bounding problems of quantitative information flow. In: Gritzalis, D., Preneel, B., Theoharidou, M. (eds.) ESORICS 2010. LNCS, vol.\u00a06345, pp. 357\u2013372. Springer, Heidelberg (2010)"},{"doi-asserted-by":"crossref","unstructured":"Zdancewic, S., Myers, A.C.: Observational determinism for concurrent program security. In: Proceedings of 16th IEEE Computer Security Foundations Workshop, CSFW 2003, pp. 29\u201343. IEEE Computer Society (2000)","key":"6_CR27","DOI":"10.1109\/CSFW.2003.1212703"},{"unstructured":"Zhu, Y., Bettati, R.: Anonymity vs. information leakage in anonymity systems. In: Proceedings of the 25th IEEE International Conference on Distributed Computing Systems, ICDCS 2005, pp. 514\u2013524. IEEE Computer Society (2005)","key":"6_CR28"}],"container-title":["Lecture Notes in Computer Science","Engineering Secure Software and Systems"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-04897-0_6","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,5,1]],"date-time":"2025-05-01T21:42:30Z","timestamp":1746135750000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-04897-0_6"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014]]},"ISBN":["9783319048963","9783319048970"],"references-count":28,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-04897-0_6","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2014]]}}}