{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,18]],"date-time":"2025-10-18T21:02:09Z","timestamp":1760821329569,"version":"3.41.0"},"reference-count":69,"publisher":"Association for Computing Machinery (ACM)","issue":"3","license":[{"start":{"date-parts":[[2022,4,9]],"date-time":"2022-04-09T00:00:00Z","timestamp":1649462400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by-nd\/4.0\/"}],"funder":[{"name":"JSPS and Inria"},{"name":"PEPS 2018 project MAGIC"},{"name":"ANR project REPAS"},{"name":"Epistemic Interactive Concurrency (EPIC) from the STIC AmSud Program"},{"DOI":"10.13039\/501100003593","name":"CNPq","doi-asserted-by":"crossref","id":[{"id":"10.13039\/501100003593","id-type":"DOI","asserted-by":"crossref"}]},{"DOI":"10.13039\/501100002322","name":"CAPES","doi-asserted-by":"crossref","id":[{"id":"10.13039\/501100002322","id-type":"DOI","asserted-by":"crossref"}]},{"DOI":"10.13039\/501100004901","name":"FAPEMIG","doi-asserted-by":"crossref","id":[{"id":"10.13039\/501100004901","id-type":"DOI","asserted-by":"crossref"}]},{"name":"ERATO HASUO Metamathematics for Systems Design Project","award":["JPMJER1603"],"award-info":[{"award-number":["JPMJER1603"]}]},{"name":"JSPS KAKENHI","award":["JP17K12667 and JP19H04113"],"award-info":[{"award-number":["JP17K12667 and JP19H04113"]}]},{"name":"ERC grant HYPATIA under the European Union Horizon 2020 research and innovation programme"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":["ACM Trans. Priv. Secur."],"published-print":{"date-parts":[[2022,8,31]]},"abstract":"<jats:p>\n            A common goal in the areas of secure information flow and privacy is to build effective defenses against unwanted leakage of information. To this end, one must be able to reason about potential attacks and their interplay with possible defenses. In this article, we propose a game-theoretic framework to formalize strategies of attacker and defender in the context of information leakage, and provide a basis for developing optimal defense methods. A novelty of our games is that their utility is given by information leakage, which in some cases may behave in a non-linear way. This causes a significant deviation from classic game theory, in which utility functions are linear with respect to players\u2019 strategies. Hence, a key contribution of this work is the establishment of the foundations of information leakage games. We consider two kinds of games, depending on the notion of leakage considered. The first kind, the\n            <jats:italic>\n              <jats:monospace>QIF<\/jats:monospace>\n              -games\n            <\/jats:italic>\n            , is tailored for the theory of quantitative information flow. The second one, the\n            <jats:italic>\n              <jats:monospace>DP<\/jats:monospace>\n              -games\n            <\/jats:italic>\n            , corresponds to differential privacy.\n          <\/jats:p>","DOI":"10.1145\/3517330","type":"journal-article","created":{"date-parts":[[2022,4,9]],"date-time":"2022-04-09T11:42:44Z","timestamp":1649504564000},"page":"1-36","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":3,"title":["Information Leakage Games: Exploring Information as a Utility Function"],"prefix":"10.1145","volume":"25","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-4196-7467","authenticated-orcid":false,"given":"M\u00e1rio S.","family":"Alvim","sequence":"first","affiliation":[{"name":"UFMG, Belo Horizonte, Brazil"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-3081-5775","authenticated-orcid":false,"given":"Konstantinos","family":"Chatzikokolakis","sequence":"additional","affiliation":[{"name":"University of Athens, Ilisia, Athens, Greece, CNRS, Gif-sur-Yvette, France"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-2151-9560","authenticated-orcid":false,"given":"Yusuke","family":"Kawamoto","sequence":"additional","affiliation":[{"name":"AIST, Koto-ku, Tokyo, Japan"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-4597-7002","authenticated-orcid":false,"given":"Catuscia","family":"Palamidessi","sequence":"additional","affiliation":[{"name":"Inria Saclay, France and \u00c9cole Polytechnique, \u00c9cole Polytechnique, Palaiseau, France"}]}],"member":"320","published-online":{"date-parts":[[2022,4,9]]},"reference":[{"key":"e_1_3_3_2_2","article-title":"LIBQIF: A Quantitative Information Flow Toolkit Library","author":"GitHub","unstructured":"GitHub. n.d. LIBQIF: A Quantitative Information Flow Toolkit Library. Retrieved February 23, 2022 from https:\/\/github.com\/chatziko\/libqif.","journal-title":"https:\/\/github.com\/chatziko\/libqif."},{"key":"e_1_3_3_3_2","doi-asserted-by":"publisher","DOI":"10.1137\/110858021"},{"key":"e_1_3_3_4_2","doi-asserted-by":"publisher","DOI":"10.3233\/JCS-150528"},{"key":"e_1_3_3_5_2","doi-asserted-by":"publisher","DOI":"10.3233\/JCS-2011-0433"},{"key":"e_1_3_3_6_2","series-title":"LNCS","first-page":"437","volume-title":"Proc. of GameSec","author":"Alvim M\u00e1rio S.","year":"2017","unstructured":"M\u00e1rio S. Alvim, Konstantinos Chatzikokolakis, Yusuke Kawamoto, and Catuscia Palamidessi. 2017. Information leakage games. In Proc. of GameSec(LNCS, Vol. 10575). Springer, 437\u2013457."},{"key":"e_1_3_3_7_2","doi-asserted-by":"publisher","DOI":"10.3390\/e20050382"},{"key":"e_1_3_3_8_2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-89722-6_6"},{"key":"e_1_3_3_9_2","first-page":"77","volume-title":"Proc. of CSF","author":"Alvim M\u00e1rio S.","year":"2016","unstructured":"M\u00e1rio S. Alvim, Konstantinos Chatzikokolakis, Annabelle McIver, Carroll Morgan, Catuscia Palamidessi, and Geoffrey Smith. 2016. Axioms for information leakage. In Proc. of CSF. 77\u201392."},{"key":"e_1_3_3_10_2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-96131-6"},{"key":"e_1_3_3_11_2","first-page":"265","volume-title":"Proc. of CSF","author":"Alvim M\u00e1rio S.","year":"2012","unstructured":"M\u00e1rio S. Alvim, Konstantinos Chatzikokolakis, Catuscia Palamidessi, and Geoffrey Smith. 2012. Measuring information leakage using generalized gain functions. In Proc. of CSF. 265\u2013279."},{"key":"e_1_3_3_12_2","first-page":"428","volume-title":"Proc. of CSF","author":"Am\u00e9rico Arthur","year":"2019","unstructured":"Arthur Am\u00e9rico, M. H. R. Khouzani, and Pasquale Malacaria. 2019. Deterministic channel design for minimum leakage. In Proc. of CSF. IEEE, Los Alamitos, CA, 428\u2013441."},{"key":"e_1_3_3_13_2","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2020.2987713"},{"key":"e_1_3_3_14_2","unstructured":"J. Angwin J. Larson S. Mattu and L. Kirchner. 2016. How we analyzed the COMPAS recidivism algorithm. ProPublica . Retrieved February 23 2022 from https:\/\/www.propublica.org\/article\/how-we-analyzed-the-compas-recidivism-algorithm."},{"key":"e_1_3_3_15_2","volume-title":"Discrete and Fractional Programming Techniques for Location Models","author":"Barros Ana Isabel","year":"2013","unstructured":"Ana Isabel Barros. 2013. Discrete and Fractional Programming Techniques for Location Models. Vol. 3. Springer Science & Business Media."},{"key":"e_1_3_3_16_2","first-page":"191","volume-title":"Proc. of CSF","author":"Barthe Gilles","year":"2011","unstructured":"Gilles Barthe and Boris K\u00f6pf. 2011. Information-theoretic bounds for differentially private mechanisms. In Proc. of CSF. IEEE, Los Alamitos, CA, 191\u2013204."},{"key":"e_1_3_3_17_2","doi-asserted-by":"publisher","DOI":"10.1007\/s00165-018-0469-z"},{"key":"e_1_3_3_18_2","doi-asserted-by":"publisher","DOI":"10.2168\/LMCS-11(4:5)2015"},{"key":"e_1_3_3_19_2","doi-asserted-by":"publisher","DOI":"10.1017\/S0960129513000613"},{"key":"e_1_3_3_20_2","unstructured":"Stephen Boyd and Almir Mutapcic. 2006. Subgradient methods. Lecture Notes of EE364b Winter Quarter 2007. Stanford University Stanford CA."},{"key":"e_1_3_3_21_2","doi-asserted-by":"publisher","DOI":"10.5555\/993483"},{"key":"e_1_3_3_22_2","series-title":"ENTCS","first-page":"75","volume-title":"Proc. of MFPS","author":"Braun Christelle","year":"2009","unstructured":"Christelle Braun, Konstantinos Chatzikokolakis, and Catuscia Palamidessi. 2009. Quantitative notions of leakage for one-try attacks. In Proc. of MFPS(ENTCS, Vol. 249). Elsevier, 75\u201391."},{"key":"e_1_3_3_23_2","series-title":"LNCS","first-page":"82","volume-title":"Proc. of PETS","author":"Chatzikokolakis Konstantinos","year":"2013","unstructured":"Konstantinos Chatzikokolakis, Miguel E. Andr\u00e9s, Nicol\u00e1s E. Bordenabe, and Catuscia Palamidessi. 2013. Broadening the scope of differential privacy using metrics. In Proc. of PETS(LNCS, Vol. 7981). Springer, 82\u2013102."},{"key":"e_1_3_3_24_2","series-title":"LNCS","first-page":"32","volume-title":"Proc. of CONCUR","author":"Chatzikokolakis Konstantinos","year":"2014","unstructured":"Konstantinos Chatzikokolakis, Daniel Gebler, Catuscia Palamidessi, and Lili Xu. 2014. Generalized bisimulation metrics. In Proc. of CONCUR(LNCS, Vol. 8704). Springer, 32\u201346."},{"key":"e_1_3_3_25_2","doi-asserted-by":"publisher","DOI":"10.5555\/1454415.1454418"},{"key":"e_1_3_3_26_2","doi-asserted-by":"publisher","DOI":"10.1007\/BF00206326"},{"key":"e_1_3_3_27_2","doi-asserted-by":"publisher","DOI":"10.2307\/1885060"},{"key":"e_1_3_3_28_2","first-page":"690","volume-title":"Proc. of CAV","author":"Chothia Tom","year":"2013","unstructured":"Tom Chothia, Yusuke Kawamoto, and Chris Novakovic. 2013. A tool for estimating information leakage. In Proc. of CAV. 690\u2013695."},{"key":"e_1_3_3_29_2","first-page":"219","volume-title":"Proc. of ESORICS, Part II","author":"Chothia Tom","year":"2014","unstructured":"Tom Chothia, Yusuke Kawamoto, and Chris Novakovic. 2014. LeakWatch: Estimating information leakage from Java programs. In Proc. of ESORICS, Part II. 219\u2013236."},{"key":"e_1_3_3_30_2","first-page":"193","volume-title":"Proc. of CSF","author":"Chothia Tom","year":"2013","unstructured":"Tom Chothia, Yusuke Kawamoto, Chris Novakovic, and David Parker. 2013. Probabilistic point-to-point information leakage. In Proc. of CSF. IEEE, Los Alamitos, CA, 193\u2013205."},{"key":"e_1_3_3_31_2","doi-asserted-by":"publisher","DOI":"10.1093\/logcom\/exi009"},{"key":"e_1_3_3_32_2","doi-asserted-by":"publisher","DOI":"10.3233\/JCS-2007-15302"},{"key":"e_1_3_3_33_2","series-title":"LNCS","first-page":"1","volume-title":"Proc. of ICALP","author":"Dwork Cynthia","year":"2006","unstructured":"Cynthia Dwork. 2006. Differential privacy. In Proc. of ICALP(LNCS, Vol. 4052). Springer, 1\u201312."},{"key":"e_1_3_3_34_2","doi-asserted-by":"publisher","DOI":"10.1145\/1866739.1866758"},{"key":"e_1_3_3_35_2","first-page":"371","volume-title":"Proc. of STOC","author":"Dwork Cynthia","year":"2009","unstructured":"Cynthia Dwork and Jing Lei. 2009. Differential privacy and robust statistics. In Proc. of STOC. ACM, New York, NY, 371\u2013380."},{"key":"e_1_3_3_36_2","series-title":"LNCS","first-page":"265","volume-title":"Proc. of TCC","author":"Dwork Cynthia","year":"2006","unstructured":"Cynthia Dwork, Frank Mcsherry, Kobbi Nissim, and Adam Smith. 2006. Calibrating noise to sensitivity in private data analysis. In Proc. of TCC(LNCS, Vol. 3876). Springer, 265\u2013284."},{"key":"e_1_3_3_37_2","doi-asserted-by":"publisher","DOI":"10.1561\/0400000042"},{"key":"e_1_3_3_38_2","first-page":"195","volume-title":"Proc. of GameSec","author":"Farhang Sadegh","year":"2016","unstructured":"Sadegh Farhang and Jens Grossklags. 2016. FlipLeakage: A game-theoretic approach to protect against stealthy attackers in the presence of information leakage. In Proc. of GameSec. 195\u2013214."},{"key":"e_1_3_3_39_2","first-page":"531","volume-title":"Proc. of FOCS","author":"Kasiviswanathan Shiva Prasad","year":"2008","unstructured":"Shiva Prasad Kasiviswanathan, Homin K. Lee, Kobbi Nissim, Sofya Raskhodnikova, and Adam D. Smith. 2008. What can we learn privately? In Proc. of FOCS. IEEE, Los Alamitos, CA, 531\u2013540."},{"issue":"3","key":"e_1_3_3_40_2","first-page":"1","article-title":"On the compositionality of quantitative information flow","volume":"13","author":"Kawamoto Yusuke","year":"2017","unstructured":"Yusuke Kawamoto, Konstantinos Chatzikokolakis, and Catuscia Palamidessi. 2017. On the compositionality of quantitative information flow. Log. Methods Comput. Sci. 13, 3:11 (2017), 1\u201331.","journal-title":"Log. Methods Comput. Sci."},{"key":"e_1_3_3_41_2","first-page":"48","volume-title":"Proc. of QAPL","author":"Kawamoto Yusuke","year":"2015","unstructured":"Yusuke Kawamoto and Thomas Given-Wilson. 2015. Quantitative information flow for scheduler-dependent systems. In Proc. of QAPL. 48\u201362."},{"key":"e_1_3_3_42_2","first-page":"718","volume-title":"Proc. of Allerton 2019","author":"Kawamoto Yusuke","year":"2019","unstructured":"Yusuke Kawamoto and Takao Murakami. 2019. Local distribution obfuscation via probability coupling. In Proc. of Allerton 2019. IEEE, Los Alamitos, CA, 718\u2013725."},{"key":"e_1_3_3_43_2","series-title":"LNCS","first-page":"128","volume-title":"Proc. of ESORICS, Part I","author":"Kawamoto Yusuke","year":"2019","unstructured":"Yusuke Kawamoto and Takao Murakami. 2019. Local obfuscation mechanisms for hiding probability distributions. In Proc. of ESORICS, Part I(LNCS, Vol. 11735). Springer, 128\u2013148."},{"key":"e_1_3_3_44_2","first-page":"61","volume-title":"Proc. of CSF","author":"Khouzani M. H. R.","year":"2016","unstructured":"M. H. R. Khouzani and P. Malacaria. 2016. Relative perfect secrecy: Universally optimal strategies and channel design. In Proc. of CSF. 61\u201376."},{"key":"e_1_3_3_45_2","first-page":"305","volume-title":"Proc. of CSF","author":"Khouzani M. H. R.","year":"2017","unstructured":"M. H. R. Khouzani and Pasquale Malacaria. 2017. Leakage-minimal design: Universality, limitations, and applications. In Proc. of CSF. IEEE, Los Alamitos, CA, 305\u2013317."},{"key":"e_1_3_3_46_2","doi-asserted-by":"publisher","DOI":"10.3390\/e20090675"},{"key":"e_1_3_3_47_2","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2018.2883705"},{"key":"e_1_3_3_48_2","first-page":"243","volume-title":"Proc. of CSF","author":"Khouzani M. H. R.","year":"2015","unstructured":"M. H. R. Khouzani, Piotr Mardziel, Carlos Cid, and Mudhakar Srivatsa. 2015. Picking vs. guessing secrets: A game-theoretic analysis. In Proc. of CSF. IEEE, Los Alamitos, CA, 243\u2013257."},{"key":"e_1_3_3_49_2","doi-asserted-by":"publisher","DOI":"10.1145\/2514689"},{"key":"e_1_3_3_50_2","first-page":"286","volume-title":"Proc. of CCS","author":"K\u00f6pf Boris","year":"2007","unstructured":"Boris K\u00f6pf and David A. Basin. 2007. An information-theoretic model for adaptive side-channel attacks. In Proc. of CCS. ACM, New York, NY, 286\u2013296."},{"key":"e_1_3_3_51_2","first-page":"3","volume-title":"Proc. of CSF","author":"K\u00f6pf Boris","year":"2010","unstructured":"Boris K\u00f6pf and Andrey Rybalchenko. 2010. Approximation and randomization for quantitative information-flow analysis. In Proc. of CSF. IEEE, Los Alamitos, CA, 3\u201314."},{"key":"e_1_3_3_52_2","doi-asserted-by":"publisher","DOI":"10.5555\/2051237.2051246"},{"key":"e_1_3_3_53_2","doi-asserted-by":"publisher","DOI":"10.1145\/2480741.2480742"},{"key":"e_1_3_3_54_2","first-page":"540","volume-title":"Proc. of S&P","author":"Mardziel Piotr","year":"2014","unstructured":"Piotr Mardziel, M\u00e1rio S. Alvim, Michael W. Hicks, and Michael R. Clarkson. 2014. Quantifying information flow for dynamic secrets. In Proc. of S&P. 540\u2013555."},{"key":"e_1_3_3_55_2","first-page":"204","volume-title":"Proc. of ISIT","author":"Massey James","year":"1994","unstructured":"James Massey. 1994. Guessing and entropy. In Proc. of ISIT. IEEE, Los Alamitos, CA, 204."},{"key":"e_1_3_3_56_2","doi-asserted-by":"publisher","DOI":"10.1016\/0899-8256(89)90007-9"},{"key":"e_1_3_3_57_2","first-page":"414","volume-title":"Proc. of CSF","author":"Mestel David","year":"2019","unstructured":"David Mestel. 2019. Quantifying information flow in interactive systems. In Proc. of CSF. IEEE, Los Alamitos, CA, 414\u2013427."},{"key":"e_1_3_3_58_2","doi-asserted-by":"publisher","DOI":"10.1007\/s10957-009-9522-7"},{"key":"e_1_3_3_59_2","volume-title":"A Course in Game Theory","author":"Osborne Martin J.","year":"1994","unstructured":"Martin J. Osborne and Ariel Rubinstein. 1994. A Course in Game Theory. MIT Press, Cambridge, MA."},{"key":"e_1_3_3_60_2","doi-asserted-by":"publisher","DOI":"10.1145\/290163.290168"},{"key":"e_1_3_3_61_2","volume-title":"Lecture Notes in Microeconomic Theory (2nd ed.)","author":"Rubinstein Ariel","year":"2012","unstructured":"Ariel Rubinstein. 2012. Lecture Notes in Microeconomic Theory (2nd ed.). Princeton University Press, Princeton, NJ."},{"key":"e_1_3_3_62_2","doi-asserted-by":"publisher","DOI":"10.1002\/j.1538-7305.1948.tb01338.x"},{"key":"e_1_3_3_63_2","first-page":"119","volume-title":"Proc. of CSFW","author":"Shmatikov Vitaly","year":"2002","unstructured":"Vitaly Shmatikov. 2002. Probabilistic analysis of anonymity. In Proc. of CSFW. 119\u2013128."},{"key":"e_1_3_3_64_2","series-title":"LNCS","first-page":"288","volume-title":"Proc. of FOSSACS","author":"Smith Geoffrey","year":"2009","unstructured":"Geoffrey Smith. 2009. On the foundations of quantitative information flow. In Proc. of FOSSACS(LNCS, Vol. 5504). Springer, 288\u2013302."},{"key":"e_1_3_3_65_2","doi-asserted-by":"publisher","DOI":"10.1109\/TNET.2011.2176511"},{"key":"e_1_3_3_66_2","volume-title":"Theory of Games and Economic Behavior","author":"von Neumann John","year":"2007","unstructured":"John von Neumann and Oskar Morgenstern. 2007. Theory of Games and Economic Behavior. Princeton University Press, Princeton, NJ."},{"key":"e_1_3_3_67_2","article-title":"Projection onto the probability simplex: An efficient algorithm with a simple proof, and an application","author":"Wang Weiran","year":"2013","unstructured":"Weiran Wang and Miguel A. Carreira-Perpin\u00e1n. 2013. Projection onto the probability simplex: An efficient algorithm with a simple proof, and an application. arXiv preprint arXiv:1309.1541 (2013).","journal-title":"arXiv preprint arXiv:1309.1541"},{"key":"e_1_3_3_68_2","first-page":"674","volume-title":"Proc. of IJCAI","author":"Xu Haifeng","year":"2015","unstructured":"Haifeng Xu, Albert Xin Jiang, Arunesh Sinha, Zinovi Rabinovich, Shaddin Dughmi, and Milind Tambe. 2015. Security games with information leakage: Modeling and computation. In Proc. of IJCAI. 674\u2013680."},{"key":"e_1_3_3_69_2","first-page":"269","volume-title":"Proc. of POST","author":"Yang Mu","year":"2012","unstructured":"Mu Yang, Vladimiro Sassone, and Sardaouna Hamadou. 2012. A game-theoretic analysis of cooperation in anonymity networks. In Proc. of POST. 269\u2013289."},{"key":"e_1_3_3_70_2","unstructured":"Andrew C. Yao. 1982. Protocols for secure computations. In Proc. of FOCS . 160\u2013164."}],"container-title":["ACM Transactions on Privacy and Security"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3517330","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3517330","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T20:16:58Z","timestamp":1750191418000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3517330"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,4,9]]},"references-count":69,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2022,8,31]]}},"alternative-id":["10.1145\/3517330"],"URL":"https:\/\/doi.org\/10.1145\/3517330","relation":{},"ISSN":["2471-2566","2471-2574"],"issn-type":[{"type":"print","value":"2471-2566"},{"type":"electronic","value":"2471-2574"}],"subject":[],"published":{"date-parts":[[2022,4,9]]},"assertion":[{"value":"2020-12-01","order":0,"name":"received","label":"Received","group":{"name":"publication_history","label":"Publication History"}},{"value":"2022-01-01","order":1,"name":"accepted","label":"Accepted","group":{"name":"publication_history","label":"Publication History"}},{"value":"2022-04-09","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}