Measuring channel capacity to distinguish undue influence
- 15 June 2009
- conference paper
- conference paper
- Published by Association for Computing Machinery (ACM) in Proceedings of the ACM SIGPLAN Fourth Workshop on Programming Languages and Analysis for Security - PLAS '09
Abstract
No abstract availableKeywords
Funding Information
- National Science Foundation (031180804484520627511CCF-0424422)
- Division of Computing and Communication Foundations (031180804484520627511CCF-0424422)
- Air Force Office of Scientific Research (22178970-4170)
This publication has 19 references indexed in Scilit:
- Lagrange multipliers and maximum information leakage in different observational modelsPublished by Association for Computing Machinery (ACM) ,2008
- Quantitative information flow as network flow capacityPublished by Association for Computing Machinery (ACM) ,2008
- BitBlaze: A New Approach to Computer Security via Binary AnalysisLecture Notes in Computer Science, 2008
- PanoramaPublished by Association for Computing Machinery (ACM) ,2007
- Assessing security threats of looping constructsPublished by Association for Computing Machinery (ACM) ,2007
- MinosACM Transactions on Architecture and Code Optimization, 2006
- ArgosPublished by Association for Computing Machinery (ACM) ,2006
- Provably Correct Runtime Enforcement of Non-interference PropertiesLecture Notes in Computer Science, 2006
- Secure program execution via dynamic information flow trackingPublished by Association for Computing Machinery (ACM) ,2004
- Language-based information-flow securityIEEE Journal on Selected Areas in Communications, 2003