Sciweavers

127 search results - page 4 / 26
» Quantifying information leaks in software
Sort
View
CISSE
2008
Springer
13 years 11 months ago
Anonymity Leakage Reduction in Network Latency
Each Internet communication leaves trails here or there, that can be followed back to the user. Notably, anonymous communication schemes are purposed to hide users' identity ...
Longy O. Anyanwu, Jared Keengwe, Gladys A. Arome
NDSS
2007
IEEE
14 years 4 months ago
Playing Devil's Advocate: Inferring Sensitive Information from Anonymized Network Traces
Encouraging the release of network data is central to promoting sound network research practices, though the publication of this data can leak sensitive information about the publ...
Scott E. Coull, Charles V. Wright, Fabian Monrose,...
SIGSOFT
2007
ACM
14 years 10 months ago
Quantifying the effectiveness of testing via efficient residual path profiling
Software testing is extensively used for uncovering bugs in large, complex software. Testing relies on well designed regression test suites that anticipate all reasonable software...
Trishul M. Chilimbi, Aditya V. Nori, Kapil Vaswani
JCS
2011
72views more  JCS 2011»
13 years 4 months ago
Automatically deriving information-theoretic bounds for adaptive side-channel attacks
We present a model of adaptive attacks which we combine with information-theoretic metrics to quantify the information revealed to an adaptive adversary. This enables us to expres...
Boris Köpf, David A. Basin
PLDI
2009
ACM
14 years 4 months ago
GC assertions: using the garbage collector to check heap properties
This paper introduces GC assertions, a system interface that programmers can use to check for errors, such as data structure invariant violations, and to diagnose performance prob...
Edward Aftandilian, Samuel Z. Guyer