Filters








168 Hits in 2.9 sec

QUAIL: A Quantitative Security Analyzer for Imperative Code [chapter]

Fabrizio Biondi, Axel Legay, Louis-Marie Traonouez, Andrzej Wąsowski
2013 Lecture Notes in Computer Science  
We introduce QUAIL, the first tool able to perform an arbitrary-precision quantitative analysis of the security of a system depending on private information.  ...  Quantitative security analysis evaluates and compares how effectively a system protects its secret data.  ...  See [3] for details. QUAIL (QUantitative Analyzer for Imperative Languages) implements this method.  ... 
doi:10.1007/978-3-642-39799-8_49 fatcat:ssmcpdvogzfsvecyk47jsibdfy

Comparative Analysis of Leakage Tools on Scalable Case Studies [chapter]

Fabrizio Biondi, Axel Legay, Jean Quilbeuf
2015 Lecture Notes in Computer Science  
Quantitative security techniques have been proven effective to measure the security of systems against various types of attackers.  ...  We analyze both case studies with three state-of-the-art information leakage computation tools: LeakWatch, Moped-QLeak, and our tool QUAIL equipped with a new trace analysis algorithm.  ...  QUAIL QUAIL [5] computes Shannon and min-entropy leakage of a program written in an imperative WHILE language.  ... 
doi:10.1007/978-3-319-23404-5_17 fatcat:7nltogz7vfhwjlxqtrws4kkimu

A model counter for constraints over unbounded strings

Loi Luu, Shweta Shinde, Prateek Saxena, Brian Demsky
2013 Proceedings of the 35th ACM SIGPLAN Conference on Programming Language Design and Implementation - PLDI '14  
The key ingredient is a new technique that leverages generating functions as a basic primitive for combinatorial counting.  ...  We present a new approach to model counting for structured data types, specifically strings in this work.  ...  Acknowledgements We thank the anonymous reviewers of this paper for their helpful feedback, and our shepherd Madhusudan Parthasarathy for his insightful comments and suggestions for preparing the final  ... 
doi:10.1145/2594291.2594331 dblp:conf/pldi/LuuSSD14 fatcat:x5nixfxmg5bwvadrwsffbjae2a

A model counter for constraints over unbounded strings

Loi Luu, Shweta Shinde, Prateek Saxena, Brian Demsky
2014 SIGPLAN notices  
The key ingredient is a new technique that leverages generating functions as a basic primitive for combinatorial counting.  ...  We present a new approach to model counting for structured data types, specifically strings in this work.  ...  Acknowledgements We thank the anonymous reviewers of this paper for their helpful feedback, and our shepherd Madhusudan Parthasarathy for his insightful comments and suggestions for preparing the final  ... 
doi:10.1145/2666356.2594331 fatcat:mmlzir5czzf2bksfbosqrrekwa

Hybrid Statistical Estimation of Mutual Information for Quantifying Information Flow [chapter]

Yusuke Kawamoto, Fabrizio Biondi, Axel Legay
2016 Lecture Notes in Computer Science  
To avoid the high computational cost of such an exhaustive search, statistical analysis has been studied to efficiently obtain approximate estimates by analyzing only a small but representative subset  ...  We show how to combine the analyses on different components of the system with different precision to obtain an estimate for the whole system.  ...  [34] developed tools implementing dynamic quantitative taint analysis techniques for security.  ... 
doi:10.1007/978-3-319-48989-6_25 fatcat:lwpdpjgrfnhrjiosx5bnhivo5i

Hybrid Statistical Estimation of Mutual Information and its Application to Information Flow [article]

Fabrizio Biondi, Yusuke Kawamoto, Axel Legay, Louis-Marie Traonouez
2018 arXiv   pre-print
To apply the method to the source code of a system, we show how to decompose the code into components and to determine the analysis method for each component by overviewing the implementation of those  ...  We show how to combine the analyses on different components of a discrete system with different accuracy to obtain an estimate for the whole system.  ...  [KMPS11] developed tools implementing dynamic quantitative taint analysis techniques for security.  ... 
arXiv:1809.02613v1 fatcat:rgyenzijevdrzelpborpti7yh4

Hybrid statistical estimation of mutual information and its application to information flow

Fabrizio Biondi, Yusuke Kawamoto, Axel Legay, Louis-Marie Traonouez
2018 Formal Aspects of Computing  
To apply the method to the source code of a system, we show how to decompose the code into components and to determine the analysis method for each component by overviewing the implementation of those  ...  We show how to combine the analyses on different components of a discrete system with different accuracy to obtain an estimate for the whole system.  ...  [KMPS11] developed tools implementing dynamic quantitative taint analysis techniques for security.  ... 
doi:10.1007/s00165-018-0469-z fatcat:m6d4f2hwr5cc3didmqh5qihspa

Scalable Approximation of Quantitative Information Flow in Programs [chapter]

Fabrizio Biondi, Michael A. Enescu, Annelie Heuser, Axel Legay, Kuldeep S. Meel, Jean Quilbeuf
2017 Lecture Notes in Computer Science  
We show that ApproxMC2 is able to provide a large performance increase for a very small loss of precision, allowing the analysis of SAT formulas produced from complex code.  ...  Quantitative information flow measurement techniques have been proven to be successful in detecting leakage of confidential information from programs.  ...  In [7] , Biondi et al. present a technique, implemented in the QUAIL tool [9, 8] , to measure Shannon entropy for a number of scalable case studies expressed in a simple imperative language.  ... 
doi:10.1007/978-3-319-73721-8_4 fatcat:re3qc5vjhfhbtbwsox5rybdfgm

Model Counting Modulo Theories [article]

Quoc-Sang Phan
2015 arXiv   pre-print
For quantitative security, our contribution is twofold.  ...  This thesis is concerned with the quantitative assessment of security in software.  ...  For quantitative security, our contribution is twofold.  ... 
arXiv:1504.02796v1 fatcat:vf5khgpgkfdqvhhdsivlmb4f5y

The Concept of Media Accountability Reconsidered

Patrick Lee Plaisance
2000 Journal of Mass Media Ethics  
dynamic of interaction between a given medium and the value sets of individuals or groups receiving media messages.  ...  The concept of media accountability is widely used but remains inadequately defined in the literature and often is restricted to a one-dimensional interpretation.  ...  as Mc Quail says (1997, p. 513 ).  ... 
doi:10.1207/s15327728jmme1504_5 fatcat:fw3ltoo7e5fj3l4upw7qgdbk2y

The influence of speed and size on avian terrestrial locomotor biomechanics: Predicting locomotion in extinct theropod dinosaurs

P. J. Bishop, D. F. Graham, L. P. Lamas, J. R. Hutchinson, J. Rubenson, J. A. Hancock, R. S. Wilson, S. A. Hocknull, R. S. Barrett, D. G. Lloyd, C. J. Clemente, Anthony Fiorillo
2018 PLoS ONE  
Comparable data for the only other extant obligate, striding biped, humans, were also collected and studied.  ...  How extinct, non-avian theropod dinosaurs moved is a subject of considerable interest and controversy.  ...  Much appreciation is extended to the human subjects for their cooperation during experiments. Likewise, a great debt of gratitude is owed to the  ... 
doi:10.1371/journal.pone.0192172 pmid:29466362 pmcid:PMC5821450 fatcat:issre3jnenfhxdjjokf5unrwhq

Key 4. High Scores: WAM vs. LVB [chapter]

2019 Keys to Play  
for the amusement and edification of his fellow masqueraders. 1 In contrast to the profusion of equally viable possibilities produced by the rigid mechanisms of Würfelspiele and the commedia dell' arte  ...  Instead of performing a harlequinade, he distributed a text bearing the title "Excerpts from the Fragments of Zoroaster, " each copy of which contained eight riddles and fourteen proverbs he had devised  ...  prominent part for Wachtelpfeife ("quail whistle, " Figure 75 ). 236 If, with Prod'homme, we hear the first movement of op. 31, no. 3, to channel a quail, Carl Reinecke's observation that the opening  ... 
doi:10.1525/9780520965096-006 fatcat:pmhsy75oz5dapmszvlkscdmta4

Religion, Gender, Sexuality, Race and Class in Coalitional Theory: A Critical and Self-Critical Analysis of LatCrit Social Justice Agendas

Elizabeth Iglesias, Francisco Valdes
1998 Chicana/o-Latina/o Law Review  
Antiessentialist approaches in critical legal scholarship are closely related to anti-subordination principles because anti-essentialism has been a means of securing discursive space for voices and interests  ...  In other words, the formal restrictions established by the Guatemalan Code must be analyzed in light of the pervasive practice of employment discrimination directed at women as workerspractices like the  ...  This interrogation of course must be informed by particularized factors or contexts; for instance, whether the use of bilingual capacity occurs at a conference, or in an article; if at a conference, whether  ... 
doi:10.5070/c7191021108 fatcat:ee27jl3xsrdudoy3oxh4el42cm

Detection of Irradiated Food and Evaluation of the Given Dose by Electron Spin Resonance, Thermoluminescence, and Gas Chromatographic/Mass Spectrometric Analysis [chapter]

Maria C. D'Oca, Antonio Bartolotta
2018 Food Control and Biosecurity  
Acknowledgments This work was supported by national funds through the Pluriannual Program (PEst-OE/AGR/U10276/2014), financed by FCT-Fundação para a Ciência e a Tecnologia (FCT).  ...  Acknowledgments The authors thank CNPq and Fundação Araucária for their financial support.  ...  Pareto analysis may be used not only for analyzing defects on a product but also for analyzing other types of nonconformities.  ... 
doi:10.1016/b978-0-12-811445-2.00010-6 fatcat:flc2mqpiwrhn3cmrmnbkgwgfxe

"Dong Inna"- A look at the role of Jamaican Dancehall music on the creation of social identity among young men in Trinidad and Tobago.pdf

Javan Whittaker
2017 Figshare  
Through a survey and focus group interviews, this dissertation seeks to identify whether dancehall music and its culture has an impact on young male university students between the ages of 18- 25.  ...  The study found that the subscribers of dancehall music do not only see it as creating a 'new' identity but more so an extension of their identity which facilitates the reflection of real life experiences  ...  (Hall: 1982 :In Mc Quail :2012 .  ... 
doi:10.6084/m9.figshare.5661088.v1 fatcat:bthnamzxtvhhhgxi23bb74bsdi
« Previous Showing results 1 — 15 out of 168 results