Information leakage

Results: 114



#Item
11LeakWatch: Estimating Information Leakage from Java Programs Tom Chothia1 , Yusuke Kawamoto2⋆ , and Chris Novakovic1 1  School of Computer Science, University of Birmingham, UK

LeakWatch: Estimating Information Leakage from Java Programs Tom Chothia1 , Yusuke Kawamoto2⋆ , and Chris Novakovic1 1 School of Computer Science, University of Birmingham, UK

Add to Reading List

Source URL: www.cs.bham.ac.uk

- Date: 2015-08-02 23:01:51
    12Side-channel Vulnerability Factor: A Metric for Measuring Information Leakage John Demme Robert Martin Adam Waksman Simha Sethumadhavan Computer Architecture Security and Technology Lab Department of Computer Science, Co

    Side-channel Vulnerability Factor: A Metric for Measuring Information Leakage John Demme Robert Martin Adam Waksman Simha Sethumadhavan Computer Architecture Security and Technology Lab Department of Computer Science, Co

    Add to Reading List

    Source URL: www.cs.columbia.edu

    - Date: 2012-06-11 10:18:08
      13Probabilistic Point-to-Point Information Leakage Tom Chothia∗ , Yusuke Kawamoto∗ , Chris Novakovic∗ and David Parker∗ ∗ School of Computer Science University of Birmingham, Birmingham, UK  Abstract—The output

      Probabilistic Point-to-Point Information Leakage Tom Chothia∗ , Yusuke Kawamoto∗ , Chris Novakovic∗ and David Parker∗ ∗ School of Computer Science University of Birmingham, Birmingham, UK Abstract—The output

      Add to Reading List

      Source URL: www.cs.bham.ac.uk

      - Date: 2013-08-01 12:14:39
        14Information Leakage Analysis by Abstract Interpretation Matteo Zanioli1,2 and Agostino Cortesi1 1 2

        Information Leakage Analysis by Abstract Interpretation Matteo Zanioli1,2 and Agostino Cortesi1 1 2

        Add to Reading List

        Source URL: www.dsi.unive.it

        - Date: 2011-02-07 10:20:50
          15A Tool for Estimating Information Leakage? Tom Chothia, Yusuke Kawamoto, and Chris Novakovic School of Computer Science, University of Birmingham, Birmingham, UK Abstract. We present leakiEst, a tool that estimates how m

          A Tool for Estimating Information Leakage? Tom Chothia, Yusuke Kawamoto, and Chris Novakovic School of Computer Science, University of Birmingham, Birmingham, UK Abstract. We present leakiEst, a tool that estimates how m

          Add to Reading List

          Source URL: www.cs.bham.ac.uk

          - Date: 2013-08-01 12:14:38
            16PETAL: Preset Encoding Table Information Leakage Jiaqi Tan, Jayvardhan Nahata Contact:  CMU-PDLApril 2013

            PETAL: Preset Encoding Table Information Leakage Jiaqi Tan, Jayvardhan Nahata Contact: CMU-PDLApril 2013

            Add to Reading List

            Source URL: www.pdl.cmu.edu

            - Date: 2014-01-28 13:54:50
              17Bats Large in Scale Service  LIS Executions with Protection Against Information Leakage European Equities	  Bats Large in Scale (Bats LIS) is an indication of interest (IOI) negotiation and execution

              Bats Large in Scale Service LIS Executions with Protection Against Information Leakage European Equities Bats Large in Scale (Bats LIS) is an indication of interest (IOI) negotiation and execution

              Add to Reading List

              Source URL: cdn.batstrading.com

              - Date: 2016-08-09 02:52:02
                18information leakage malicious intermediary information leakage information leakage malicious intermediary insufficient authorization

                information leakage malicious intermediary information leakage information leakage malicious intermediary insufficient authorization

                Add to Reading List

                Source URL: www.soaschool.com

                Language: English - Date: 2013-01-08 15:18:27
                19Exploiting the Information Leakage of Smartphone Sensors Advisor(s): Raphael Spreitzer Institute for Applied Information Processing and Communications (IAIK) Graz University of Technology, Austria

                Exploiting the Information Leakage of Smartphone Sensors Advisor(s): Raphael Spreitzer Institute for Applied Information Processing and Communications (IAIK) Graz University of Technology, Austria

                Add to Reading List

                Source URL: www.iaik.tugraz.at

                Language: English - Date: 2015-09-08 06:00:03
                20SESSION ID: MBS-F01  Side-Channels in the 21st Century: Information Leakage From Smartphones  Gabi Nakibly, Ph.D.

                SESSION ID: MBS-F01 Side-Channels in the 21st Century: Information Leakage From Smartphones Gabi Nakibly, Ph.D.

                Add to Reading List

                Source URL: www.rsaconference.com

                Language: English - Date: 2015-04-23 11:43:47