• Aucun résultat trouvé

Information leakage

Information Leakage of Non-Terminating Processes

Information Leakage of Non-Terminating Processes

... Finite Leakage The Markov chain semantics of the system describes the joint behavior of all ...compute information leakage we are only interested in the secret and the observable variables, so we can ...

17

Microarchitecture-Aware Virtual Machine Placement under Information Leakage Constraints

Microarchitecture-Aware Virtual Machine Placement under Information Leakage Constraints

... under information leakage ...of information that can be leaked between 2 ...new information leakage metric that can be easily used by a tenant and is both application and hardware ...

9

Multi-level Access and Information Leakage in Scalable Cloud Storage

Multi-level Access and Information Leakage in Scalable Cloud Storage

... k−(p−1)δ information symbols of the message stored in cloud i appear to be uniformly distributed over GF (q) k−(p−1)δ at the central ...the information leakage is strictly positive, as in RS-based ...

3

Information Leakage by Trace Analysis in QUAIL

Information Leakage by Trace Analysis in QUAIL

... the information cannot flow directly between prosumers [ 9 ...sensitive information about the house (presence of people in the house, type of electrical devices ...some information about the ...

18

Differential Privacy: on the trade-off between Utility and Information Leakage

Differential Privacy: on the trade-off between Utility and Information Leakage

... of information flow there is a similar concern for controlling information leakage, ...secret information from the ...the leakage in terms of min-entropy leakage, a concept ...

31

Markovian Processes for Quantitative Information Leakage

Markovian Processes for Quantitative Information Leakage

... non-interfering [ 15 ], else it represents the expected number of bits of the secret that the attacker is able to infer. The analysis generalizes naturally to more than two systems, hence allowing to decide which of ...

155

Information leakage on shared hardware : evolutions in recent hardware and applications to virtualization

Information leakage on shared hardware : evolutions in recent hardware and applications to virtualization

... 2.4. The case of the data cache of x86 processors they do not share the resources that are the cause of information leakage. The most obvious solution is to only allow one virtual machine per physical ...

144

Evidence of an information leakage between logically independent blocks

Evidence of an information leakage between logically independent blocks

... the information leakage that may exist, due to electrical coupling, between logically independent blocks of a secure circuit as a new attack path to retrieve secret ...

7

Axioms for Information Leakage

Axioms for Information Leakage

... Non-interference (NI). The vulnerability of a point-hyper equals the vulnerability of the unique inner of this hyper: ∀𝜋: ˆ𝕍[𝜋] = 𝕍(𝜋) . This axiom means that an adversary who has learned with certainty that the secret ...

17

On the information leakage of differentially-private mechanisms

On the information leakage of differentially-private mechanisms

... on leakage do not imply differential privacy It is important to note that the converse of Theorem 15 does not hold, ...min-entropy leakage of a channel does not necessarily imply a bound on level of ...

46

Quantifying Information Leakage of Randomized Protocols

Quantifying Information Leakage of Randomized Protocols

... prior information of the attacker to it: since we assume that the prior probability distribution over the values of the secret is uniform, encoding the ignorant attacker, we can build the Markov chain ...

43

Neural Network Information Leakage through Hidden Learning

Neural Network Information Leakage through Hidden Learning

... extracting information, might allow the framework to find ways around defense mechanisms that have been proven successful against simi- lar attacks, such as model inversion ...

10

Comparative Analysis of Leakage Tools on Scalable Case Studies

Comparative Analysis of Leakage Tools on Scalable Case Studies

... the information can- not flow directly between prosumers [ 10 ...sensitive information about the house (presence of people in the house, type of electrical devices ...some information about the ...

37

Quantifying Leakage in the Presence of Unreliable Sources of Information

Quantifying Leakage in the Presence of Unreliable Sources of Information

... model information leakage in the typical scenario of protocol attacks, where the adversary has only a limited number of tries to guess the value of the secret ...mutual information is about the same, ...

51

Leakage Squeezing Countermeasure against High-Order Attacks

Leakage Squeezing Countermeasure against High-Order Attacks

... mutual information leaked in the case of the ROM implementation ...the leakage squeezing techniques, ...the leakage distributions described in figure 3 so that any partitioning becomes almost ...

17

Air leakage of Insulated Concrete Form houses

Air leakage of Insulated Concrete Form houses

... air leakage is accounted for, there is still a large difference between the loose and tight ...higher leakage area because it has more ...air leakage through the bottom plate, for ...also ...

78

Leakage current in atomic-size surface interconnects

Leakage current in atomic-size surface interconnects

... 4 Institute of Materials Research and Engineering, 3 Research Link, Singapore 117602, Singapore (Received 19 July 2013; accepted 3 October 2013; published online 16 October 2013) The current lost into a doped silicon ...

5

Leakage Flow Influence on SHF pump model performances

Leakage Flow Influence on SHF pump model performances

... The evolution of non-dimensional radial velocity V u *inside the diffuser 5. Conclusion In this paper, the SHF pump was studied numerically and experimentally. The computational models with and without gaps (between the ...

10

Air quality measurements in low-leakage houses

Air quality measurements in low-leakage houses

... / La version de cette publication peut être l’une des suivantes : la version prépublication de l’auteur, la version acceptée du manuscrit ou la version de l’éditeur.. For the publisher[r] ...

27

Leakage flow simulation in a specific pump model

Leakage flow simulation in a specific pump model

... 4. Results and analysis Let us first examine the global results: the non-dimensional static pump head, the non-dimensional isentropic pump head, the impeller efficiency, the diffuser efficiency and the pump efficiency. ...

11

Show all 2491 documents...

Sujets connexes