MALACARIA P, TAUTCHNING M, DISTEFANO D (2016) . Information leakage analysis of complex C code and its application to OpenSSL. Conference: 7th International Symposium on Leveraging Applications (CORFU) from: 10/10/2016 to: 14/10/2016,
Phan Q-S, Malacaria P (2015) . All-Solution Satisfiability Modulo Theories: Applications, Algorithms and Benchmarks. Availability, Reliability and Security (ARES), 2015 10th International Conference on. 100-109.
Phan Q-S, Malacaria P, Pasareanu CS (2015) . Concurrent Bounded Model Checking.SIGSOFT Softw. Eng. Notes vol. 40, Article 1, 1-5.
Rontidis G, Panaousis E, Laszka A et al. (2015) . A game-theoretic approach for minimizing security risks in the Internet-of-Things. 2015 IEEE International Conference on Communication Workshop, ICCW 2015. 2639-2644.
Malacaria P (2015) . Algebraic foundations for quantitative information flow.Mathematical Structures in Computer Science vol. 25, (2) 404-428.
Biondi F, Legay A, Malacaria P et al. (2015) . Quantifying information leakage of randomized protocols.Theoretical Computer Science vol. 597, 62-87.
Biondi F, Legay A, Malacaria P et al. (2014) . Quantifying information leakage of randomized protocols.Theoretical Computer Science
Phan Q-S, Malacaria P (2014) . Abstract Model Counting: A Novel Approach for Quantification of Information Leaks. Proceedings of the 9th ACM Symposium on Information, Computer and Communications Security. Conference: ASIA CCS '14 Proceedings of the 9th ACM symposium on Information, computer and communications security (Kyoto, Japan) from: 04/06/2014 to: 06/06/2014, 283-292.
Malacaria P (2014) . Algebraic foundations for quantitative information flow.Mathematical Structures in Computer Science vol. 29, (5)
Panaousis E, Fielder A, Malacaria P et al. (2014) . Cybersecurity games and investments: A decision support approach. Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). vol. 8840, 266-286.
Fielder A, Panaousis E, Malacaria P et al. (2014) . Game theory meets information security management. IFIP Advances in Information and Communication Technology. vol. 428, 15-29.
Smeraldi F, Malacaria P (2014) . How to spend it: Optimal investment for cyber security.ACM International Conference Proceeding Series
Biondi F, Legay A, Nielsen BF et al. (2014) . Information leakage of non-terminating processes. Leibniz International Proceedings in Informatics, LIPIcs. vol. 29, 517-529.
Phan Q-S, Malacaria P, Pasareanu CS et al. (2014) . Quantifying Information Leaks Using Reliability Analysis. Proceedings of the 2014 International SPIN Symposium on Model Checking of Software. Conference: SPIN 2014 Proceedings of the 2014 International SPIN Symposium on Model Checking of Software (San Jose, CA. USA) from: 21/07/2014 to: 22/07/2014, 105-108.
Huang X, Malacaria P (2013) . SideAuto: Quantitative information flow for side-channel leakage in web applications.Proceedings of the ACM Conference on Computer and Communications Security285-290.
MALACARIA P, SMERALDI F (2013) . Thermodynamic Aspects of Confidentiality.Information and Computation vol. 226, 76-93.
Hankin C, Malacaria P (2013) . Payoffs, Intensionality and Abstraction in Games. Computation, Logic, Games, and Quantum Foundations. Editors: Coecke, B, Ong, L, Panangaden, P, vol. 7860, 69-82.
Biondi F, Legay A, MALACARIA P et al. (2013) . Quantifying Information Leakage of Randomized Protocols. Lecture Notes in Computer Science. Editors: Giacobazzi, R, Berdine, J, Mastroeni, I, Conference: 14th International Conference on Verification, Model Checking, and Abstract Interpretation (VMCAI) (Rome) from: 20/01/2013 to: 22/01/2013, vol. 7737, 68-87.
Malacaria P, Smeraldi F (2012) . The thermodynamics of confidentiality.Proceedings of the Computer Security Foundations Workshop280-290.
Köpf B, Malacaria P, Palamidessi C (2012) . Quantitative Security Analysis (Dagstuhl Seminar 12481).Dagstuhl Reports vol. 2, Article 11, 135-154.
Phan Q-S, Malacaria P, Tkachuk O et al. (2012) . Symbolic quantitative information flow.ACM SIGSOFT Software Engineering Notes vol. 37, Article 6, 1-5.
MALACARIA P, SMERALDI F (2012) . The Thermodynamics of Confidentiality. Computer Security Foundations Symposium (CSF), 2012 IEEE 25th. Editors: Cortier, V, Zdancewic, S, Conference: 25th IEEE Computer Security Foundations Symposium (Harvard, MA, USA) from: 25/06/2012 to: 27/06/2012, 280-290.
Malacaria P (2010) . Program Analysis Probably Counts: Discussant Contribution for the Computer Journal Lecture by Chris Hankin.COMPUT J vol. 53, (6) 881-881.
Malacaria P (2010) . Risk assessment of security threats for looping constructs.Journal of Computer Security vol. 18, 191-228.
Heusser J, Malacaria P (2010) . Applied Quantitative Information Flow and Statistical Databases. FORMAL ASPECTS IN SECURITY AND TRUST. Editors: Degano, P, Guttman, JD, vol. 5983, 96-110.
Malacaria P, Heusser J (2010) . Information Theory and Security: Quantitative Information Flow. FORMAL METHODS FOR QUANTITATIVE ASPECTS OF PROGRAMMING LANGUAGES. Editors: Aldini, A, Bernardo, M, Di Pierro, A, Wiklicky, H et al., vol. 6154, 87-134.
Heusser J, MALACARIA P (2010) . Quantifying information leaks in software. ACM 2010. Conference: Twenty-Sixth Annual Computer Security Applications Conference, ACSAC 2010 (Austin Texas) from: 06/12/2010 to: 10/12/2010, 261-269.
Malacaria P (2010) . Quantitative Information Flow: From Theory to Practice?. COMPUTER AIDED VERIFICATION, PROCEEDINGS. Editors: Touili, T, Cook, B, Jackson, P, vol. 6174, 20-22.
Chen H, Malacaria P (2010) . The Optimum Leakage Principle for Analyzing Multi-threaded Programs. INFORMATION THEORETIC SECURITY. Editors: Kurosawa, K, vol. 5973, 177-193.
Malacaria P, Smeraldi F (2009) . On Adaboost and optimal betting strategies. Proceedings of the 5th International Conference on Data Mining (DMIN/WORLDCOMP). 326–332-326–332.
MALACARIA P, SMERALDI F (2009) . On Adaboost and Optimal Betting Strategies. Conference: WORLDCOMP: The 2009 International Conference on Data Mining, DMIN 2009 (Las Vegas) from: 13/07/2009 to: 16/07/2009, 326-332.
CHEN H, MALACARIA P (2009) . Quantifying maximal loss of anonymity in protocols. Conference: Proceedings of the 2009 ACM Symposium on Information, Computer and Communications Security, ASIACCS 2009 (Sydney, Australia) from: 03/2010 to: 03/2012, 206-217.
Malacaria P, Chen H (2008) . Lagrange Multipliers and Maximum Information Leakage in Different Observational Models. PLAS'08: PROCEEDINGS OF THE ACM SIGPLAN THIRD WORKSHOP ON PROGRAMMING LANGUAGES AND ANALYSIS FOR SECURITY. 135-146.
MALACARIA P, Hunt S, Clark D (2007) . A static analysis for quantifying the information flow in a simple imperative language.Journal of Computer Security vol. 15, (3) 321-371.
Malacaria P (2007) . Assessing Security Threats of Looping Constructs. CONFERENCE RECORD OF POPL 2007: THE 34TH ACM SIGPLAN SIGACT SYMPOSIUM ON PRINCIPLES OF PROGAMMING LANGUAGES. 225-235.
Malacaria P (2007) . Assessing security threats of looping constructs. ACM SIGPLAN NOTICES. vol. 42, 225-235.
Chen H, Malacaria P (2007) . Quantitative Analysis of Leakage for Multi-threaded Programs. PLAS'07: PROCEEDINGS OF THE 2007 ACM SIGPLAN WORKSHOP ON PROGRAMMING LANGUAGES AND ANALYSIS FOR SECURITY. 31-40.
Clark D, Hunt S, Malacaria P (2005) . Quantitative information flow, relations and polymorphic types.J LOGIC COMPUT vol. 15, (2) 181-199.
Clark D, Hunt S, Malacaria P (2005) . Quantified Interference for a while Language.Electronic Notes in Theoretical Computer Science vol. 112, (SPEC. ISS.) 149-166.
Bucciarelli A, Malacaria P (2002) . Relative definability of boolean functions via hypergraphs.THEOR COMPUT SCI vol. 278, (1-2) 91-110.
MALACARIA P, Clark D, Hunt S (2002) . Quantitative Analysis of the Leakage of Confidential Data.Electronic Notes in Theoretical Computer Science vol. 59, (3)
Abramsky S, Jagadeesan R, Malacaria P (2000) . Full abstraction for PCF.INFORM COMPUT vol. 163, (2) 409-470.
Malacaria P. Algebraic Foundations for Information Theoretical, Probabilistic and Guessability measures of Information Flow.
Fielder A, Panaousis E, Malacaria P et al.. Comparing Decision Support Approaches for Cyber Security Investment.
Fielder A, Panaousis E, Malacaria P et al.. Decision support approaches for cyber security investment.Decision Support Systems vol. 86, Article C, 13-23.
KHOUZANI MHR, MALACARIA P, HANKIN C et al.. Efficient Numerical Frameworks for Multi-Objective Cyber Security Planning. Conference: European Symposium on Research in Computer Security (ESORICS) 2016 (Heraklion, Crete, Greece) from: 26/09/2016 to: 30/09/2016,
Fielder A, Panaousis E, Malacaria P et al.. Game theory meets information security management. Conference: 29th IFIP TC-11 International Information Security and Privacy Conference (SEC2014) (Marrakech (Morocco)) from: 02/06/2014 to: 04/06/2014, 15-29.
MALACARIA P, Pasareanu C, Phan Q-S. Multi-run side-channel analysis using Symbolic Execution and Max-SMT. IEEE. Conference: 29th IEEE Computer Security Foundations Symposium (Lisbon) from: 27/06/2016 to: 01/07/2016,
Heusser J, Malacaria P. Quantifying Information Leak Vulnerabilities.
MALACARIA P, Khouzani MHR. Relative Perfect Secrecy: Universally Optimal Strategies and Channel Design. IEEE. Conference: 29th IEEE Computer Security Foundations Symposium (Lisbon) from: 27/06/2016 to: 01/07/2016,
Chen H, Malacaria P. Studying Maximum Information Leakage Using Karush-Kuhn-Tucker Conditions.EPTCS 7, 2009, pp. 1-15