Menu
 
Research menu
Jump to menu

Publications:  Dr Pasquale Malacaria

Malacaria P, Khouzani MHR, Pasareanu CS et al. (2018). Symbolic Side-Channel Analysis for Probabilistic Programs. IACR Cryptology ePrint Archive. vol. 2018, 329-329.
http://qmro.qmul.ac.uk/xmlui/handle/123456789/38004
Khouzani M, Malacaria P (2017). Leakage-Minimal Design: Universality, Limitations, and Applications. Proceedings - IEEE Computer Security Foundations Symposium. 305-317.
10.1109/CSF.2017.40
http://qmro.qmul.ac.uk/xmlui/handle/123456789/24948
MALACARIA P, Phan Q-S, Pasareanu C et al. (2017). Synthesis of Adaptive Side-Channel Attacks. Conference: 2017 IEEE Computer Security Foundations Symposium (CSF) (Santa Barbara (California)) from: 21/08/2017 to: 25/08/2017,
10.1109/CSF.2017.8
http://qmro.qmul.ac.uk/xmlui/handle/123456789/23889
Phan Q-S, Bang L, Pasareanu CS et al.(2017). Synthesis of Adaptive Side-Channel Attacks. IACR Cryptology ePrint Archive vol. 2017, 401-401.
MALACARIA P, TAUTCHNING M, DISTEFANO D (2016). Information leakage analysis of complex C code and its application to OpenSSL. Conference: 7th International Symposium on Leveraging Applications (CORFU) from: 10/10/2016 to: 14/10/2016,
10.1007/978-3-319-47166-2_63
http://qmro.qmul.ac.uk/xmlui/handle/123456789/13880
KHOUZANI MHR, MALACARIA P, HANKIN C et al. (2016). Efficient Numerical Frameworks for Multi-Objective Cyber Security Planning. Conference: European Symposium on Research in Computer Security (ESORICS) 2016 (Heraklion, Crete, Greece) from: 26/09/2016 to: 30/09/2016,
10.1007/978-3-319-45741-3_10
http://qmro.qmul.ac.uk/xmlui/handle/123456789/13487
P¿s¿reanu CS, Phan QS, Malacaria P (2016). Multi-run side-channel analysis using symbolic execution and Max-SMT. Proceedings - IEEE Computer Security Foundations Symposium. vol. 2016-August,
10.1109/CSF.2016.34
http://qmro.qmul.ac.uk/xmlui/handle/123456789/12478
Khouzani MHR, Malacaria P (2016). Relative perfect secrecy: Universally optimal strategies and channel design. Proceedings - IEEE Computer Security Foundations Symposium. vol. 2016-August,
10.1109/CSF.2016.12
http://qmro.qmul.ac.uk/xmlui/handle/123456789/12477
Fielder A, Panaousis E, Malacaria P et al.(2016). Decision support approaches for cyber security investment. Decision Support Systems vol. 86, Article C, 13-23.
10.1016/j.dss.2016.02.012
http://qmro.qmul.ac.uk/xmlui/handle/123456789/12356
Phan Q-S, Malacaria P (2015). All-Solution Satisfiability Modulo Theories: Applications, Algorithms and Benchmarks. Availability, Reliability and Security (ARES), 2015 10th International Conference on. 100-109.
10.1109/ARES.2015.14
http://qmro.qmul.ac.uk/xmlui/handle/123456789/10997
Phan Q-S, Malacaria P, Pasareanu CS(2015). Concurrent Bounded Model Checking. SIGSOFT Softw. Eng. Notes vol. 40, Article 1, 1-5.
10.1145/2693208.2693240
http://qmro.qmul.ac.uk/xmlui/handle/123456789/6899
Rontidis G, Panaousis E, Laszka A et al. (2015). A game-theoretic approach for minimizing security risks in the Internet-of-Things. 2015 IEEE International Conference on Communication Workshop, ICCW 2015. 2639-2644.
10.1109/ICCW.2015.7247577
Malacaria P(2015). Algebraic foundations for quantitative information flow. Mathematical Structures in Computer Science vol. 25, (2) 404-428.
10.1017/S0960129513000649
Fielder A, Panaousis EA, Malacaria P et al.(2015). Comparing Decision Support Approaches for Cyber Security Investment. CoRR vol. abs/1502.05532,
http://qmro.qmul.ac.uk/xmlui/handle/123456789/12516
Biondi F, Legay A, Malacaria P et al.(2015). Quantifying information leakage of randomized protocols. Theoretical Computer Science vol. 597, 62-87.
10.1016/j.tcs.2015.07.034
Biondi F, Legay A, Malacaria P et al.(2014). Quantifying information leakage of randomized protocols. Theoretical Computer Science
10.1016/j.tcs.2015.07.034
Phan Q-S, Malacaria P (2014). Abstract Model Counting: A Novel Approach for Quantification of Information Leaks. Proceedings of the 9th ACM Symposium on Information, Computer and Communications Security. Conference: ASIA CCS '14 Proceedings of the 9th ACM symposium on Information, computer and communications security (Kyoto, Japan) from: 04/06/2014 to: 06/06/2014, 283-292.
10.1145/2590296.2590328
http://qmro.qmul.ac.uk/xmlui/handle/123456789/6120
Malacaria P(2014). Algebraic foundations for quantitative information flow. Mathematical Structures in Computer Science vol. 29, (5)
10.1017/S0960129513000649
Panaousis E, Fielder A, Malacaria P et al. (2014). Cybersecurity games and investments: A decision support approach. Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). vol. 8840, 266-286.
Fielder A, Panaousis E, Malacaria P et al. (2014). Game theory meets information security management. IFIP Advances in Information and Communication Technology. vol. 428, 15-29.
http://qmro.qmul.ac.uk/xmlui/handle/123456789/31355
Smeraldi F, Malacaria P(2014). How to spend it: Optimal investment for cyber security. ACM International Conference Proceeding Series
10.1145/2602945.2602952
Biondi F, Legay A, Nielsen BF et al. (2014). Information leakage of non-terminating processes. Leibniz International Proceedings in Informatics, LIPIcs. vol. 29, 517-529.
10.4230/LIPIcs.FSTTCS.2014.517
Phan Q-S, Malacaria P, Pasareanu CS et al. (2014). Quantifying Information Leaks Using Reliability Analysis. Proceedings of the 2014 International SPIN Symposium on Model Checking of Software. Conference: SPIN 2014 Proceedings of the 2014 International SPIN Symposium on Model Checking of Software (San Jose, CA. USA) from: 21/07/2014 to: 22/07/2014, 105-108.
10.1145/2632362.2632367
http://qmro.qmul.ac.uk/xmlui/handle/123456789/6119
Huang X, Malacaria P(2013). SideAuto: Quantitative information flow for side-channel leakage in web applications. Proceedings of the ACM Conference on Computer and Communications Security285-290.
10.1145/2517840.2517869
MALACARIA P, SMERALDI F(2013). Thermodynamic Aspects of Confidentiality. Information and Computation vol. 226, 76-93.
10.1016/j.ic.2013.03.006
Hankin C, Malacaria P (2013). Payoffs, Intensionality and Abstraction in Games. Computation, Logic, Games, and Quantum Foundations. Editors: Coecke, B, Ong, L, Panangaden, P, vol. 7860, 69-82.
10.1007/978-3-642-38164-5_6
Biondi F, Legay A, MALACARIA P et al. (2013). Quantifying Information Leakage of Randomized Protocols. Lecture Notes in Computer Science. Editors: Giacobazzi, R, Berdine, J, Mastroeni, I, Conference: 14th International Conference on Verification, Model Checking, and Abstract Interpretation (VMCAI) (Rome) from: 20/01/2013 to: 22/01/2013, vol. 7737, 68-87.
10.1007/978-3-642-35873-9_7
Malacaria P, Smeraldi F(2012). The thermodynamics of confidentiality. Proceedings of the Computer Security Foundations Workshop280-290.
10.1109/CSF.2012.18
Köpf B, Malacaria P, Palamidessi C(2012). Quantitative Security Analysis (Dagstuhl Seminar 12481). Dagstuhl Reports vol. 2, Article 11, 135-154.
Phan Q-S, Malacaria P, Tkachuk O et al.(2012). Symbolic quantitative information flow. ACM SIGSOFT Software Engineering Notes vol. 37, Article 6, 1-5.
10.1145/2382756.2382791
http://qmro.qmul.ac.uk/xmlui/handle/123456789/6239
MALACARIA P, SMERALDI F (2012). The Thermodynamics of Confidentiality. Computer Security Foundations Symposium (CSF), 2012 IEEE 25th. Editors: Cortier, V, Zdancewic, S, Conference: 25th IEEE Computer Security Foundations Symposium (Harvard, MA, USA) from: 25/06/2012 to: 27/06/2012, 280-290.
10.1109/CSF.2012.18
Malacaria P(2011). Algebraic Foundations for Information Theoretical, Probabilistic and Guessability measures of Information Flow. CoRR vol. abs/1101.3453,
http://qmro.qmul.ac.uk/xmlui/handle/123456789/13605
Malacaria P(2010). Program Analysis Probably Counts: Discussant Contribution for the Computer Journal Lecture by Chris Hankin. COMPUT J vol. 53, (6) 881-881.
10.1093/comjnl/bxp037
Malacaria P(2010). Risk assessment of security threats for looping constructs. Journal of Computer Security vol. 18, 191-228.
10.3233/JCS-2010-0360
Heusser J, Malacaria P (2010). Applied Quantitative Information Flow and Statistical Databases. FORMAL ASPECTS IN SECURITY AND TRUST. Editors: Degano, P, Guttman, JD, vol. 5983, 96-110.
10.1007/978-3-642-12459-4_8
Malacaria P, Heusser J (2010). Information Theory and Security: Quantitative Information Flow. FORMAL METHODS FOR QUANTITATIVE ASPECTS OF PROGRAMMING LANGUAGES. Editors: Aldini, A, Bernardo, M, Di Pierro, A, Wiklicky, H et al., vol. 6154, 87-134.
10.1007/978-3-642-13678-8_3
Heusser J, Malacaria P(2010). Quantifying Information Leak Vulnerabilities. CoRR vol. abs/1007.0918,
Heusser J, MALACARIA P (2010). Quantifying information leaks in software. ACM 2010. Conference: Twenty-Sixth Annual Computer Security Applications Conference, ACSAC 2010 (Austin Texas) from: 06/12/2010 to: 10/12/2010, 261-269.
10.1145/1920261.1920300
Malacaria P (2010). Quantitative Information Flow: From Theory to Practice?. COMPUTER AIDED VERIFICATION, PROCEEDINGS. Editors: Touili, T, Cook, B, Jackson, P, vol. 6174, 20-22.
10.1007/978-3-642-14295-6_3
Chen H, Malacaria P (2010). The Optimum Leakage Principle for Analyzing Multi-threaded Programs. INFORMATION THEORETIC SECURITY. Editors: Kurosawa, K, vol. 5973, 177-193.
10.1007/978-3-642-14496-7_15
Chen H, Malacaria P(2009). Studying Maximum Information Leakage Using Karush-Kuhn-Tucker Conditions. Electronic Proceedings in Theoretical Computer Science vol. 7, 1-15.
10.4204/EPTCS.7.1
http://qmro.qmul.ac.uk/xmlui/handle/123456789/13606
Malacaria P, Smeraldi F (2009). On Adaboost and optimal betting strategies. Proceedings of the 5th International Conference on Data Mining (DMIN/WORLDCOMP). 326–332-326–332.
MALACARIA P, SMERALDI F (2009). On Adaboost and Optimal Betting Strategies. Conference: WORLDCOMP: The 2009 International Conference on Data Mining, DMIN 2009 (Las Vegas) from: 13/07/2009 to: 16/07/2009, 326-332.
CHEN H, MALACARIA P (2009). Quantifying maximal loss of anonymity in protocols. Conference: Proceedings of the 2009 ACM Symposium on Information, Computer and Communications Security, ASIACCS 2009 (Sydney, Australia) from: 03/2010 to: 03/2012, 206-217.
10.1145/1533057.1533087
Malacaria P, Chen H (2008). Lagrange Multipliers and Maximum Information Leakage in Different Observational Models. PLAS'08: PROCEEDINGS OF THE ACM SIGPLAN THIRD WORKSHOP ON PROGRAMMING LANGUAGES AND ANALYSIS FOR SECURITY. 135-146.
10.1145/1375696.1375713
MALACARIA P, Hunt S, Clark D(2007). A static analysis for quantifying the information flow in a simple imperative language. Journal of Computer Security vol. 15, (3) 321-371.
10.3233/JCS-2007-15302
Malacaria P (2007). Assessing Security Threats of Looping Constructs. CONFERENCE RECORD OF POPL 2007: THE 34TH ACM SIGPLAN SIGACT SYMPOSIUM ON PRINCIPLES OF PROGAMMING LANGUAGES. 225-235.
Malacaria P (2007). Assessing security threats of looping constructs. ACM SIGPLAN NOTICES. vol. 42, 225-235.
10.1145/1190216.1190251
Chen H, Malacaria P (2007). Quantitative Analysis of Leakage for Multi-threaded Programs. PLAS'07: PROCEEDINGS OF THE 2007 ACM SIGPLAN WORKSHOP ON PROGRAMMING LANGUAGES AND ANALYSIS FOR SECURITY. 31-40.
10.1145/1255329.1255335
Clark D, Hunt S, Malacaria P(2005). Quantitative information flow, relations and polymorphic types. J LOGIC COMPUT vol. 15, (2) 181-199.
10.1093/logcom/exi009
Clark D, Hunt S, Malacaria P(2005). Quantified Interference for a while Language. Electronic Notes in Theoretical Computer Science vol. 112, (SPEC. ISS.) 149-166.
10.1016/j.entcs.2004.01.018
Bucciarelli A, Malacaria P(2002). Relative definability of boolean functions via hypergraphs. THEOR COMPUT SCI vol. 278, (1-2) 91-110.
10.1016/S0304-3975(00)00332-7
MALACARIA P, Clark D, Hunt S(2002). Quantitative Analysis of the Leakage of Confidential Data. Electronic Notes in Theoretical Computer Science vol. 59, (3)
10.1016/S1571-0661(04)00290-7
Abramsky S, Jagadeesan R, Malacaria P(2000). Full abstraction for PCF. INFORM COMPUT vol. 163, (2) 409-470.
10.1006/inco.2000.2930
http://qmro.qmul.ac.uk/xmlui/handle/123456789/13604
Return to top