Publications: Prof Pasquale Malacaria
Americo A, Khouzani M, Malacaria P(2020).
Conditional Entropy and Data Processing: an Axiomatic Approach Based on Core-Concavity. IEEE Transactions on Information Theory1-1.
Americo A, Malacaria P, Khouzani MHR (2019).
Channel Ordering and Supermodularity. 2019 IEEE Information Theory Workshop, ITW 2019.
Americo A, Khouzani MHR, Malacaria P(2019).
Deterministic channel design for minimum leakage. Proceedings - IEEE Computer Security Foundations Symposium
vol. 2019-June,
428-441.
Sharma A, Malacaria P, Khouzani MHR (2019).
Malware detection using 1-dimensional convolutional neural networks. Proceedings - 4th IEEE European Symposium on Security and Privacy Workshops, EUROS and PW 2019.
247-256.
Khouzani MHR, Liu Z, Malacaria P(2019).
Scalable min-max multi-objective cyber-security optimisation over probabilistic attack graphs. European Journal of Operational Research
Américo A, Khouzani MHR, Malacaria P(2019).
Core-concavity, Gain Functions and Axioms for Information Leakage. Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics),
vol. 11760 LNCS,
Khouzani MHR, Malacaria P(2019).
Generalized Entropies and Metric-Invariant Optimal Countermeasures for Information Leakage Under Symmetric Constraints. IEEE Trans. Inf. Theory
vol. 65,
Article 2,
888-901.
De Bernardi M, Khouzani MHR, Malacaria P(2019).
Pseudo-Random Number Generation Using Generative Adversarial Networks. Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
vol. 11329 LNAI,
191-200.
MALACARIA P, KHOUZANI MHR(2018).
Generalised Entropies and Metric-Invariant Optimal Countermeasures for Information Leakage under Symmetric Constraints. IEEE Transactions on Information Theory
Khouzani MHR, Malacaria P(2018).
Information theory in game theory. Entropy
vol. 20,
(11)
Khouzani MHR, Malacaria P(2018).
Optimal channel design: A game theoretical analysis. Entropy
vol. 20,
(9)
Malacaria P, Khouzani M, Pasareanu CS, Phan QS, Luckow K (2018).
Symbolic side-channel analysis for probabilistic programs. Proceedings - IEEE Computer Security Foundations Symposium.
Conference: 2018 IEEE Computer Security Foundations Symposium.
vol. 2018-July,
313-327.
Malacaria P, Khouzani MHR, Pasareanu CS, Phan Q-S, Luckow KS(2018).
Symbolic Side-Channel Analysis for Probabilistic Programs. IACR Cryptol. ePrint Arch.
vol. 2018,
329-329.
Khouzani M, Malacaria P (2017).
Leakage-Minimal Design: Universality, Limitations, and Applications. Proceedings - IEEE Computer Security Foundations Symposium.
305-317.
MALACARIA P, Phan Q-S, Pasareanu C, Bang L, Bultan T (2017).
Synthesis of Adaptive Side-Channel Attacks.
Conference: 2017 IEEE Computer Security Foundations Symposium (CSF)
(Santa Barbara (California))
from: 21/08/2017
to: 25/08/2017,
Phan Q-S, Bang L, Pasareanu CS, Malacaria P, Bultan T(2017).
Synthesis of Adaptive Side-Channel Attacks. IACR Cryptology ePrint Archive
vol. 2017,
401-401.
MALACARIA P, TAUTCHNING M, DISTEFANO D (2016).
Information leakage analysis of complex C code and its application to OpenSSL.
Conference: 7th International Symposium on Leveraging Applications
(CORFU)
from: 10/10/2016
to: 14/10/2016,
KHOUZANI MHR, MALACARIA P, HANKIN C, FIELDER A, SMERALDI F (2016).
Efficient Numerical Frameworks for Multi-Objective Cyber Security Planning.
Conference: European Symposium on Research in Computer Security (ESORICS) 2016
(Heraklion, Crete, Greece)
from: 26/09/2016
to: 30/09/2016,
P¿s¿reanu CS, Phan QS, Malacaria P (2016).
Multi-run side-channel analysis using symbolic execution and Max-SMT. Proceedings - IEEE Computer Security Foundations Symposium.
vol. 2016-August,
387-400.
Khouzani MHR, Malacaria P (2016).
Relative perfect secrecy: Universally optimal strategies and channel design. Proceedings - IEEE Computer Security Foundations Symposium.
vol. 2016-August,
61-76.
Fielder A, Panaousis E, Malacaria P, Hankin C, Smeraldi F(2016).
Decision support approaches for cyber security investment. Decision Support Systems
vol. 86,
Article C,
13-23.
Phan Q-S, Malacaria P (2015).
All-Solution Satisfiability Modulo Theories: Applications, Algorithms and Benchmarks. Availability, Reliability and Security (ARES), 2015 10th International Conference on.
100-109.
Phan Q-S, Malacaria P, Pasareanu CS(2015).
Concurrent Bounded Model Checking. SIGSOFT Softw. Eng. Notes
vol. 40,
Article 1,
1-5.
Rontidis G, Panaousis E, Laszka A, Dagiuklas T, Malacaria P, Alpcan T (2015).
A game-theoretic approach for minimizing security risks in the Internet-of-Things. 2015 IEEE International Conference on Communication Workshop, ICCW 2015.
2639-2644.
Malacaria P(2015).
Algebraic foundations for quantitative information flow. Mathematical Structures in Computer Science
vol. 25,
(2)
404-428.
Fielder A, Panaousis EA, Malacaria P, Hankin C, Smeraldi F(2015).
Comparing Decision Support Approaches for Cyber Security Investment. CoRR
vol. abs/1502.05532,
Biondi F, Legay A, Malacaria P, Wasowski A(2015).
Quantifying information leakage of randomized protocols. Theoretical Computer Science
vol. 597,
62-87.
Biondi F, Legay A, Malacaria P, Wasowski A(2014).
Quantifying information leakage of randomized protocols. Theoretical Computer Science
Phan Q-S, Malacaria P (2014).
Abstract Model Counting: A Novel Approach for Quantification of Information Leaks. Proceedings of the 9th ACM Symposium on Information, Computer and Communications Security.
Conference: ASIA CCS '14 Proceedings of the 9th ACM symposium on Information, computer and communications security
(Kyoto, Japan)
from: 04/06/2014
to: 06/06/2014,
283-292.
Panaousis E, Fielder A, Malacaria P, Hankin C, Smeraldi F (2014).
Cybersecurity games and investments: A decision support approach. Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics).
vol. 8840,
266-286.
Fielder A, Panaousis E, Malacaria P, Hankin C, Smeraldi F (2014).
Game Theory Meets Information Security Management. 15-29.
Fielder A, Panaousis E, Malacaria P, Hankin C, Smeraldi F (2014).
Game theory meets information security management. IFIP Advances in Information and Communication Technology.
vol. 428,
15-29.
Smeraldi F, Malacaria P(2014).
How to spend it: Optimal investment for cyber security. ACM International Conference Proceeding Series
Biondi F, Legay A, Nielsen BF, Malacaria P, W¿sowski A (2014).
Information leakage of non-terminating processes. Leibniz International Proceedings in Informatics, LIPIcs.
vol. 29,
517-529.
Phan Q-S, Malacaria P, Pasareanu CS, d Amorim M (2014).
Quantifying Information Leaks Using Reliability Analysis. Proceedings of the 2014 International SPIN Symposium on Model Checking of Software.
Conference: SPIN 2014 Proceedings of the 2014 International SPIN Symposium on Model Checking of Software
(San Jose, CA. USA)
from: 21/07/2014
to: 22/07/2014,
105-108.
Huang X, Malacaria P(2013).
SideAuto: Quantitative information flow for side-channel leakage in web applications. Proceedings of the ACM Conference on Computer and Communications Security285-290.
MALACARIA P, SMERALDI F(2013).
Thermodynamic Aspects of Confidentiality. Information and Computation
vol. 226,
76-93.
Hankin C, Malacaria P (2013).
Payoffs, Intensionality and Abstraction in Games. Computation, Logic, Games, and Quantum Foundations.
Editors: Coecke, B, Ong, L, Panangaden, P,
vol. 7860,
69-82.
Biondi F, Legay A, MALACARIA P, Wasowski A (2013).
Quantifying Information Leakage of Randomized Protocols. Lecture Notes in Computer Science.
Editors: Giacobazzi, R, Berdine, J, Mastroeni, I,
Conference: 14th International Conference on Verification, Model Checking, and Abstract Interpretation (VMCAI)
(Rome)
from: 20/01/2013
to: 22/01/2013,
vol. 7737,
68-87.
Malacaria P, Smeraldi F(2012).
The thermodynamics of confidentiality. Proceedings of the Computer Security Foundations Workshop280-290.
Köpf B, Malacaria P, Palamidessi C(2012).
Quantitative Security Analysis (Dagstuhl Seminar 12481). Dagstuhl Reports
vol. 2,
Article 11,
135-154.
Phan Q-S, Malacaria P, Tkachuk O, Pasareanu CS(2012).
Symbolic quantitative information flow. ACM SIGSOFT Softw. Eng. Notes
vol. 37,
Article 6,
1-5.
MALACARIA P, SMERALDI F (2012).
The Thermodynamics of Confidentiality. Computer Security Foundations Symposium (CSF), 2012 IEEE 25th.
Editors: Cortier, V, Zdancewic, S,
Conference: 25th IEEE Computer Security Foundations Symposium
(Harvard, MA, USA)
from: 25/06/2012
to: 27/06/2012,
280-290.
Malacaria P(2011).
Algebraic Foundations for Information Theoretical, Probabilistic and Guessability measures of Information Flow. CoRR
vol. abs/1101.3453,
Malacaria P(2010).
Program Analysis Probably Counts: Discussant Contribution for the Computer Journal Lecture by Chris Hankin. COMPUT J
vol. 53,
(6)
881-881.
Malacaria P(2010).
Risk assessment of security threats for looping constructs. Journal of Computer Security
vol. 18,
191-228.
Heusser J, Malacaria P (2010).
Applied Quantitative Information Flow and Statistical Databases. FORMAL ASPECTS IN SECURITY AND TRUST.
Editors: Degano, P, Guttman, JD,
vol. 5983,
96-110.
Malacaria P, Heusser J (2010).
Information Theory and Security: Quantitative Information Flow. FORMAL METHODS FOR QUANTITATIVE ASPECTS OF PROGRAMMING LANGUAGES.
Editors: Aldini, A, Bernardo, M, Di Pierro, A, Wiklicky, H et al.,
vol. 6154,
87-134.
Heusser J, Malacaria P(2010).
Quantifying Information Leak Vulnerabilities. CoRR
vol. abs/1007.0918,
Heusser J, MALACARIA P (2010).
Quantifying information leaks in software. ACM 2010.
Conference: Twenty-Sixth Annual Computer Security Applications Conference, ACSAC 2010
(Austin Texas)
from: 06/12/2010
to: 10/12/2010,
261-269.
Malacaria P (2010).
Quantitative Information Flow: From Theory to Practice?. COMPUTER AIDED VERIFICATION, PROCEEDINGS.
Editors: Touili, T, Cook, B, Jackson, P,
vol. 6174,
20-22.
Chen H, Malacaria P (2010).
The Optimum Leakage Principle for Analyzing Multi-threaded Programs. INFORMATION THEORETIC SECURITY.
Editors: Kurosawa, K,
vol. 5973,
177-193.
Chen H, Malacaria P(2009).
Studying maximum information leakage using Karush-Kuhn-Tucker conditions. Electronic Proceedings in Theoretical Computer Science, EPTCS
vol. 7,
1-15.
Malacaria P, Smeraldi F (2009).
On Adaboost and optimal betting strategies. Proceedings of the 5th International Conference on Data Mining (DMIN/WORLDCOMP).
326–332-326–332.
MALACARIA P, SMERALDI F (2009).
On Adaboost and Optimal Betting Strategies.
Conference: WORLDCOMP: The 2009 International Conference on Data Mining, DMIN 2009
(Las Vegas)
from: 13/07/2009
to: 16/07/2009,
326-332.
CHEN H, MALACARIA P (2009).
Quantifying maximal loss of anonymity in protocols.
Conference: Proceedings of the 2009 ACM Symposium on Information, Computer and Communications Security, ASIACCS 2009
(Sydney, Australia)
from: 03/2010
to: 03/2012,
206-217.
Malacaria P, Chen H (2008).
Lagrange Multipliers and Maximum Information Leakage in Different Observational Models. PLAS'08: PROCEEDINGS OF THE ACM SIGPLAN THIRD WORKSHOP ON PROGRAMMING LANGUAGES AND ANALYSIS FOR SECURITY.
135-146.
MALACARIA P, Hunt S, Clark D(2007).
A static analysis for quantifying the information flow in a simple imperative language. Journal of Computer Security
vol. 15,
(3)
321-371.
Malacaria P (2007).
Assessing Security Threats of Looping Constructs. CONFERENCE RECORD OF POPL 2007: THE 34TH ACM SIGPLAN SIGACT SYMPOSIUM ON PRINCIPLES OF PROGAMMING LANGUAGES.
225-235.
Malacaria P (2007).
Assessing security threats of looping constructs. ACM SIGPLAN NOTICES.
vol. 42,
225-235.
Chen H, Malacaria P (2007).
Quantitative Analysis of Leakage for Multi-threaded Programs. PLAS'07: PROCEEDINGS OF THE 2007 ACM SIGPLAN WORKSHOP ON PROGRAMMING LANGUAGES AND ANALYSIS FOR SECURITY.
31-40.
Clark D, Hunt S, Malacaria P(2005).
Quantitative information flow, relations and polymorphic types. J LOGIC COMPUT
vol. 15,
(2)
181-199.
Clark D, Hunt S, Malacaria P(2005).
Quantified Interference for a while Language. Electronic Notes in Theoretical Computer Science
vol. 112,
(SPEC. ISS.)
149-166.
Bucciarelli A, Malacaria P(2002).
Relative definability of boolean functions via hypergraphs. THEOR COMPUT SCI
vol. 278,
(1-2)
91-110.
MALACARIA P, Clark D, Hunt S(2002).
Quantitative Analysis of the Leakage of Confidential Data. Electronic Notes in Theoretical Computer Science
vol. 59,
(3)
Abramsky S, Jagadeesan R, Malacaria P(2000).
Full abstraction for PCF. INFORM COMPUT
vol. 163,
(2)
409-470.