Menu
 
Research menu
Jump to menu

Publications:  Prof Pasquale Malacaria

Americo A, Khouzani M, Malacaria P(2020). Conditional Entropy and Data Processing: an Axiomatic Approach Based on Core-Concavity. IEEE Transactions on Information Theory1-1.
10.1109/tit.2020.2987713
https://qmro.qmul.ac.uk/xmlui/handle/123456789/65218
Americo A, Malacaria P, Khouzani MHR (2019). Channel Ordering and Supermodularity. 2019 IEEE Information Theory Workshop, ITW 2019.
10.1109/ITW44776.2019.8989409
https://qmro.qmul.ac.uk/xmlui/handle/123456789/59171
Americo A, Khouzani MHR, Malacaria P(2019). Deterministic channel design for minimum leakage. Proceedings - IEEE Computer Security Foundations Symposium vol. 2019-June, 428-441.
10.1109/CSF.2019.00036
https://qmro.qmul.ac.uk/xmlui/handle/123456789/59173
Sharma A, Malacaria P, Khouzani MHR (2019). Malware detection using 1-dimensional convolutional neural networks. Proceedings - 4th IEEE European Symposium on Security and Privacy Workshops, EUROS and PW 2019. 247-256.
10.1109/EuroSPW.2019.00034
https://qmro.qmul.ac.uk/xmlui/handle/123456789/59174
Khouzani MHR, Liu Z, Malacaria P(2019). Scalable min-max multi-objective cyber-security optimisation over probabilistic attack graphs. European Journal of Operational Research
10.1016/j.ejor.2019.04.035
https://qmro.qmul.ac.uk/xmlui/handle/123456789/57877
Américo A, Khouzani MHR, Malacaria P(2019). Core-concavity, Gain Functions and Axioms for Information Leakage. Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), vol. 11760 LNCS,
Khouzani MHR, Malacaria P(2019). Generalized Entropies and Metric-Invariant Optimal Countermeasures for Information Leakage Under Symmetric Constraints. IEEE Trans. Inf. Theory vol. 65, Article 2, 888-901.
De Bernardi M, Khouzani MHR, Malacaria P(2019). Pseudo-Random Number Generation Using Generative Adversarial Networks. Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) vol. 11329 LNAI, 191-200.
10.1007/978-3-030-13453-2_15
https://qmro.qmul.ac.uk/xmlui/handle/123456789/53439
MALACARIA P, KHOUZANI MHR(2018). Generalised Entropies and Metric-Invariant Optimal Countermeasures for Information Leakage under Symmetric Constraints. IEEE Transactions on Information Theory
10.1109/TIT.2018.2883705
https://qmro.qmul.ac.uk/xmlui/handle/123456789/54950
Khouzani MHR, Malacaria P(2018). Information theory in game theory. Entropy vol. 20, (11)
10.3390/e20110817
https://qmro.qmul.ac.uk/xmlui/handle/123456789/54685
Khouzani MHR, Malacaria P(2018). Optimal channel design: A game theoretical analysis. Entropy vol. 20, (9)
10.3390/e20090675
https://qmro.qmul.ac.uk/xmlui/handle/123456789/48263
Malacaria P, Khouzani M, Pasareanu CS, Phan QS, Luckow K (2018). Symbolic side-channel analysis for probabilistic programs. Proceedings - IEEE Computer Security Foundations Symposium. Conference: 2018 IEEE Computer Security Foundations Symposium. vol. 2018-July, 313-327.
10.1109/CSF.2018.00030
https://qmro.qmul.ac.uk/xmlui/handle/123456789/38004
Malacaria P, Khouzani MHR, Pasareanu CS, Phan Q-S, Luckow KS(2018). Symbolic Side-Channel Analysis for Probabilistic Programs. IACR Cryptol. ePrint Arch. vol. 2018, 329-329.
Khouzani M, Malacaria P (2017). Leakage-Minimal Design: Universality, Limitations, and Applications. Proceedings - IEEE Computer Security Foundations Symposium. 305-317.
10.1109/CSF.2017.40
https://qmro.qmul.ac.uk/xmlui/handle/123456789/24948
MALACARIA P, Phan Q-S, Pasareanu C, Bang L, Bultan T (2017). Synthesis of Adaptive Side-Channel Attacks. Conference: 2017 IEEE Computer Security Foundations Symposium (CSF) (Santa Barbara (California)) from: 21/08/2017 to: 25/08/2017,
10.1109/CSF.2017.8
https://qmro.qmul.ac.uk/xmlui/handle/123456789/23889
Phan Q-S, Bang L, Pasareanu CS, Malacaria P, Bultan T(2017). Synthesis of Adaptive Side-Channel Attacks. IACR Cryptology ePrint Archive vol. 2017, 401-401.
https://qmro.qmul.ac.uk/xmlui/handle/123456789/57876
MALACARIA P, TAUTCHNING M, DISTEFANO D (2016). Information leakage analysis of complex C code and its application to OpenSSL. Conference: 7th International Symposium on Leveraging Applications (CORFU) from: 10/10/2016 to: 14/10/2016,
10.1007/978-3-319-47166-2_63
https://qmro.qmul.ac.uk/xmlui/handle/123456789/13880
KHOUZANI MHR, MALACARIA P, HANKIN C, FIELDER A, SMERALDI F (2016). Efficient Numerical Frameworks for Multi-Objective Cyber Security Planning. Conference: European Symposium on Research in Computer Security (ESORICS) 2016 (Heraklion, Crete, Greece) from: 26/09/2016 to: 30/09/2016,
10.1007/978-3-319-45741-3_10
https://qmro.qmul.ac.uk/xmlui/handle/123456789/13487
P¿s¿reanu CS, Phan QS, Malacaria P (2016). Multi-run side-channel analysis using symbolic execution and Max-SMT. Proceedings - IEEE Computer Security Foundations Symposium. vol. 2016-August, 387-400.
10.1109/CSF.2016.34
https://qmro.qmul.ac.uk/xmlui/handle/123456789/12478
Khouzani MHR, Malacaria P (2016). Relative perfect secrecy: Universally optimal strategies and channel design. Proceedings - IEEE Computer Security Foundations Symposium. vol. 2016-August, 61-76.
10.1109/CSF.2016.12
https://qmro.qmul.ac.uk/xmlui/handle/123456789/12477
Fielder A, Panaousis E, Malacaria P, Hankin C, Smeraldi F(2016). Decision support approaches for cyber security investment. Decision Support Systems vol. 86, Article C, 13-23.
10.1016/j.dss.2016.02.012
https://qmro.qmul.ac.uk/xmlui/handle/123456789/12356
Phan Q-S, Malacaria P (2015). All-Solution Satisfiability Modulo Theories: Applications, Algorithms and Benchmarks. Availability, Reliability and Security (ARES), 2015 10th International Conference on. 100-109.
10.1109/ARES.2015.14
https://qmro.qmul.ac.uk/xmlui/handle/123456789/10997
Phan Q-S, Malacaria P, Pasareanu CS(2015). Concurrent Bounded Model Checking. SIGSOFT Softw. Eng. Notes vol. 40, Article 1, 1-5.
10.1145/2693208.2693240
https://qmro.qmul.ac.uk/xmlui/handle/123456789/6899
Rontidis G, Panaousis E, Laszka A, Dagiuklas T, Malacaria P, Alpcan T (2015). A game-theoretic approach for minimizing security risks in the Internet-of-Things. 2015 IEEE International Conference on Communication Workshop, ICCW 2015. 2639-2644.
10.1109/ICCW.2015.7247577
Malacaria P(2015). Algebraic foundations for quantitative information flow. Mathematical Structures in Computer Science vol. 25, (2) 404-428.
10.1017/S0960129513000649
Fielder A, Panaousis EA, Malacaria P, Hankin C, Smeraldi F(2015). Comparing Decision Support Approaches for Cyber Security Investment. CoRR vol. abs/1502.05532,
https://qmro.qmul.ac.uk/xmlui/handle/123456789/12516
Biondi F, Legay A, Malacaria P, Wasowski A(2015). Quantifying information leakage of randomized protocols. Theoretical Computer Science vol. 597, 62-87.
10.1016/j.tcs.2015.07.034
Biondi F, Legay A, Malacaria P, Wasowski A(2014). Quantifying information leakage of randomized protocols. Theoretical Computer Science
10.1016/j.tcs.2015.07.034
Phan Q-S, Malacaria P (2014). Abstract Model Counting: A Novel Approach for Quantification of Information Leaks. Proceedings of the 9th ACM Symposium on Information, Computer and Communications Security. Conference: ASIA CCS '14 Proceedings of the 9th ACM symposium on Information, computer and communications security (Kyoto, Japan) from: 04/06/2014 to: 06/06/2014, 283-292.
10.1145/2590296.2590328
https://qmro.qmul.ac.uk/xmlui/handle/123456789/6120
Panaousis E, Fielder A, Malacaria P, Hankin C, Smeraldi F (2014). Cybersecurity games and investments: A decision support approach. Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). vol. 8840, 266-286.
10.1007/978-3-319-12601-2_15
Fielder A, Panaousis E, Malacaria P, Hankin C, Smeraldi F (2014). Game Theory Meets Information Security Management. 15-29.
10.1007/978-3-642-55415-5_2
Fielder A, Panaousis E, Malacaria P, Hankin C, Smeraldi F (2014). Game theory meets information security management. IFIP Advances in Information and Communication Technology. vol. 428, 15-29.
10.1007/978-3-642-55415-5_2
https://qmro.qmul.ac.uk/xmlui/handle/123456789/31355
Smeraldi F, Malacaria P(2014). How to spend it: Optimal investment for cyber security. ACM International Conference Proceeding Series
10.1145/2602945.2602952
Biondi F, Legay A, Nielsen BF, Malacaria P, W¿sowski A (2014). Information leakage of non-terminating processes. Leibniz International Proceedings in Informatics, LIPIcs. vol. 29, 517-529.
10.4230/LIPIcs.FSTTCS.2014.517
Phan Q-S, Malacaria P, Pasareanu CS, d Amorim M (2014). Quantifying Information Leaks Using Reliability Analysis. Proceedings of the 2014 International SPIN Symposium on Model Checking of Software. Conference: SPIN 2014 Proceedings of the 2014 International SPIN Symposium on Model Checking of Software (San Jose, CA. USA) from: 21/07/2014 to: 22/07/2014, 105-108.
10.1145/2632362.2632367
https://qmro.qmul.ac.uk/xmlui/handle/123456789/6119
Huang X, Malacaria P(2013). SideAuto: Quantitative information flow for side-channel leakage in web applications. Proceedings of the ACM Conference on Computer and Communications Security285-290.
10.1145/2517840.2517869
MALACARIA P, SMERALDI F(2013). Thermodynamic Aspects of Confidentiality. Information and Computation vol. 226, 76-93.
10.1016/j.ic.2013.03.006
Hankin C, Malacaria P (2013). Payoffs, Intensionality and Abstraction in Games. Computation, Logic, Games, and Quantum Foundations. Editors: Coecke, B, Ong, L, Panangaden, P, vol. 7860, 69-82.
10.1007/978-3-642-38164-5_6
Biondi F, Legay A, MALACARIA P, Wasowski A (2013). Quantifying Information Leakage of Randomized Protocols. Lecture Notes in Computer Science. Editors: Giacobazzi, R, Berdine, J, Mastroeni, I, Conference: 14th International Conference on Verification, Model Checking, and Abstract Interpretation (VMCAI) (Rome) from: 20/01/2013 to: 22/01/2013, vol. 7737, 68-87.
10.1007/978-3-642-35873-9_7
Malacaria P, Smeraldi F(2012). The thermodynamics of confidentiality. Proceedings of the Computer Security Foundations Workshop280-290.
10.1109/CSF.2012.18
Köpf B, Malacaria P, Palamidessi C(2012). Quantitative Security Analysis (Dagstuhl Seminar 12481). Dagstuhl Reports vol. 2, Article 11, 135-154.
Phan Q-S, Malacaria P, Tkachuk O, Pasareanu CS(2012). Symbolic quantitative information flow. ACM SIGSOFT Softw. Eng. Notes vol. 37, Article 6, 1-5.
10.1145/2382756.2382791
https://qmro.qmul.ac.uk/xmlui/handle/123456789/6239
MALACARIA P, SMERALDI F (2012). The Thermodynamics of Confidentiality. Computer Security Foundations Symposium (CSF), 2012 IEEE 25th. Editors: Cortier, V, Zdancewic, S, Conference: 25th IEEE Computer Security Foundations Symposium (Harvard, MA, USA) from: 25/06/2012 to: 27/06/2012, 280-290.
10.1109/CSF.2012.18
Malacaria P(2011). Algebraic Foundations for Information Theoretical, Probabilistic and Guessability measures of Information Flow. CoRR vol. abs/1101.3453,
https://qmro.qmul.ac.uk/xmlui/handle/123456789/13605
Malacaria P(2010). Program Analysis Probably Counts: Discussant Contribution for the Computer Journal Lecture by Chris Hankin. COMPUT J vol. 53, (6) 881-881.
10.1093/comjnl/bxp037
Malacaria P(2010). Risk assessment of security threats for looping constructs. Journal of Computer Security vol. 18, 191-228.
10.3233/JCS-2010-0360
Heusser J, Malacaria P (2010). Applied Quantitative Information Flow and Statistical Databases. FORMAL ASPECTS IN SECURITY AND TRUST. Editors: Degano, P, Guttman, JD, vol. 5983, 96-110.
10.1007/978-3-642-12459-4_8
Malacaria P, Heusser J (2010). Information Theory and Security: Quantitative Information Flow. FORMAL METHODS FOR QUANTITATIVE ASPECTS OF PROGRAMMING LANGUAGES. Editors: Aldini, A, Bernardo, M, Di Pierro, A, Wiklicky, H et al., vol. 6154, 87-134.
10.1007/978-3-642-13678-8_3
Heusser J, Malacaria P(2010). Quantifying Information Leak Vulnerabilities. CoRR vol. abs/1007.0918,
Heusser J, MALACARIA P (2010). Quantifying information leaks in software. ACM 2010. Conference: Twenty-Sixth Annual Computer Security Applications Conference, ACSAC 2010 (Austin Texas) from: 06/12/2010 to: 10/12/2010, 261-269.
10.1145/1920261.1920300
Malacaria P (2010). Quantitative Information Flow: From Theory to Practice?. COMPUTER AIDED VERIFICATION, PROCEEDINGS. Editors: Touili, T, Cook, B, Jackson, P, vol. 6174, 20-22.
10.1007/978-3-642-14295-6_3
Chen H, Malacaria P (2010). The Optimum Leakage Principle for Analyzing Multi-threaded Programs. INFORMATION THEORETIC SECURITY. Editors: Kurosawa, K, vol. 5973, 177-193.
10.1007/978-3-642-14496-7_15
Chen H, Malacaria P(2009). Studying maximum information leakage using Karush-Kuhn-Tucker conditions. Electronic Proceedings in Theoretical Computer Science, EPTCS vol. 7, 1-15.
10.4204/EPTCS.7.1
https://qmro.qmul.ac.uk/xmlui/handle/123456789/13606
Malacaria P, Smeraldi F (2009). On Adaboost and optimal betting strategies. Proceedings of the 5th International Conference on Data Mining (DMIN/WORLDCOMP). 326–332-326–332.
MALACARIA P, SMERALDI F (2009). On Adaboost and Optimal Betting Strategies. Conference: WORLDCOMP: The 2009 International Conference on Data Mining, DMIN 2009 (Las Vegas) from: 13/07/2009 to: 16/07/2009, 326-332.
CHEN H, MALACARIA P (2009). Quantifying maximal loss of anonymity in protocols. Conference: Proceedings of the 2009 ACM Symposium on Information, Computer and Communications Security, ASIACCS 2009 (Sydney, Australia) from: 03/2010 to: 03/2012, 206-217.
10.1145/1533057.1533087
Malacaria P, Chen H (2008). Lagrange Multipliers and Maximum Information Leakage in Different Observational Models. PLAS'08: PROCEEDINGS OF THE ACM SIGPLAN THIRD WORKSHOP ON PROGRAMMING LANGUAGES AND ANALYSIS FOR SECURITY. 135-146.
10.1145/1375696.1375713
MALACARIA P, Hunt S, Clark D(2007). A static analysis for quantifying the information flow in a simple imperative language. Journal of Computer Security vol. 15, (3) 321-371.
10.3233/JCS-2007-15302
Malacaria P (2007). Assessing Security Threats of Looping Constructs. CONFERENCE RECORD OF POPL 2007: THE 34TH ACM SIGPLAN SIGACT SYMPOSIUM ON PRINCIPLES OF PROGAMMING LANGUAGES. 225-235.
10.1145/1190215.1190251
Malacaria P (2007). Assessing security threats of looping constructs. ACM SIGPLAN NOTICES. vol. 42, 225-235.
10.1145/1190216.1190251
Chen H, Malacaria P (2007). Quantitative Analysis of Leakage for Multi-threaded Programs. PLAS'07: PROCEEDINGS OF THE 2007 ACM SIGPLAN WORKSHOP ON PROGRAMMING LANGUAGES AND ANALYSIS FOR SECURITY. 31-40.
10.1145/1255329.1255335
Clark D, Hunt S, Malacaria P(2005). Quantitative information flow, relations and polymorphic types. J LOGIC COMPUT vol. 15, (2) 181-199.
10.1093/logcom/exi009
Clark D, Hunt S, Malacaria P(2005). Quantified Interference for a while Language. Electronic Notes in Theoretical Computer Science vol. 112, (SPEC. ISS.) 149-166.
10.1016/j.entcs.2004.01.018
Bucciarelli A, Malacaria P(2002). Relative definability of boolean functions via hypergraphs. THEOR COMPUT SCI vol. 278, (1-2) 91-110.
10.1016/S0304-3975(00)00332-7
MALACARIA P, Clark D, Hunt S(2002). Quantitative Analysis of the Leakage of Confidential Data. Electronic Notes in Theoretical Computer Science vol. 59, (3)
10.1016/S1571-0661(04)00290-7
Abramsky S, Jagadeesan R, Malacaria P(2000). Full abstraction for PCF. INFORM COMPUT vol. 163, (2) 409-470.
10.1006/inco.2000.2930
https://qmro.qmul.ac.uk/xmlui/handle/123456789/13604
Return to top