Publications: Prof Pasquale Malacaria
Sönmez FÖ, Hankin C, Malacaria P
(
2024
)
.
Smart topology detection using multi-armed bandit reinforcement learning method
.
Information Security Journal A Global Perspective
vol.
ahead-of-print
,
(
ahead-of-print
)
1
-
26
.
Zhang Y, Malacaria P
(
2024
)
.
Dealing with uncertainty in cybersecurity decision support
.
Computers & Security
vol.
148
,
104153
-
104153
.
Malacaria P, Zhang Y
(
2023
)
.
Keep spending: Beyond optimal cyber-security investment
.
Conference:
2023 IEEE Computer Security Foundations Symposium
Zhang Y, Malacaria P, Loukas G, Panaousis E
(
2023
)
.
CROSS: A Framework for Cyber Risk Optimisation in Smart Homes
.
Computers and Security103250
-
103250
.
zdemir S.nmez F, Hankin C, Malacaria P
(
2022
)
.
Attack Dynamics: An Automatic Attack Graph Generation Framework Based on System Topology, CAPEC, CWE, and CVE Databases
.
Computers and Security
vol.
123
,
Sönmez FÖ, Hankin C, Malacaria P
(
2022
)
.
Decision support for healthcare cyber security
.
Computers and Security
vol.
122
,
102865
-
102865
.
Buczkowski P, Malacaria P, Hankin C, Fielder A
(
2022
)
.
Optimal Security Hardening over a Probabilistic Attack Graph
.
Conference:
Proceedings of the 2022 ACM Workshop on Secure and Trustworthy Cyber-Physical Systems21
-
30
.
Buczkowski P, Malacaria P, Hankin C, Fielder A
(
2022
)
.
Optimal Security Hardening over a Probabilistic Attack Graph: A Case Study of an Industrial Control System using CySecTool
.
Sat-CPS '22: Proceedings of the 2022 ACM Workshop on Secure and Trustworthy Cyber-Physical Systems
.
21
-
30
.
Buczkowski P, Malacaria P, Hankin C, Fielder A
(
2022
)
.
Optimal Security Hardening over a Probabilistic Attack Graph: A Case Study of an Industrial Control System using CySecTool
.
SAT-CPS@CODASPY
.
Editors:
Gupta, M, Khorsandroo, S, Abdelsalam, M
,
21
-
30
.
Américo A, Khouzani M, Malacaria P
(
2021
)
.
Channel-supermodular entropies: Order theory and an application to query anonymization
.
Entropy
vol.
24
,
(
1
)
Américo A, Malacaria P
(
2021
)
.
Concavity, Core-concavity, Quasiconcavity: A Generalizing Framework for Entropy Measures
.
Conference:
2021 IEEE 34th Computer Security Foundations Symposium (CSF)
vol.
00
,
1
-
14
.
Zhang Y, Malacaria P
(
2021
)
.
Bayesian Stackelberg games for cyber-security decision support
.
Decision Support Systems
vol.
148
,
Zhang Y, Malacaria P
(
2021
)
.
Optimization-Time Analysis for Cybersecurity
.
IEEE Transactions on Dependable and Secure Computing
Américo A, Malacaria P
(
2021
)
.
Concavity, Core-concavity, Quasiconcavity: A Generalizing Framework for Entropy Measures
.
CSF
.
1
-
14
.
Americo A, Khouzani M, Malacaria P
(
2020
)
.
Conditional Entropy and Data Processing: an Axiomatic Approach Based on Core-Concavity
.
IEEE Transactions on Information Theory1
-
1
.
Américo A, Malacaria P
(
2020
)
.
QQIF: Quantum Quantitative Information Flow (invited paper)
.
Conference:
2020 IEEE European Symposium on Security and Privacy Workshops (EuroS&PW)
vol.
00
,
261
-
270
.
Américo A, Khouzani MHR, Malacaria P
(
2020
)
.
Conditional Entropy and Data Processing: An Axiomatic Approach Based on Core-Concavity
.
IEEE Trans. Inf. Theory
vol.
66
,
Article
9
,
5537
-
5547
.
(
2020
)
.
From Lambda Calculus to Cybersecurity Through Program Analysis - Essays Dedicated to Chris Hankin on the Occasion of His Retirement
.
From Lambda Calculus to Cybersecurity Through Program Analysis
.
Editors:
Pierro, AD, Malacaria, P, Nagarajan, R
,
vol.
12065
,
Di Pierro A, Malacaria P, Nagarajan R
(
2020
)
.
Preface
.
Americo A, Malacaria P
(
2020
)
.
QQIF: Quantum Quantitative Information Flow
.
2020 IEEE EUROPEAN SYMPOSIUM ON SECURITY AND PRIVACY WORKSHOPS (EUROS&PW 2020)
.
261
-
270
.
Américo A, Khouzani MHR, Malacaria P
(
2019
)
.
Core-concavity, Gain Functions and Axioms for Information Leakage
.
The Art of Modelling Computational Systems: A Journey from Logic and Concurrency to Security and Privacy
,
vol.
11760
,
Springer Nature
Américo A, Malacaria P, Khouzani M
(
2019
)
.
Channel Ordering and Supermodularity
.
Conference:
2019 IEEE Information Theory Workshop (ITW)
vol.
00
,
1
-
5
.
Américo A, Khouzani M, Malacaria P
(
2019
)
.
Deterministic Channel Design for Minimum Leakage
.
vol.
00
,
428
-
441
.
Sharma A, Malacaria P, Khouzani M
(
2019
)
.
Malware Detection Using 1-Dimensional Convolutional Neural Networks
.
Conference:
2019 IEEE European Symposium on Security and Privacy Workshops (EuroS&PW)
vol.
00
,
247
-
256
.
Khouzani MHR, Liu Z, Malacaria P
(
2019
)
.
Scalable min-max multi-objective cyber-security optimisation over probabilistic attack graphs
.
European Journal of Operational Research
Khouzani MHR, Malacaria P
(
2019
)
.
Generalized Entropies and Metric-Invariant Optimal Countermeasures for Information Leakage Under Symmetric Constraints
.
IEEE Trans. Inf. Theory
vol.
65
,
Article
2
,
888
-
901
.
Americo A, Malacaria P, Khouzani MHR
(
2019
)
.
Channel Ordering and Supermodularity
.
2019 IEEE INFORMATION THEORY WORKSHOP (ITW)
.
674
-
678
.
De Bernardi M, Khouzani MHR, Malacaria P
(
2019
)
.
Pseudo-Random Number Generation Using Generative Adversarial Networks
.
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
vol.
11329 LNAI
,
191
-
200
.
MALACARIA P, KHOUZANI MHR
(
2018
)
.
Generalised Entropies and Metric-Invariant Optimal Countermeasures for Information Leakage under Symmetric Constraints
.
IEEE Transactions on Information Theory
vol.
65
,
(
2
)
888
-
901
.
Khouzani MHR, Malacaria P
(
2018
)
.
Information theory in game theory
.
Entropy
vol.
20
,
(
11
)
Khouzani MHR, Malacaria P
(
2018
)
.
Optimal channel design: A game theoretical analysis
.
Entropy
vol.
20
,
(
9
)
Malacaria P, Khouzani M, Pasareanu CS, Phan QS, Luckow K
(
2018
)
.
Symbolic side-channel analysis for probabilistic programs
.
Proceedings - IEEE Computer Security Foundations Symposium
.
Conference:
2018 IEEE Computer Security Foundations Symposium.
vol.
2018-July
,
313
-
327
.
Malacaria P, Khouzani MHR, Pasareanu CS, Phan Q-S, Luckow KS
(
2018
)
.
Symbolic Side-Channel Analysis for Probabilistic Programs
.
IACR Cryptol. ePrint Arch.
vol.
2018
,
329
-
329
.
Bernardi MD, Khouzani MHR, Malacaria P
(
2018
)
.
Pseudo-Random Number Generation Using Generative Adversarial Networks
.
Nemesis/UrbReas/SoGood/IWAISe/GDM@PKDD/ECML
.
Editors:
Alzate, C, Monreale, A, Assem, H, Bifet, A et al.
,
vol.
11329
,
191
-
200
.
MALACARIA P, Phan Q-S, Pasareanu C, Bang L, Bultan T
(
2017
)
.
Synthesis of Adaptive Side-Channel Attacks
.
Conference:
2017 IEEE Computer Security Foundations Symposium (CSF)
(
Santa Barbara (California)
)
from:
21/08/2017
to:
25/08/2017
,
Khouzani M, Malacaria P
(
2017
)
.
Leakage-Minimal Design: Universality, Limitations, and Applications
.
Conference:
2017 IEEE 30th Computer Security Foundations Symposium (CSF)305
-
317
.
Phan Q-S, Bang L, Pasareanu CS, Malacaria P, Bultan T
(
2017
)
.
Synthesis of Adaptive Side-Channel Attacks
.
IACR Cryptology ePrint Archive
vol.
2017
,
401
-
401
.
MALACARIA P, TAUTCHNING M, DISTEFANO D
(
2016
)
.
Information leakage analysis of complex C code and its application to OpenSSL
.
Conference:
7th International Symposium on Leveraging Applications
(
CORFU
)
from:
10/10/2016
to:
14/10/2016
,
KHOUZANI MHR, MALACARIA P, HANKIN C, FIELDER A, SMERALDI F
(
2016
)
.
Efficient Numerical Frameworks for Multi-Objective Cyber Security Planning
.
Conference:
European Symposium on Research in Computer Security (ESORICS) 2016
(
Heraklion, Crete, Greece
)
from:
26/09/2016
to:
30/09/2016
,
Pasareanu CS, Phan Q-S, Malacaria P
.
Multi-run Side-Channel Analysis Using Symbolic Execution and Max-SMT
.
2016 IEEE 29th Computer Security Foundations Symposium (CSF)
.
Conference:
2016 IEEE 29th Computer Security Foundations Symposium (CSF)387
-
400
.
Khouzani MHR, Malacaria P
.
Relative Perfect Secrecy: Universally Optimal Strategies and Channel Design
.
2016 IEEE 29th Computer Security Foundations Symposium (CSF)
.
Conference:
2016 IEEE 29th Computer Security Foundations Symposium (CSF)61
-
76
.
Fielder A, Panaousis E, Malacaria P, Hankin C, Smeraldi F
(
2016
)
.
Decision support approaches for cyber security investment
.
Decision Support Systems
vol.
86
,
Article
C
,
13
-
23
.
Biondi F, Legay A, Malacaria P, Wasowski A
(
2015
)
.
Quantifying information leakage of randomized protocols
.
Theoretical Computer Science
vol.
597
,
62
-
87
.
Biondi F, Legay A, Malacaria P, WÄ…sowski A
(
2015
)
.
Quantifying information leakage of randomized protocols
.
Theoretical Computer Science
vol.
597
,
62
-
87
.
Phan Q-S, Malacaria P
(
2015
)
.
All-Solution Satisfiability Modulo Theories: Applications, Algorithms and Benchmarks
.
Availability, Reliability and Security (ARES), 2015 10th International Conference on
.
100
-
109
.
Rontidis G, Panaousis E, Laszka A, Daziuklas T, Malacaria P, Alpcan T
(
2015
)
.
A Game-Theoretic Approach for Minimizing Security Risks in the Internet-of-Things
.
Conference:
2015 IEEE International Conference on Communication Workshop (ICCW)2639
-
2644
.
Fielder A, Panaousis E, Malacaria P, Hankin C, Smeraldi F
(
2015
)
.
Comparing Decision Support Approaches for Cyber Security Investment
.
Phan Q-S, Malacaria P, Pasareanu CS
(
2015
)
.
Concurrent Bounded Model Checking
.
SIGSOFT Softw. Eng. Notes
vol.
40
,
Article
1
,
1
-
5
.
Biondi F, Legay A, Nielsen BF, Malacaria P, WÄ…sowski A
(
2014
)
.
Information leakage of non-terminating processes
.
Leibniz International Proceedings in Informatics, LIPIcs
.
vol.
29
,
517
-
529
.
MALACARIA P
(
2014
)
.
Algebraic foundations for quantitative information flow
.
Mathematical Structures in Computer Science
vol.
25
,
(
2
)
404
-
428
.
Phan Q-S, Malacaria P
(
2014
)
.
Abstract Model Counting: A Novel Approach for Quantification of Information Leaks
.
Proceedings of the 9th ACM Symposium on Information, Computer and Communications Security
.
Conference:
ASIA CCS '14 Proceedings of the 9th ACM symposium on Information, computer and communications security
(
Kyoto, Japan
)
from:
04/06/2014
to:
06/06/2014
,
283
-
292
.
Panaousis E, Fielder A, Malacaria P, Hankin C, Smeraldi F
(
2014
)
.
Cybersecurity Games and Investments: A Decision Support Approach
.
Lecture Notes in Computer Science
.
vol.
8840
,
266
-
286
.
Fielder A, Panaousis E, Malacaria P, Hankin C, Smeraldi F
(
2014
)
.
Game Theory Meets Information Security Management
.
IFIP Advances in Information and Communication Technology
.
vol.
428
,
15
-
29
.
Smeraldi F, Malacaria P
(
2014
)
.
How to spend it: Optimal investment for cyber security
.
ACM International Conference Proceeding Series
Phan Q-S, Malacaria P, Pasareanu CS, d Amorim M
(
2014
)
.
Quantifying Information Leaks Using Reliability Analysis
.
Proceedings of the 2014 International SPIN Symposium on Model Checking of Software
.
Conference:
SPIN 2014 Proceedings of the 2014 International SPIN Symposium on Model Checking of Software
(
San Jose, CA. USA
)
from:
21/07/2014
to:
22/07/2014
,
105
-
108
.
Huang X, Malacaria P
(
2013
)
.
SideAuto: Quantitative information flow for side-channel leakage in web applications
.
Proceedings of the ACM Conference on Computer and Communications Security285
-
290
.
MALACARIA P, SMERALDI F
(
2013
)
.
Thermodynamic Aspects of Confidentiality
.
Information and Computation
vol.
226
,
76
-
93
.
Hankin C, Malacaria P
(
2013
)
.
Payoffs, Intensionality and Abstraction in Games
.
Computation, Logic, Games, and Quantum Foundations
.
Editors:
Coecke, B, Ong, L, Panangaden, P
,
vol.
7860
,
69
-
82
.
Biondi F, Legay A, MALACARIA P, Wasowski A
(
2013
)
.
Quantifying Information Leakage of Randomized Protocols
.
Lecture Notes in Computer Science
.
Editors:
Giacobazzi, R, Berdine, J, Mastroeni, I
,
Conference:
14th International Conference on Verification, Model Checking, and Abstract Interpretation (VMCAI)
(
Rome
)
from:
20/01/2013
to:
22/01/2013
,
vol.
7737
,
68
-
87
.
Malacaria P, Smeraldi F
(
2012
)
.
The thermodynamics of confidentiality
.
Proceedings of the Computer Security Foundations Workshop280
-
290
.
Köpf B, Malacaria P, Palamidessi C
(
2012
)
.
Quantitative Security Analysis (Dagstuhl Seminar 12481)
.
Dagstuhl Reports
vol.
2
,
Article
11
,
135
-
154
.
Phan Q-S, Malacaria P, Tkachuk O, Pasareanu CS
(
2012
)
.
Symbolic quantitative information flow
.
ACM SIGSOFT Softw. Eng. Notes
vol.
37
,
Article
6
,
1
-
5
.
MALACARIA P, SMERALDI F
(
2012
)
.
The Thermodynamics of Confidentiality
.
Computer Security Foundations Symposium (CSF), 2012 IEEE 25th
.
Editors:
Cortier, V, Zdancewic, S
,
Conference:
25th IEEE Computer Security Foundations Symposium
(
Harvard, MA, USA
)
from:
25/06/2012
to:
27/06/2012
,
280
-
290
.
Malacaria P
(
2011
)
.
Algebraic Foundations for Information Theoretical, Probabilistic and
Guessability measures of Information Flow
.
Heusser J, Malacaria P
(
2010
)
.
Quantifying Information Leak Vulnerabilities
.
Malacaria P
(
2010
)
.
Program Analysis Probably Counts: Discussant Contribution for the Computer Journal Lecture by Chris Hankin
.
COMPUT J
vol.
53
,
(
6
)
881
-
881
.
Malacaria P
(
2010
)
.
Risk assessment of security threats for looping constructs
.
Journal of Computer Security
vol.
18
,
191
-
228
.
Heusser J, Malacaria P
(
2010
)
.
Applied Quantitative Information Flow and Statistical Databases
.
FORMAL ASPECTS IN SECURITY AND TRUST
.
Editors:
Degano, P, Guttman, JD
,
vol.
5983
,
96
-
110
.
Malacaria P, Heusser J
(
2010
)
.
Information Theory and Security: Quantitative Information Flow
.
FORMAL METHODS FOR QUANTITATIVE ASPECTS OF PROGRAMMING LANGUAGES
.
Editors:
Aldini, A, Bernardo, M, Di Pierro, A, Wiklicky, H et al.
,
vol.
6154
,
87
-
134
.
Heusser J, MALACARIA P
(
2010
)
.
Quantifying information leaks in software
.
ACM 2010
.
Conference:
Twenty-Sixth Annual Computer Security Applications Conference, ACSAC 2010
(
Austin Texas
)
from:
06/12/2010
to:
10/12/2010
,
261
-
269
.
Malacaria P
(
2010
)
.
Quantitative Information Flow: From Theory to Practice?
.
COMPUTER AIDED VERIFICATION, PROCEEDINGS
.
Editors:
Touili, T, Cook, B, Jackson, P
,
vol.
6174
,
20
-
22
.
Chen H, Malacaria P
(
2010
)
.
The Optimum Leakage Principle for Analyzing Multi-threaded Programs
.
INFORMATION THEORETIC SECURITY
.
Editors:
Kurosawa, K
,
vol.
5973
,
177
-
193
.
Chen H, Malacaria P
(
2009
)
.
Studying Maximum Information Leakage Using Karush-Kuhn-Tucker Conditions
.
EPTCS 7, 2009, pp. 1-15
Malacaria P, Smeraldi F
(
2009
)
.
On Adaboost and optimal betting strategies
.
Proceedings of the 5th International Conference on Data Mining (DMIN/WORLDCOMP)
.
326–332
-
326–332
.
MALACARIA P, SMERALDI F
(
2009
)
.
On Adaboost and Optimal Betting Strategies
.
Conference:
WORLDCOMP: The 2009 International Conference on Data Mining, DMIN 2009
(
Las Vegas
)
from:
13/07/2009
to:
16/07/2009
,
326
-
332
.
CHEN H, MALACARIA P
(
2009
)
.
Quantifying maximal loss of anonymity in protocols
.
Conference:
Proceedings of the 2009 ACM Symposium on Information, Computer and Communications Security, ASIACCS 2009
(
Sydney, Australia
)
from:
03/2010
to:
03/2012
,
206
-
217
.
Malacaria P, Chen H
(
2008
)
.
Lagrange Multipliers and Maximum Information Leakage in Different Observational Models
.
PLAS'08: PROCEEDINGS OF THE ACM SIGPLAN THIRD WORKSHOP ON PROGRAMMING LANGUAGES AND ANALYSIS FOR SECURITY
.
135
-
146
.
MALACARIA P, Hunt S, Clark D
(
2007
)
.
A static analysis for quantifying the information flow in a simple imperative language
.
Journal of Computer Security
vol.
15
,
(
3
)
321
-
371
.
Malacaria P
(
2007
)
.
Assessing Security Threats of Looping Constructs
.
CONFERENCE RECORD OF POPL 2007: THE 34TH ACM SIGPLAN SIGACT SYMPOSIUM ON PRINCIPLES OF PROGAMMING LANGUAGES
.
225
-
235
.
Malacaria P
(
2007
)
.
Assessing security threats of looping constructs
.
ACM SIGPLAN NOTICES
.
vol.
42
,
225
-
235
.
Chen H, Malacaria P
(
2007
)
.
Quantitative Analysis of Leakage for Multi-threaded Programs
.
PLAS'07: PROCEEDINGS OF THE 2007 ACM SIGPLAN WORKSHOP ON PROGRAMMING LANGUAGES AND ANALYSIS FOR SECURITY
.
31
-
40
.
Malacaria P, Hankin C
(
1998
)
.
Generalised flowcharts and games
.
Lecture Notes in Computer Science
.
vol.
1443
,
363
-
374
.
Malacaria P, Hankin C
(
1998
)
.
A new approach to control flow analysis
.
Lecture Notes in Computer Science
.
vol.
1383
,
95
-
108
.
Ehrhard T, Malacaria P
(
1991
)
.
Stone duality for stable functions
.
Lecture Notes in Computer Science
.
vol.
530
,
1
-
15
.
Abramsky S, Malacaria P, Jagadeesan R
(
2005
)
.
Full Abstraction for PCF (extended abstract)
.
Theoretical Aspects of Computer Software
,
vol.
789
,
Springer Nature
Clark D, Hunt S, Malacaria P
(
2005
)
.
Quantitative information flow, relations and polymorphic types
.
J LOGIC COMPUT
vol.
15
,
(
2
)
181
-
199
.
Clark D, Hunt S, Malacaria P
(
2005
)
.
Quantified Interference for a while Language
.
Electronic Notes in Theoretical Computer Science
vol.
112
,
(
SPEC. ISS.
)
149
-
166
.
Bucciarelli A, Malacaria P
(
2002
)
.
Relative definability of boolean functions via hypergraphs
.
THEOR COMPUT SCI
vol.
278
,
(
1-2
)
91
-
110
.
MALACARIA P, Clark D, Hunt S
(
2002
)
.
Quantitative Analysis of the Leakage of Confidential Data
.
Electronic Notes in Theoretical Computer Science
vol.
59
,
(
3
)
Abramsky S, Jagadeesan R, Malacaria P
(
2000
)
.
Full abstraction for PCF
.
INFORM COMPUT
vol.
163
,
(
2
)
409
-
470
.
Hankin C, Malacaria P
(
1999
)
.
Program analysis games
.
ACM Computing Surveys
vol.
31
,
(
3es
)
Malacaria P, Hankin C
(
1999
)
.
Non-deterministic games and program analysis: An application to security
.
Proceedings 11th Annual IEEE Symposium on Logic in Computer Science443
-
452
.
Malacaria P
(
1995
)
.
Studying equivalences of transition systems with algebraic tools
.
Theoretical Computer Science
vol.
139
,
(
1-2
)
187
-
205
.
Malacaria P
(
1994
)
.
Equivalences of Transition Systems in an Algebraic Framework
.
Algebraic Methodology and Software Technology (AMAST’93)
,
Springer Nature
Abramsky S, Malacaria P, Jagadeesan R
(
1994
)
.
Full abstraction for PCF
.
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
.
vol.
789 LNCS
,
1
-
15
.
Malacaria P, Regnier L
(
1991
)
.
Some results on the interpretation of lambda -calculus in operator algebras
.
Conference:
[1991] Proceedings Sixth Annual IEEE Symposium on Logic in Computer Science63
-
72
.