{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,31]],"date-time":"2026-03-31T08:42:54Z","timestamp":1774946574006,"version":"3.50.1"},"reference-count":40,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014,5]]},"DOI":"10.1109\/sp.2014.41","type":"proceedings-article","created":{"date-parts":[[2014,11,26]],"date-time":"2014-11-26T09:57:47Z","timestamp":1416995867000},"page":"540-555","source":"Crossref","is-referenced-by-count":35,"title":["Quantifying Information Flow for Dynamic Secrets"],"prefix":"10.1109","author":[{"given":"Piotr","family":"Mardziel","sequence":"first","affiliation":[]},{"given":"Mario S.","family":"Alvim","sequence":"additional","affiliation":[]},{"given":"Michael","family":"Hicks","sequence":"additional","affiliation":[]},{"given":"Michael R.","family":"Clarkson","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"19","doi-asserted-by":"publisher","DOI":"10.1145\/1190216.1190251"},{"key":"35","doi-asserted-by":"publisher","DOI":"10.1016\/j.ic.2013.03.005"},{"key":"17","author":"denning","year":"1982","journal-title":"Cryptography and Data Security"},{"key":"36","doi-asserted-by":"publisher","DOI":"10.1109\/ISIT.2005.1523313"},{"key":"18","author":"halpern","year":"2003","journal-title":"Reasoning about uncertainty"},{"key":"33","doi-asserted-by":"crossref","DOI":"10.1007\/978-3-642-03034-5_17","article-title":"Embedded probabilistic programming","author":"kiselyov","year":"2009","journal-title":"Proceedings of the Working Conference on Domain Specific Languages (DSL)"},{"key":"15","doi-asserted-by":"crossref","DOI":"10.1145\/1315245.1315282","article-title":"An information-theoretic model for adaptive side-channel attacks","author":"k\ufffdpf","year":"2007","journal-title":"Proceedings of the ACM Conference on Computer and Communications Security (CCS)"},{"key":"34","doi-asserted-by":"crossref","first-page":"463","DOI":"10.3233\/JCS-130469","article-title":"Dynamic enforcement of knowledge-based security policies using abstract interpretation","volume":"21","author":"mardziel","year":"2013","journal-title":"Journal of Computer Security"},{"key":"16","article-title":"Probabilistic programming","author":"gordon","year":"2014","journal-title":"International Conference on Software Engineering (ICSE FOSE Track)"},{"key":"39","doi-asserted-by":"publisher","DOI":"10.1145\/2382196.2382261"},{"key":"13","doi-asserted-by":"publisher","DOI":"10.1109\/CSFW.2006.16"},{"key":"14","doi-asserted-by":"publisher","DOI":"10.1109\/CSF.2012.26"},{"key":"37","first-page":"325","article-title":"Time warp: How time affects privacy in lbss","author":"marconi","year":"2010","journal-title":"ICICS"},{"key":"11","first-page":"144","article-title":"Information flow in nondeterministic systems","author":"wittbold","year":"1990","journal-title":"Proceedings of the IEEE Symposium on Security and Privacy (S&P)"},{"key":"38","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2011.18"},{"key":"12","first-page":"50","article-title":"Non-interference for deterministic interactive programs","author":"clark","year":"2008","journal-title":"Proc of the 3rd International Workshop on Formal Aspects in Security and Trust"},{"key":"21","doi-asserted-by":"publisher","DOI":"10.1145\/1005140.1005153"},{"key":"20","doi-asserted-by":"publisher","DOI":"10.1145\/1375696.1375713"},{"key":"40","author":"mciver","year":"2005","journal-title":"Abstraction Refinement And Proof For Probabilistic Systems"},{"key":"22","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-15375-4_8"},{"key":"23","first-page":"204","article-title":"Guessing and entropy","year":"1994","journal-title":"Proceedings of the IEEE International Symposium on Information Theory"},{"key":"24","article-title":"Algebraic foundations for information theoretical, probabilistic and guessability measures of information flow","author":"malacaria","year":"2011","journal-title":"CoRR"},{"key":"25","first-page":"67","article-title":"On the incomparability of entropy and marginal guesswork in brute-force attacks","volume":"1977","year":"2000","journal-title":"Proceedings of INDOCRYPT International Conference in Cryptology in India"},{"key":"26","doi-asserted-by":"publisher","DOI":"10.1016\/j.entcs.2009.07.085"},{"key":"27","doi-asserted-by":"publisher","DOI":"10.1109\/LICS.2002.1029849"},{"key":"28","doi-asserted-by":"crossref","first-page":"3","DOI":"10.3233\/JCS-2011-0433","article-title":"Quantitative information flow in interactive systems","volume":"20","author":"alvim","year":"2012","journal-title":"Journal of Computer Security"},{"key":"29","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2014.41"},{"key":"3","doi-asserted-by":"publisher","DOI":"10.1016\/j.ic.2007.07.003"},{"key":"2","doi-asserted-by":"publisher","DOI":"10.1093\/logcom\/exi009"},{"key":"10","author":"segala","year":"1995","journal-title":"Modeling and Verification of Randomized Distributed Realtime Systems"},{"key":"1","first-page":"126","article-title":"Quasi-anonymous channels","author":"moskowitz","year":"2003","journal-title":"Proc CNIS"},{"key":"30","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2008.2008147"},{"key":"7","doi-asserted-by":"publisher","DOI":"10.1016\/j.entcs.2009.10.009"},{"key":"6","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2009.18"},{"key":"32","doi-asserted-by":"publisher","DOI":"10.1145\/503272.503288"},{"key":"5","doi-asserted-by":"crossref","first-page":"655","DOI":"10.3233\/JCS-2009-0353","article-title":"Quantifying information flow with beliefs","volume":"17","author":"clarkson","year":"2009","journal-title":"Journal of Computer Security"},{"key":"31","year":"0","journal-title":"The Caml language"},{"key":"4","article-title":"On the foundations of quantitative information flow","author":"smith","year":"2009","journal-title":"Proceedings of the Conference on Foundations of Software Science and Computation Structures (FoSSaCS)"},{"key":"9","doi-asserted-by":"publisher","DOI":"10.1109\/CSF.2011.15"},{"key":"8","article-title":"Approximation and randomization for quantitative information-flow analysis","author":"k\ufffdpf","year":"2010","journal-title":"CSF"}],"event":{"name":"2014 IEEE Symposium on Security and Privacy (SP)","location":"San Jose, CA","start":{"date-parts":[[2014,5,18]]},"end":{"date-parts":[[2014,5,21]]}},"container-title":["2014 IEEE Symposium on Security and Privacy"],"original-title":[],"link":[{"URL":"http:\/\/ieeexplore.ieee.org\/iel7\/6954656\/6956545\/06956586.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6954656\/6956545\/06956586.pdf?arnumber=6956586","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,8,17]],"date-time":"2019-08-17T17:11:21Z","timestamp":1566061881000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6956586\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014,5]]},"references-count":40,"URL":"https:\/\/doi.org\/10.1109\/sp.2014.41","relation":{},"subject":[],"published":{"date-parts":[[2014,5]]}}}