@inproceedings{201ce22fd2a14e95b0cdb309dc5a0e99,
title = "Measuring the speed of information leakage in mobile processes",
abstract = "This paper presents a syntax-directed non-uniform static analysis of the stochastic π-calculus to safely approximate the amount of time required before name substitutions occur in a process. Name substitutions form the basis for defining security properties, like information leakage. The presence of the quantitative and qualitative information in the results of the analysis allows us to reason about the speed at which sensitive information is leaked in a computing environment with malicious mobile code. We demonstrate the applicability of the analysis through a simple example of firewall breaches.",
author = "Benjamin Aziz",
year = "2006",
month = jan,
day = "1",
doi = "10.1007/11784180",
language = "English",
isbn = "3540356339",
series = "Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)",
publisher = "Springer Verlag",
pages = "36--50",
booktitle = "Algebraic Methodology and Software Technology - 11th International Conference, AMAST 2006",
address = "Germany",
note = "11th International Conference on Algebraic Methodology and Software Technology, AMAST 2006 ; Conference date: 05-07-2006 Through 08-07-2006",
}