Publications: P Pasquale Malacaria
Zhang Y, Malacaria P
(
2025
)
.
Dealing with uncertainty in cybersecurity decision support
.
Comput. Secur.
vol.
148
,
104153
-
104153
.
Sönmez FÖ, Hankin C, Malacaria P
(
2024
)
.
Smart topology detection using multi-armed bandit reinforcement learning method
.
Information Security Journal: A Global Perspective1
-
26
.
Zhang Y, Malacaria P, Loukas G, Panaousis E
(
2023
)
.
CROSS: A framework for cyber risk optimisation in smart homes
.
Comput. Secur.
vol.
130
,
103250
-
103250
.
Zhang Y, Malacaria P
(
2023
)
.
Keep Spending: Beyond Optimal Cyber-Security Investment
.
CSF
.
123
-
136
.
Buczkowski P, Malacaria P, Hankin C, Fielder A
(
2022
)
.
Optimal Security Hardening over a Probabilistic Attack Graph
.
Proceedings of the 2022 ACM Workshop on Secure and Trustworthy Cyber-Physical Systems
.
Conference:
CODASPY '22: Twelveth ACM Conference on Data and Application Security and Privacy21
-
30
.
Buczkowski P, Malacaria P, Hankin C, Fielder A
(
2022
)
.
Optimal security hardening over a probabilistic attack graph: a case\n study of an industrial control system using the CySecTool tool
.
Sönmez FÖ, Hankin C, Malacaria P
(
2022
)
.
Attack Dynamics: An Automatic Attack Graph Generation Framework Based on System Topology, CAPEC, CWE, and CVE Databases
.
Comput. Secur.
vol.
123
,
102938
-
102938
.
Américo A, Khouzani MHR, Malacaria P
(
2022
)
.
Channel-Supermodular Entropies: Order Theory and an Application to Query Anonymization
.
Entropy
vol.
24
,
Article
1
,
39
-
39
.
Sönmez FÖ, Hankin C, Malacaria P
(
2022
)
.
Decision support for healthcare cyber security
.
Comput. Secur.
vol.
122
,
102865
-
102865
.
Buczkowski P, Malacaria P, Hankin C, Fielder A
(
2022
)
.
Optimal Security Hardening over a Probabilistic Attack Graph: A Case Study of an Industrial Control System using CySecTool
.
SAT-CPS@CODASPY
.
21
-
30
.
Buczkowski P, Malacaria P, Hankin C, Fielder A
(
2022
)
.
Optimal security hardening over a probabilistic attack graph: a case study of an industrial control system using the CySecTool tool
.
CoRR
.
vol.
abs/2204.11707
,
Zhang Y, Malacaria P
(
2022
)
.
Optimization-Time Analysis for Cybersecurity
.
IEEE Trans. Dependable Secur. Comput.
vol.
19
,
Article
4
,
2365
-
2383
.
Américo A, Malacaria P
(
2021
)
.
Concavity, Core-concavity, Quasiconcavity: A Generalizing Framework for Entropy Measures
.
2021 IEEE 34th Computer Security Foundations Symposium (CSF)
.
Conference:
2021 IEEE 34th Computer Security Foundations Symposium (CSF)
from:
21/06/2021
to:
25/06/2021
,
1
-
14
.
Zhang Y, Malacaria P
(
2021
)
.
Bayesian Stackelberg games for cyber-security decision support
.
Decis. Support Syst.
vol.
148
,
113599
-
113599
.
Américo A, Malacaria P
(
2021
)
.
Concavity, Core-concavity, Quasiconcavity: A Generalizing Framework for Entropy Measures
.
CSF
.
1
-
14
.
Americo A, Khouzani MHR, Malacaria P
(
2020
)
.
Conditional Entropy and Data Processing: An Axiomatic Approach Based on Core-Concavity
.
IEEE Transactions on Information Theory
vol.
66
,
(
9
)
5537
-
5547
.
Américo A, Khouzani MHR, Malacaria P
(
2020
)
.
Conditional Entropy and Data Processing: An Axiomatic Approach Based on Core-Concavity
.
IEEE Trans. Inf. Theory
vol.
66
,
Article
9
,
5537
-
5547
.
(
2020
)
.
From Lambda Calculus to Cybersecurity Through Program Analysis - Essays Dedicated to Chris Hankin on the Occasion of His Retirement
.
From Lambda Calculus to Cybersecurity Through Program Analysis
.
vol.
12065
,
Di Pierro A, Malacaria P, Nagarajan R
(
2020
)
.
Preface
.
Americo A, Malacaria P
(
2020
)
.
QQIF: Quantum Quantitative Information Flow
.
2020 IEEE EUROPEAN SYMPOSIUM ON SECURITY AND PRIVACY WORKSHOPS (EUROS&PW 2020)
.
261
-
270
.
Américo A, Malacaria P
(
2020
)
.
QQIF: Quantum Quantitative Information Flow (invited paper)
.
EuroS&P Workshops
.
261
-
270
.
Americo A, Malacaria P, Khouzani MHR
(
2019
)
.
Channel Ordering and Supermodularity
.
2019 IEEE INFORMATION THEORY WORKSHOP (ITW)
.
674
-
678
.
Américo A, Malacaria P, Khouzani MHR
(
2019
)
.
Channel Ordering and Supermodularity
.
ITW
.
1
-
5
.
Américo A, Khouzani MHR, Malacaria P
(
2019
)
.
Core-concavity, Gain Functions and Axioms for Information Leakage
.
The Art of Modelling Computational Systems: A Journey from Logic and Concurrency to Security and Privacy - Essays Dedicated to Catuscia Palamidessi on the Occasion of Her 60th Birthday
,
vol.
11760
,
Springer
Américo A, Khouzani MHR, Malacaria P
(
2019
)
.
Deterministic Channel Design for Minimum Leakage
.
CSF428
-
441
.
Khouzani MHR, Malacaria P
(
2019
)
.
Generalized Entropies and Metric-Invariant Optimal Countermeasures for Information Leakage Under Symmetric Constraints
.
IEEE Trans. Inf. Theory
vol.
65
,
Article
2
,
888
-
901
.
Sharma A, Malacaria P, Khouzani MHR
(
2019
)
.
Malware Detection Using 1-Dimensional Convolutional Neural Networks
.
EuroS&P Workshops
.
247
-
256
.
Khouzani MHR, Liu Z, Malacaria P
(
2019
)
.
Scalable min-max multi-objective cyber-security optimisation over probabilistic attack graphs
.
Eur. J. Oper. Res.
vol.
278
,
Article
3
,
894
-
903
.
Khouzani M, Malacaria P
(
2018
)
.
Generalised Entropies and Metric-Invariant Optimal Countermeasures for Information Leakage under Symmetric Constraints
.
De Bernardi M, Khouzani M, Malacaria P
(
2018
)
.
Pseudo-Random Number Generation using Generative Adversarial Networks
.
Khouzani MHR, Malacaria P
(
2018
)
.
Generalised Entropies and Metric-Invariant Optimal Countermeasures for Information Leakage under Symmetric Constraints
.
CoRR
vol.
abs/1811.09652
,
Khouzani MHR, Malacaria P
(
2018
)
.
Information Theory in Game Theory
.
Entropy
vol.
20
,
Article
11
,
817
-
817
.
Khouzani MHR, Malacaria P
(
2018
)
.
Optimal Channel Design: A Game Theoretical Analysis
.
Entropy
vol.
20
,
Article
9
,
675
-
675
.
Bernardi MD, Khouzani MHR, Malacaria P
(
2018
)
.
Pseudo-Random Number Generation Using Generative Adversarial Networks
.
Nemesis/UrbReas/SoGood/IWAISe/GDM@PKDD/ECML
.
vol.
11329
,
191
-
200
.
Bernardi MD, Khouzani MHR, Malacaria P
(
2018
)
.
Pseudo-Random Number Generation using Generative Adversarial Networks
.
CoRR
vol.
abs/1810.00378
,
Malacaria P, Khouzani MHR, Pasareanu CS, Phan Q-S, Luckow KS
(
2018
)
.
Symbolic Side-Channel Analysis for Probabilistic Programs
.
CSF
.
313
-
327
.
Khouzani MHR, Malacaria P
(
2017
)
.
Leakage-Minimal Design: Universality, Limitations, and Applications
.
CSF
.
305
-
317
.
Phan Q-S, Bang L, Pasareanu CS, Malacaria P, Bultan T
(
2017
)
.
Synthesis of Adaptive Side-Channel Attacks
.
CSF
.
328
-
342
.
Fielder A, Panaousis EA, Malacaria P, Hankin C, Smeraldi F
(
2016
)
.
Decision support approaches for cyber security investment
.
Decis. Support Syst.
vol.
86
,
13
-
23
.
Khouzani MHR, Malacaria P, Hankin C, Fielder A, Smeraldi F
(
2016
)
.
Efficient Numerical Frameworks for Multi-objective Cyber Security Planning
.
ESORICS (2)
.
vol.
9879
,
179
-
197
.
Malacaria P, Tautschnig M, Distefano D
(
2016
)
.
Information Leakage Analysis of Complex C Code and Its application to OpenSSL
.
ISoLA (1)
.
vol.
9952
,
909
-
925
.
Pasareanu CS, Phan Q-S, Malacaria P
(
2016
)
.
Multi-run Side-Channel Analysis Using Symbolic Execution and Max-SMT
.
CSF
.
387
-
400
.
Khouzani MHR, Malacaria P
(
2016
)
.
Relative Perfect Secrecy: Universally Optimal Strategies and Channel Design
.
CSF
.
61
-
76
.
Biondi F, Legay A, Malacaria P, Wasowski A
(
2015
)
.
Quantifying information leakage of randomized protocols
.
Theoretical Computer Science
vol.
597
,
62
-
87
.
Fielder A, Panaousis E, Malacaria P, Hankin C, Smeraldi F
(
2015
)
.
Comparing Decision Support Approaches for Cyber Security Investment
.
Rontidis G, Panaousis EA, Laszka A, Dagiuklas T, Malacaria P, Alpcan T
(
2015
)
.
A game-theoretic approach for minimizing security risks in the Internet-of-Things
.
ICC Workshops
.
2639
-
2644
.
Malacaria P
(
2015
)
.
Algebraic foundations for quantitative information flow
.
Math. Struct. Comput. Sci.
vol.
25
,
Article
2
,
404
-
428
.
Phan Q-S, Malacaria P
(
2015
)
.
All-Solution Satisfiability Modulo Theories: Applications, Algorithms and Benchmarks
.
ARES
.
100
-
109
.
Fielder A, Panaousis EA, Malacaria P, Hankin C, Smeraldi F
(
2015
)
.
Comparing Decision Support Approaches for Cyber Security Investment
.
CoRR
vol.
abs/1502.05532
,
Phan Q-S, Malacaria P, Pasareanu CS
(
2015
)
.
Concurrent Bounded Model Checking
.
ACM SIGSOFT Softw. Eng. Notes
vol.
40
,
Article
1
,
1
-
5
.
Biondi F, Legay A, Malacaria P, Wasowski A
(
2015
)
.
Quantifying information leakage of randomized protocols
.
Theor. Comput. Sci.
vol.
597
,
62
-
87
.
Smeraldi F, Malacaria P
(
2014
)
.
How to spend it
.
Proceedings of the 1st International Workshop on Agents and CyberSecurity1
-
4
.
Phan Q-S, Malacaria P
(
2014
)
.
Abstract model counting: a novel approach for quantification of information leaks
.
AsiaCCS
.
283
-
292
.
Panaousis EA, Fielder A, Malacaria P, Hankin C, Smeraldi F
(
2014
)
.
Cybersecurity Games and Investments: A Decision Support Approach
.
GameSec
.
vol.
8840
,
266
-
286
.
Fielder A, Panaousis E, Malacaria P, Hankin C, Smeraldi F
(
2014
)
.
Game Theory Meets Information Security Management
.
15
-
29
.
Fielder A, Panaousis EA, Malacaria P, Hankin C, Smeraldi F
(
2014
)
.
Game Theory Meets Information Security Management
.
SEC
.
vol.
428
,
15
-
29
.
Biondi F, Legay A, Nielsen BF, Malacaria P, Wasowski A
(
2014
)
.
Information Leakage of Non-Terminating Processes
.
FSTTCS
.
vol.
29
,
517
-
529
.
Phan Q-S, Malacaria P, Pasareanu CS, d'Amorim M
(
2014
)
.
Quantifying information leaks using reliability analysis
.
SPIN
.
105
-
108
.
Abramsky S, Jagadeesan R, Malacaria P
(
2013
)
.
Full Abstraction for PCF
.
Abramsky S, Jagadeesan R, Malacaria P
(
2013
)
.
Full Abstraction for PCF
.
CoRR
vol.
abs/1311.6125
,
Hankin C, Malacaria P
(
2013
)
.
Payoffs, Intensionality and Abstraction in Games
.
69
-
82
.
Biondi F, Legay A, Malacaria P, Wasowski A
(
2013
)
.
Quantifying Information Leakage of Randomized Protocols
.
VMCAI
.
vol.
7737
,
68
-
87
.
Huang X, Malacaria P
(
2013
)
.
SideAuto: quantitative information flow for side-channel leakage in web applications
.
WPES285
-
290
.
Malacaria P, Smeraldi F
(
2013
)
.
Thermodynamic aspects of confidentiality
.
Inf. Comput.
vol.
226
,
76
-
93
.
Phan Q-S, Malacaria P, Tkachuk O, Păsăreanu CS
(
2012
)
.
Symbolic quantitative information flow
.
ACM SIGSOFT Software Engineering Notes
vol.
37
,
(
6
)
1
-
5
.
Malacaria P, Smeraldi F
(
2012
)
.
The Thermodynamics of Confidentiality
.
2012 IEEE 25th Computer Security Foundations Symposium280
-
290
.
Köpf B, Malacaria P, Palamidessi C
(
2012
)
.
Quantitative Security Analysis (Dagstuhl Seminar 12481)
.
Dagstuhl Reports
vol.
2
,
Article
11
,
135
-
154
.
Malacaria P, Smeraldi F
(
2012
)
.
The Thermodynamics of Confidentiality
.
CSF
.
280
-
290
.
Malacaria P
(
2011
)
.
Algebraic Foundations for Information Theoretical, Probabilistic and Guessability measures of Information Flow
.
Malacaria P
(
2011
)
.
Algebraic Foundations for Information Theoretical, Probabilistic and Guessability measures of Information Flow
.
CoRR
vol.
abs/1101.3453
,
Heusser J, Malacaria P
(
2010
)
.
Quantifying Information Leak Vulnerabilities
.
Malacaria P, Heusser J
(
2010
)
.
Information Theory and Security: Quantitative Information Flow
.
SFM
.
vol.
6154
,
87
-
134
.
Malacaria P
(
2010
)
.
Program Analysis Probably Counts: Discussant Contribution for the Computer Journal Lecture by Chris Hankin
.
Comput. J.
vol.
53
,
Article
6
,
881
-
881
.
Heusser J, Malacaria P
(
2010
)
.
Quantifying Information Leak Vulnerabilities
.
CoRR
vol.
abs/1007.0918
,
Heusser J, Malacaria P
(
2010
)
.
Quantifying information leaks in software
.
ACSAC
.
261
-
269
.
Malacaria P
(
2010
)
.
Quantitative Information Flow: From Theory to Practice?
.
CAV
.
vol.
6174
,
20
-
22
.
Malacaria P
(
2010
)
.
Risk assessment of security threats for looping constructs
.
J. Comput. Secur.
vol.
18
,
Article
2
,
191
-
228
.
Chen H, Malacaria P
(
2009
)
.
Studying Maximum Information Leakage Using Karush-Kuhn-Tucker Conditions
.
Heusser J, Malacaria P
(
2009
)
.
Applied Quantitative Information Flow and Statistical Databases
.
Formal Aspects in Security and Trust
.
vol.
5983
,
96
-
110
.
MALACARIA P, SMERALDI F
(
2009
)
.
On Adaboost and Optimal Betting Strategies
.
Conference:
WORLDCOMP: The 2009 International Conference on Data Mining, DMIN 2009
(
Las Vegas
)
from:
13/07/2009
to:
16/07/2009
,
326
-
332
.
Malacaria P, Smeraldi F
(
2009
)
.
On Adaboost and Optimal Betting Strategies
.
DMIN
.
326
-
332
.
Chen H, Malacaria P
(
2009
)
.
Quantifying maximal loss of anonymity in protocols
.
AsiaCCS
.
206
-
217
.
Chen H, Malacaria P
(
2009
)
.
Studying Maximum Information Leakage Using Karush-Kuhn-Tucker Conditions
.
SECCO
vol.
7
,
1
-
15
.
Chen H, Malacaria P
(
2009
)
.
The Optimum Leakage Principle for Analyzing Multi-threaded Programs
.
ICITS
.
vol.
5973
,
177
-
193
.
Malacaria P, Chen H
(
2008
)
.
Lagrange multipliers and maximum information leakage in different observational models
.
PLAS
.
135
-
146
.
Malacaria P
(
2007
)
.
Assessing security threats of looping constructs
.
ACM SIGPLAN Notices
.
vol.
42
,
225
-
235
.
Clark D, Hunt S, Malacaria P
(
2007
)
.
A static analysis for quantifying information flow in a simple imperative language
.
J. Comput. Secur.
vol.
15
,
Article
3
,
321
-
371
.
Malacaria P
(
2007
)
.
Assessing security threats of looping constructs
.
POPL
.
225
-
235
.
Chen H, Malacaria P
(
2007
)
.
Quantitative analysis of leakage for multi-threaded programs
.
PLAS
.
31
-
40
.
Malacaria P, Hankin C
(
1998
)
.
Generalised flowcharts and games
.
363
-
374
.
Malacaria P, Hankin C
(
1998
)
.
A new approach to control flow analysis
.
95
-
108
.
Abramsky S, Malacaria P, Jagadeesan R
(
2005
)
.
Full Abstraction for PCF (extended abstract)
.
Theoretical Aspects of Computer Software
,
vol.
789
,
Springer Nature
Clark D, Hunt S, Malacaria P
(
2005
)
.
Quantitative Information Flow, Relations and Polymorphic Types
.
J. Log. Comput.
vol.
15
,
Article
2
,
181
-
199
.
Clark D, Hunt S, Malacaria P
(
2004
)
.
Quantified Interference for a While Language
.
QAPL
vol.
112
,
149
-
166
.
Bucciarelli A, Malacaria P
(
2002
)
.
Relative definability of boolean functions via hypergraphs
.
Theor. Comput. Sci.
vol.
278
,
Article
1-2
,
91
-
110
.
Clark D, Hunt S, Malacaria P
(
2001
)
.
Quantitative Analysis of the Leakage of Confidential Data
.
QAPL
vol.
59
,
Article
3
,
238
-
251
.
Hankin C, Malacaria P
(
1999
)
.
Program analysis games
.
ACM Computing Surveys
vol.
31
,
(
3es
)
5
-
5
.
Malacaria P
(
1995
)
.
Studying equivalences of transition systems with algebraic tools
.
Theoretical Computer Science
vol.
139
,
(
1-2
)
187
-
205
.
Malacaria P
(
1994
)
.
Equivalences of Transition Systems in an Algebraic Framework
.
Workshops in Computing
,
Springer London
Américo A, Khouzani MHR, Malacaria P
.
Deterministic Channel Design for Minimum Leakage
.
Conference:
32nd IEEE Computer Security Foundations Symposium
(
Hoboken, NJ, USA
)
from:
25/06/2019
to:
28/06/2019
,
Malacaria P, Hankin C
.
Non-deterministic games and program analysis: An application to security
.
Proceedings. 14th Symposium on Logic in Computer Science (Cat. No. PR00158)443
-
452
.
MALACARIA P
.
Quantifying information leaks in software
.
ACM 2010
.
Conference:
Twenty-Sixth Annual Computer Security Applications Conference, ACSAC 2010
(
Austin Texas
)
from:
06/12/2010
to:
10/12/2010
,
261
-
269
.
Malacaria P, Regnier L
.
Some results on the interpretation of lambda -calculus in operator algebras
.
[1991] Proceedings Sixth Annual IEEE Symposium on Logic in Computer Science
.
Conference:
Sixth Annual IEEE Symposium on Logic in Computer Science63
-
72
.
Ehrhard T, Malacaria P
.
Stone duality for stable functions
.
1
-
15
.