Skip to main content
Research

Publications: P Pasquale Malacaria

Zhang Y, Malacaria P ( 2025 ) . Dealing with uncertainty in cybersecurity decision support . Comput. Secur. vol. 148 , 104153 - 104153 .
Sönmez FÖ, Hankin C, Malacaria P ( 2024 ) . Smart topology detection using multi-armed bandit reinforcement learning method . Information Security Journal: A Global Perspective1 - 26 .
Zhang Y, Malacaria P, Loukas G, Panaousis E ( 2023 ) . CROSS: A framework for cyber risk optimisation in smart homes . Comput. Secur. vol. 130 , 103250 - 103250 .
Zhang Y, Malacaria P ( 2023 ) . Keep Spending: Beyond Optimal Cyber-Security Investment . CSF . 123 - 136 .
Buczkowski P, Malacaria P, Hankin C, Fielder A ( 2022 ) . Optimal Security Hardening over a Probabilistic Attack Graph . Proceedings of the 2022 ACM Workshop on Secure and Trustworthy Cyber-Physical Systems . Conference: CODASPY '22: Twelveth ACM Conference on Data and Application Security and Privacy21 - 30 .
Buczkowski P, Malacaria P, Hankin C, Fielder A ( 2022 ) . Optimal security hardening over a probabilistic attack graph: a case\n study of an industrial control system using the CySecTool tool .
Sönmez FÖ, Hankin C, Malacaria P ( 2022 ) . Attack Dynamics: An Automatic Attack Graph Generation Framework Based on System Topology, CAPEC, CWE, and CVE Databases . Comput. Secur. vol. 123 , 102938 - 102938 .
Américo A, Khouzani MHR, Malacaria P ( 2022 ) . Channel-Supermodular Entropies: Order Theory and an Application to Query Anonymization . Entropy vol. 24 , Article 1 , 39 - 39 .
Sönmez FÖ, Hankin C, Malacaria P ( 2022 ) . Decision support for healthcare cyber security . Comput. Secur. vol. 122 , 102865 - 102865 .
Buczkowski P, Malacaria P, Hankin C, Fielder A ( 2022 ) . Optimal Security Hardening over a Probabilistic Attack Graph: A Case Study of an Industrial Control System using CySecTool . SAT-CPS@CODASPY . 21 - 30 .
Buczkowski P, Malacaria P, Hankin C, Fielder A ( 2022 ) . Optimal security hardening over a probabilistic attack graph: a case study of an industrial control system using the CySecTool tool . CoRR . vol. abs/2204.11707 ,
Zhang Y, Malacaria P ( 2022 ) . Optimization-Time Analysis for Cybersecurity . IEEE Trans. Dependable Secur. Comput. vol. 19 , Article 4 , 2365 - 2383 .
Américo A, Malacaria P ( 2021 ) . Concavity, Core-concavity, Quasiconcavity: A Generalizing Framework for Entropy Measures . 2021 IEEE 34th Computer Security Foundations Symposium (CSF) . Conference: 2021 IEEE 34th Computer Security Foundations Symposium (CSF) from: 21/06/2021 to: 25/06/2021 , 1 - 14 .
Zhang Y, Malacaria P ( 2021 ) . Bayesian Stackelberg games for cyber-security decision support . Decis. Support Syst. vol. 148 , 113599 - 113599 .
Américo A, Malacaria P ( 2021 ) . Concavity, Core-concavity, Quasiconcavity: A Generalizing Framework for Entropy Measures . CSF . 1 - 14 .
Americo A, Khouzani MHR, Malacaria P ( 2020 ) . Conditional Entropy and Data Processing: An Axiomatic Approach Based on Core-Concavity . IEEE Transactions on Information Theory vol. 66 , ( 9 ) 5537 - 5547 .
Américo A, Khouzani MHR, Malacaria P ( 2020 ) . Conditional Entropy and Data Processing: An Axiomatic Approach Based on Core-Concavity . IEEE Trans. Inf. Theory vol. 66 , Article 9 , 5537 - 5547 .
( 2020 ) . From Lambda Calculus to Cybersecurity Through Program Analysis - Essays Dedicated to Chris Hankin on the Occasion of His Retirement . From Lambda Calculus to Cybersecurity Through Program Analysis . vol. 12065 ,
Di Pierro A, Malacaria P, Nagarajan R ( 2020 ) . Preface .
Americo A, Malacaria P ( 2020 ) . QQIF: Quantum Quantitative Information Flow . 2020 IEEE EUROPEAN SYMPOSIUM ON SECURITY AND PRIVACY WORKSHOPS (EUROS&PW 2020) . 261 - 270 .
Américo A, Malacaria P ( 2020 ) . QQIF: Quantum Quantitative Information Flow (invited paper) . EuroS&P Workshops . 261 - 270 .
Americo A, Malacaria P, Khouzani MHR ( 2019 ) . Channel Ordering and Supermodularity . 2019 IEEE INFORMATION THEORY WORKSHOP (ITW) . 674 - 678 .
Américo A, Malacaria P, Khouzani MHR ( 2019 ) . Channel Ordering and Supermodularity . ITW . 1 - 5 .
Américo A, Khouzani MHR, Malacaria P ( 2019 ) . Core-concavity, Gain Functions and Axioms for Information Leakage . The Art of Modelling Computational Systems: A Journey from Logic and Concurrency to Security and Privacy - Essays Dedicated to Catuscia Palamidessi on the Occasion of Her 60th Birthday , vol. 11760 , Springer
Américo A, Khouzani MHR, Malacaria P ( 2019 ) . Deterministic Channel Design for Minimum Leakage . CSF428 - 441 .
Khouzani MHR, Malacaria P ( 2019 ) . Generalized Entropies and Metric-Invariant Optimal Countermeasures for Information Leakage Under Symmetric Constraints . IEEE Trans. Inf. Theory vol. 65 , Article 2 , 888 - 901 .
Sharma A, Malacaria P, Khouzani MHR ( 2019 ) . Malware Detection Using 1-Dimensional Convolutional Neural Networks . EuroS&P Workshops . 247 - 256 .
Khouzani MHR, Liu Z, Malacaria P ( 2019 ) . Scalable min-max multi-objective cyber-security optimisation over probabilistic attack graphs . Eur. J. Oper. Res. vol. 278 , Article 3 , 894 - 903 .
Khouzani M, Malacaria P ( 2018 ) . Generalised Entropies and Metric-Invariant Optimal Countermeasures for Information Leakage under Symmetric Constraints .
De Bernardi M, Khouzani M, Malacaria P ( 2018 ) . Pseudo-Random Number Generation using Generative Adversarial Networks .
Khouzani MHR, Malacaria P ( 2018 ) . Generalised Entropies and Metric-Invariant Optimal Countermeasures for Information Leakage under Symmetric Constraints . CoRR vol. abs/1811.09652 ,
Khouzani MHR, Malacaria P ( 2018 ) . Information Theory in Game Theory . Entropy vol. 20 , Article 11 , 817 - 817 .
Khouzani MHR, Malacaria P ( 2018 ) . Optimal Channel Design: A Game Theoretical Analysis . Entropy vol. 20 , Article 9 , 675 - 675 .
Bernardi MD, Khouzani MHR, Malacaria P ( 2018 ) . Pseudo-Random Number Generation Using Generative Adversarial Networks . Nemesis/UrbReas/SoGood/IWAISe/GDM@PKDD/ECML . vol. 11329 , 191 - 200 .
Bernardi MD, Khouzani MHR, Malacaria P ( 2018 ) . Pseudo-Random Number Generation using Generative Adversarial Networks . CoRR vol. abs/1810.00378 ,
Malacaria P, Khouzani MHR, Pasareanu CS, Phan Q-S, Luckow KS ( 2018 ) . Symbolic Side-Channel Analysis for Probabilistic Programs . CSF . 313 - 327 .
Khouzani MHR, Malacaria P ( 2017 ) . Leakage-Minimal Design: Universality, Limitations, and Applications . CSF . 305 - 317 .
Phan Q-S, Bang L, Pasareanu CS, Malacaria P, Bultan T ( 2017 ) . Synthesis of Adaptive Side-Channel Attacks . CSF . 328 - 342 .
Fielder A, Panaousis EA, Malacaria P, Hankin C, Smeraldi F ( 2016 ) . Decision support approaches for cyber security investment . Decis. Support Syst. vol. 86 , 13 - 23 .
Khouzani MHR, Malacaria P, Hankin C, Fielder A, Smeraldi F ( 2016 ) . Efficient Numerical Frameworks for Multi-objective Cyber Security Planning . ESORICS (2) . vol. 9879 , 179 - 197 .
Malacaria P, Tautschnig M, Distefano D ( 2016 ) . Information Leakage Analysis of Complex C Code and Its application to OpenSSL . ISoLA (1) . vol. 9952 , 909 - 925 .
Pasareanu CS, Phan Q-S, Malacaria P ( 2016 ) . Multi-run Side-Channel Analysis Using Symbolic Execution and Max-SMT . CSF . 387 - 400 .
Khouzani MHR, Malacaria P ( 2016 ) . Relative Perfect Secrecy: Universally Optimal Strategies and Channel Design . CSF . 61 - 76 .
Biondi F, Legay A, Malacaria P, Wasowski A ( 2015 ) . Quantifying information leakage of randomized protocols . Theoretical Computer Science vol. 597 , 62 - 87 .
Fielder A, Panaousis E, Malacaria P, Hankin C, Smeraldi F ( 2015 ) . Comparing Decision Support Approaches for Cyber Security Investment .
Rontidis G, Panaousis EA, Laszka A, Dagiuklas T, Malacaria P, Alpcan T ( 2015 ) . A game-theoretic approach for minimizing security risks in the Internet-of-Things . ICC Workshops . 2639 - 2644 .
Malacaria P ( 2015 ) . Algebraic foundations for quantitative information flow . Math. Struct. Comput. Sci. vol. 25 , Article 2 , 404 - 428 .
Phan Q-S, Malacaria P ( 2015 ) . All-Solution Satisfiability Modulo Theories: Applications, Algorithms and Benchmarks . ARES . 100 - 109 .
Fielder A, Panaousis EA, Malacaria P, Hankin C, Smeraldi F ( 2015 ) . Comparing Decision Support Approaches for Cyber Security Investment . CoRR vol. abs/1502.05532 ,
Phan Q-S, Malacaria P, Pasareanu CS ( 2015 ) . Concurrent Bounded Model Checking . ACM SIGSOFT Softw. Eng. Notes vol. 40 , Article 1 , 1 - 5 .
Biondi F, Legay A, Malacaria P, Wasowski A ( 2015 ) . Quantifying information leakage of randomized protocols . Theor. Comput. Sci. vol. 597 , 62 - 87 .
Smeraldi F, Malacaria P ( 2014 ) . How to spend it . Proceedings of the 1st International Workshop on Agents and CyberSecurity1 - 4 .
Phan Q-S, Malacaria P ( 2014 ) . Abstract model counting: a novel approach for quantification of information leaks . AsiaCCS . 283 - 292 .
Panaousis EA, Fielder A, Malacaria P, Hankin C, Smeraldi F ( 2014 ) . Cybersecurity Games and Investments: A Decision Support Approach . GameSec . vol. 8840 , 266 - 286 .
Fielder A, Panaousis E, Malacaria P, Hankin C, Smeraldi F ( 2014 ) . Game Theory Meets Information Security Management . 15 - 29 .
Fielder A, Panaousis EA, Malacaria P, Hankin C, Smeraldi F ( 2014 ) . Game Theory Meets Information Security Management . SEC . vol. 428 , 15 - 29 .
Biondi F, Legay A, Nielsen BF, Malacaria P, Wasowski A ( 2014 ) . Information Leakage of Non-Terminating Processes . FSTTCS . vol. 29 , 517 - 529 .
Phan Q-S, Malacaria P, Pasareanu CS, d'Amorim M ( 2014 ) . Quantifying information leaks using reliability analysis . SPIN . 105 - 108 .
Abramsky S, Jagadeesan R, Malacaria P ( 2013 ) . Full Abstraction for PCF .
Abramsky S, Jagadeesan R, Malacaria P ( 2013 ) . Full Abstraction for PCF . CoRR vol. abs/1311.6125 ,
Hankin C, Malacaria P ( 2013 ) . Payoffs, Intensionality and Abstraction in Games . 69 - 82 .
Biondi F, Legay A, Malacaria P, Wasowski A ( 2013 ) . Quantifying Information Leakage of Randomized Protocols . VMCAI . vol. 7737 , 68 - 87 .
Huang X, Malacaria P ( 2013 ) . SideAuto: quantitative information flow for side-channel leakage in web applications . WPES285 - 290 .
Malacaria P, Smeraldi F ( 2013 ) . Thermodynamic aspects of confidentiality . Inf. Comput. vol. 226 , 76 - 93 .
Phan Q-S, Malacaria P, Tkachuk O, Păsăreanu CS ( 2012 ) . Symbolic quantitative information flow . ACM SIGSOFT Software Engineering Notes vol. 37 , ( 6 ) 1 - 5 .
Malacaria P, Smeraldi F ( 2012 ) . The Thermodynamics of Confidentiality . 2012 IEEE 25th Computer Security Foundations Symposium280 - 290 .
Köpf B, Malacaria P, Palamidessi C ( 2012 ) . Quantitative Security Analysis (Dagstuhl Seminar 12481) . Dagstuhl Reports vol. 2 , Article 11 , 135 - 154 .
Malacaria P, Smeraldi F ( 2012 ) . The Thermodynamics of Confidentiality . CSF . 280 - 290 .
Malacaria P ( 2011 ) . Algebraic Foundations for Information Theoretical, Probabilistic and Guessability measures of Information Flow .
Malacaria P ( 2011 ) . Algebraic Foundations for Information Theoretical, Probabilistic and Guessability measures of Information Flow . CoRR vol. abs/1101.3453 ,
Heusser J, Malacaria P ( 2010 ) . Quantifying Information Leak Vulnerabilities .
Malacaria P, Heusser J ( 2010 ) . Information Theory and Security: Quantitative Information Flow . SFM . vol. 6154 , 87 - 134 .
Malacaria P ( 2010 ) . Program Analysis Probably Counts: Discussant Contribution for the Computer Journal Lecture by Chris Hankin . Comput. J. vol. 53 , Article 6 , 881 - 881 .
Heusser J, Malacaria P ( 2010 ) . Quantifying Information Leak Vulnerabilities . CoRR vol. abs/1007.0918 ,
Heusser J, Malacaria P ( 2010 ) . Quantifying information leaks in software . ACSAC . 261 - 269 .
Malacaria P ( 2010 ) . Quantitative Information Flow: From Theory to Practice? . CAV . vol. 6174 , 20 - 22 .
Malacaria P ( 2010 ) . Risk assessment of security threats for looping constructs . J. Comput. Secur. vol. 18 , Article 2 , 191 - 228 .
Chen H, Malacaria P ( 2009 ) . Studying Maximum Information Leakage Using Karush-Kuhn-Tucker Conditions .
Heusser J, Malacaria P ( 2009 ) . Applied Quantitative Information Flow and Statistical Databases . Formal Aspects in Security and Trust . vol. 5983 , 96 - 110 .
MALACARIA P, SMERALDI F ( 2009 ) . On Adaboost and Optimal Betting Strategies . Conference: WORLDCOMP: The 2009 International Conference on Data Mining, DMIN 2009 ( Las Vegas ) from: 13/07/2009 to: 16/07/2009 , 326 - 332 .
Malacaria P, Smeraldi F ( 2009 ) . On Adaboost and Optimal Betting Strategies . DMIN . 326 - 332 .
Chen H, Malacaria P ( 2009 ) . Quantifying maximal loss of anonymity in protocols . AsiaCCS . 206 - 217 .
Chen H, Malacaria P ( 2009 ) . Studying Maximum Information Leakage Using Karush-Kuhn-Tucker Conditions . SECCO vol. 7 , 1 - 15 .
Chen H, Malacaria P ( 2009 ) . The Optimum Leakage Principle for Analyzing Multi-threaded Programs . ICITS . vol. 5973 , 177 - 193 .
Malacaria P, Chen H ( 2008 ) . Lagrange multipliers and maximum information leakage in different observational models . PLAS . 135 - 146 .
Malacaria P ( 2007 ) . Assessing security threats of looping constructs . ACM SIGPLAN Notices . vol. 42 , 225 - 235 .
Clark D, Hunt S, Malacaria P ( 2007 ) . A static analysis for quantifying information flow in a simple imperative language . J. Comput. Secur. vol. 15 , Article 3 , 321 - 371 .
Malacaria P ( 2007 ) . Assessing security threats of looping constructs . POPL . 225 - 235 .
Chen H, Malacaria P ( 2007 ) . Quantitative analysis of leakage for multi-threaded programs . PLAS . 31 - 40 .
Malacaria P, Hankin C ( 1998 ) . Generalised flowcharts and games . 363 - 374 .
Malacaria P, Hankin C ( 1998 ) . A new approach to control flow analysis . 95 - 108 .
Abramsky S, Malacaria P, Jagadeesan R ( 2005 ) . Full Abstraction for PCF (extended abstract) . Theoretical Aspects of Computer Software , vol. 789 , Springer Nature
Clark D, Hunt S, Malacaria P ( 2005 ) . Quantitative Information Flow, Relations and Polymorphic Types . J. Log. Comput. vol. 15 , Article 2 , 181 - 199 .
Clark D, Hunt S, Malacaria P ( 2004 ) . Quantified Interference for a While Language . QAPL vol. 112 , 149 - 166 .
Bucciarelli A, Malacaria P ( 2002 ) . Relative definability of boolean functions via hypergraphs . Theor. Comput. Sci. vol. 278 , Article 1-2 , 91 - 110 .
Clark D, Hunt S, Malacaria P ( 2001 ) . Quantitative Analysis of the Leakage of Confidential Data . QAPL vol. 59 , Article 3 , 238 - 251 .
Hankin C, Malacaria P ( 1999 ) . Program analysis games . ACM Computing Surveys vol. 31 , ( 3es ) 5 - 5 .
Malacaria P ( 1995 ) . Studying equivalences of transition systems with algebraic tools . Theoretical Computer Science vol. 139 , ( 1-2 ) 187 - 205 .
Malacaria P ( 1994 ) . Equivalences of Transition Systems in an Algebraic Framework . Workshops in Computing , Springer London
Américo A, Khouzani MHR, Malacaria P . Deterministic Channel Design for Minimum Leakage . Conference: 32nd IEEE Computer Security Foundations Symposium ( Hoboken, NJ, USA ) from: 25/06/2019 to: 28/06/2019 ,
Malacaria P, Hankin C . Non-deterministic games and program analysis: An application to security . Proceedings. 14th Symposium on Logic in Computer Science (Cat. No. PR00158)443 - 452 .
MALACARIA P . Quantifying information leaks in software . ACM 2010 . Conference: Twenty-Sixth Annual Computer Security Applications Conference, ACSAC 2010 ( Austin Texas ) from: 06/12/2010 to: 10/12/2010 , 261 - 269 .
Malacaria P, Regnier L . Some results on the interpretation of lambda -calculus in operator algebras . [1991] Proceedings Sixth Annual IEEE Symposium on Logic in Computer Science . Conference: Sixth Annual IEEE Symposium on Logic in Computer Science63 - 72 .
Ehrhard T, Malacaria P . Stone duality for stable functions . 1 - 15 .