Professor Pasquale Malacaria, PhDProfessor of Computer ScienceEmail: p.malacaria@qmul.ac.ukTelephone: +44 20 7882 6378Room Number: Peter Landin, CS 428Website: http://www.eecs.qmul.ac.uk/~pmOffice Hours: Wednesday 13:00-15:00TeachingResearchPublicationsTeachingLogic in Computer Science (Postgraduate)The module introduces students to Mathematical Logic concepts and their use in Computer Science. The topics covered include: - Propositional Logic and Introduction to Critical Thinking - Solving SAT instances. DPLL algorithm, validity, satisfiability, SAT solvers - Temporal Logics. For example: Linear Temporal Logic, Computation Tree Logic, model checkers (e.g. SPIN) - Predicate Logic. First-order logic, syntax and semantics, satisfiability, SMT solvers - Program Logics. For example, Hoare logic. The module will include exercises and hands-on practicals e.g. using SAT solvers and model checkers.Object-Oriented Programming (Undergraduate)Major topics include the concepts of class, object, method, subclass, inheritance and their use in programming. The relevance of the object oriented style with respect to concrete software problems will be stressed both in lectures and labs. There will be two hours of lectures per week, and each student will have a weekly timetabled lab session. In addition, you will be expected to spend further time outside scheduled lab periods in the lab (or at home machines if they are available), and to read textbooks and review notes.ResearchResearch Interests:Information theory and program analysis, computer security, semantics of programming languagesPublications Malacaria P, Zhang Y (2023). Keep spending: Beyond optimal cyber-security investment. 2023 IEEE Computer Security Foundations Symposium DOI: 10.1109/CSF57540.2023.00024 QMRO: https://qmro.qmul.ac.uk/xmlui/handle/123456789/86903 Zhang Y, Malacaria P, Loukas G et al. (2023). CROSS: A Framework for Cyber Risk Optimisation in Smart Homes. nameOfConference DOI: 10.1016/j.cose.2023.103250 QMRO: https://qmro.qmul.ac.uk/xmlui/handle/123456789/86902 zdemir S.nmez F, Hankin C, Malacaria P (2022). Attack Dynamics: An Automatic Attack Graph Generation Framework Based on System Topology, CAPEC, CWE, and CVE Databases. nameOfConference DOI: 10.1016/j.cose.2022.102938 QMRO: https://uat2-qmro.qmul.ac.uk/xmlui/handle/123456789/82385 Sönmez FÖ, Hankin C, Malacaria P (2022). Decision support for healthcare cyber security. nameOfConference DOI: 10.1016/j.cose.2022.102865 QMRO: https://uat2-qmro.qmul.ac.uk/xmlui/handle/123456789/80221 Buczkowski P, Malacaria P, Hankin C et al. (2022). Optimal Security Hardening over a Probabilistic Attack Graph. Proceedings of the 2022 ACM Workshop on Secure and Trustworthy Cyber-Physical Systems DOI: 10.1145/3510547.3517919 QMRO: https://uat2-qmro.qmul.ac.uk/xmlui/handle/123456789/80223 Buczkowski P, Malacaria P, Hankin C et al. (2022). Optimal Security Hardening over a Probabilistic Attack Graph: A Case Study of an Industrial Control System using CySecTool. nameOfConference DOI: 10.1145/3510547.3517919 QMRO: https://uat2-qmro.qmul.ac.uk/xmlui/handle/123456789/84505 Buczkowski P, Malacaria P, Hankin C et al. (2022). Optimal Security Hardening over a Probabilistic Attack Graph: A Case Study of an Industrial Control System using CySecTool.. nameOfConference DOI: doi QMRO: qmroHref Américo A, Khouzani M, Malacaria P (2021). Channel-supermodular entropies: Order theory and an application to query anonymization. nameOfConference DOI: 10.3390/e24010039 QMRO: https://uat2-qmro.qmul.ac.uk/xmlui/handle/123456789/77022 Américo A, Malacaria P (2021). Concavity, Core-concavity, Quasiconcavity: A Generalizing Framework for Entropy Measures. 2021 IEEE 34th Computer Security Foundations Symposium (CSF) DOI: 10.1109/csf51468.2021.00021 QMRO: https://uat2-qmro.qmul.ac.uk/xmlui/handle/123456789/71144 Zhang Y, Malacaria P (2021). Bayesian Stackelberg games for cyber-security decision support. nameOfConference DOI: 10.1016/j.dss.2021.113599 QMRO: https://uat2-qmro.qmul.ac.uk/xmlui/handle/123456789/74640 Zhang Y, Malacaria P (2021). Optimization-Time Analysis for Cybersecurity. nameOfConference DOI: 10.1109/TDSC.2021.3055981 QMRO: https://uat2-qmro.qmul.ac.uk/xmlui/handle/123456789/74641 Américo A, Malacaria P (2021). Concavity, Core-concavity, Quasiconcavity: A Generalizing Framework for Entropy Measures.. nameOfConference DOI: doi QMRO: qmroHref Americo A, Khouzani M, Malacaria P (2020). Conditional Entropy and Data Processing: an Axiomatic Approach Based on Core-Concavity. nameOfConference DOI: 10.1109/tit.2020.2987713 QMRO: https://uat2-qmro.qmul.ac.uk/xmlui/handle/123456789/65218 Américo A, Malacaria P (2020). QQIF: Quantum Quantitative Information Flow (invited paper). 2020 IEEE European Symposium on Security and Privacy Workshops (EuroS&PW) DOI: 10.1109/eurospw51379.2020.00042 QMRO: https://uat2-qmro.qmul.ac.uk/xmlui/handle/123456789/71143 Américo A, Khouzani MHR, Malacaria P (2020). Conditional Entropy and Data Processing: An Axiomatic Approach Based on Core-Concavity.. nameOfConference DOI: 10.1109/TIT.2020.2987713 QMRO: qmroHref (2020). From Lambda Calculus to Cybersecurity Through Program Analysis - Essays Dedicated to Chris Hankin on the Occasion of His Retirement. nameOfConference DOI: doi QMRO: qmroHref Di Pierro A, Malacaria P, Nagarajan R (2020). Preface. nameOfConference DOI: doi QMRO: qmroHref Americo A, Malacaria P (2020). QQIF: Quantum Quantitative Information Flow. nameOfConference DOI: 10.1109/EuroSPW51379.2020.00042 QMRO: https://uat2-qmro.qmul.ac.uk/xmlui/handle/123456789/67179 Américo A, Khouzani MHR, Malacaria P (2019). Core-concavity, Gain Functions and Axioms for Information Leakage. nameOfConference DOI: 10.1007/978-3-030-31175-9_15 QMRO: qmroHref Américo A, Malacaria P, Khouzani M (2019). Channel Ordering and Supermodularity. 2019 IEEE Information Theory Workshop (ITW) DOI: 10.1109/itw44776.2019.8989409 QMRO: https://uat2-qmro.qmul.ac.uk/xmlui/handle/123456789/59171 Américo A, Khouzani M, Malacaria P (2019). Deterministic Channel Design for Minimum Leakage. nameOfConference DOI: 10.1109/csf.2019.00036 QMRO: https://uat2-qmro.qmul.ac.uk/xmlui/handle/123456789/59173 Sharma A, Malacaria P, Khouzani M (2019). Malware Detection Using 1-Dimensional Convolutional Neural Networks. 2019 IEEE European Symposium on Security and Privacy Workshops (EuroS&PW) DOI: 10.1109/eurospw.2019.00034 QMRO: https://uat2-qmro.qmul.ac.uk/xmlui/handle/123456789/59174 Khouzani MHR, Liu Z, Malacaria P (2019). Scalable min-max multi-objective cyber-security optimisation over probabilistic attack graphs. nameOfConference DOI: 10.1016/j.ejor.2019.04.035 QMRO: https://uat2-qmro.qmul.ac.uk/xmlui/handle/123456789/57877 Khouzani MHR, Malacaria P (2019). Generalized Entropies and Metric-Invariant Optimal Countermeasures for Information Leakage Under Symmetric Constraints.. nameOfConference DOI: 10.1109/TIT.2018.2883705 QMRO: qmroHref Americo A, Malacaria P, Khouzani MHR (2019). Channel Ordering and Supermodularity. nameOfConference DOI: 10.1109/itw44776.2019.8989409 QMRO: qmroHref De Bernardi M, Khouzani MHR, Malacaria P (2019). Pseudo-Random Number Generation Using Generative Adversarial Networks. nameOfConference DOI: 10.1007/978-3-030-13453-2_15 QMRO: https://uat2-qmro.qmul.ac.uk/xmlui/handle/123456789/53439 MALACARIA P, KHOUZANI MHR (2019). Generalised Entropies and Metric-Invariant Optimal Countermeasures for Information Leakage under Symmetric Constraints. nameOfConference DOI: 10.1109/TIT.2018.2883705 QMRO: https://uat2-qmro.qmul.ac.uk/xmlui/handle/123456789/54950 Khouzani MHR, Malacaria P (2018). Information theory in game theory. nameOfConference DOI: 10.3390/e20110817 QMRO: https://uat2-qmro.qmul.ac.uk/xmlui/handle/123456789/54685 Khouzani MHR, Malacaria P (2018). Optimal channel design: A game theoretical analysis. nameOfConference DOI: 10.3390/e20090675 QMRO: https://uat2-qmro.qmul.ac.uk/xmlui/handle/123456789/48263 Malacaria P, Khouzani M, Pasareanu CS et al. (2018). Symbolic side-channel analysis for probabilistic programs. 2018 IEEE Computer Security Foundations Symposium. DOI: 10.1109/CSF.2018.00030 QMRO: https://uat2-qmro.qmul.ac.uk/xmlui/handle/123456789/38004 Malacaria P, Khouzani MHR, Pasareanu CS et al. (2018). Symbolic Side-Channel Analysis for Probabilistic Programs.. nameOfConference DOI: 10.1109/CSF.2018.00030 QMRO: qmroHref Bernardi MD, Khouzani MHR, Malacaria P (2018). Pseudo-Random Number Generation Using Generative Adversarial Networks.. nameOfConference DOI: doi QMRO: qmroHref MALACARIA P, Phan Q-S, Pasareanu C et al. (2017). Synthesis of Adaptive Side-Channel Attacks. 2017 IEEE Computer Security Foundations Symposium (CSF) DOI: 10.1109/CSF.2017.8 QMRO: https://uat2-qmro.qmul.ac.uk/xmlui/handle/123456789/23889 Khouzani M, Malacaria P (2017). Leakage-Minimal Design: Universality, Limitations, and Applications. 2017 IEEE 30th Computer Security Foundations Symposium (CSF) DOI: 10.1109/csf.2017.40 QMRO: https://uat2-qmro.qmul.ac.uk/xmlui/handle/123456789/24948 Phan Q-S, Bang L, Pasareanu CS et al. (2017). Synthesis of Adaptive Side-Channel Attacks.. nameOfConference DOI: doi QMRO: https://uat2-qmro.qmul.ac.uk/xmlui/handle/123456789/57876 MALACARIA P, TAUTCHNING M, DISTEFANO D (2016). Information leakage analysis of complex C code and its application to OpenSSL. 7th International Symposium on Leveraging Applications DOI: 10.1007/978-3-319-47166-2_63 QMRO: https://uat2-qmro.qmul.ac.uk/xmlui/handle/123456789/13880 KHOUZANI MHR, MALACARIA P, HANKIN C et al. (2016). Efficient Numerical Frameworks for Multi-Objective Cyber Security Planning. European Symposium on Research in Computer Security (ESORICS) 2016 DOI: 10.1007/978-3-319-45741-3_10 QMRO: https://uat2-qmro.qmul.ac.uk/xmlui/handle/123456789/13487 Pasareanu CS, Phan Q-S, Malacaria P (publicationYear). Multi-run Side-Channel Analysis Using Symbolic Execution and Max-SMT. 2016 IEEE 29th Computer Security Foundations Symposium (CSF) DOI: 10.1109/csf.2016.34 QMRO: https://uat2-qmro.qmul.ac.uk/xmlui/handle/123456789/12478 Khouzani MHR, Malacaria P (publicationYear). Relative Perfect Secrecy: Universally Optimal Strategies and Channel Design. 2016 IEEE 29th Computer Security Foundations Symposium (CSF) DOI: 10.1109/csf.2016.12 QMRO: https://uat2-qmro.qmul.ac.uk/xmlui/handle/123456789/12477 Fielder A, Panaousis E, Malacaria P et al. (publicationYear). Decision support approaches for cyber security investment. nameOfConference DOI: 10.1016/j.dss.2016.02.012 QMRO: https://uat2-qmro.qmul.ac.uk/xmlui/handle/123456789/12356 Biondi F, Legay A, Malacaria P et al. (2015). Quantifying information leakage of randomized protocols. nameOfConference DOI: 10.1016/j.tcs.2015.07.034 QMRO: qmroHref Biondi F, Legay A, Malacaria P et al. (2015). Quantifying information leakage of randomized protocols. nameOfConference DOI: 10.1016/j.tcs.2015.07.034 QMRO: qmroHref Phan Q-S, Malacaria P (2015). All-Solution Satisfiability Modulo Theories: Applications, Algorithms and Benchmarks. nameOfConference DOI: 10.1109/ARES.2015.14 QMRO: https://uat2-qmro.qmul.ac.uk/xmlui/handle/123456789/10997 Rontidis G, Panaousis E, Laszka A et al. (2015). A Game-Theoretic Approach for Minimizing Security Risks in the Internet-of-Things. 2015 IEEE International Conference on Communication Workshop (ICCW) DOI: 10.1109/iccw.2015.7247577 QMRO: qmroHref Fielder A, Panaousis E, Malacaria P et al. (2015). Comparing Decision Support Approaches for Cyber Security Investment. nameOfConference DOI: doi QMRO: https://uat2-qmro.qmul.ac.uk/xmlui/handle/123456789/12516 Phan Q-S, Malacaria P, Pasareanu CS (2015). Concurrent Bounded Model Checking. nameOfConference DOI: 10.1145/2693208.2693240 QMRO: https://uat2-qmro.qmul.ac.uk/xmlui/handle/123456789/6899 Biondi F, Legay A, Nielsen BF et al. (2014). Information leakage of non-terminating processes. nameOfConference DOI: 10.4230/LIPIcs.FSTTCS.2014.517 QMRO: qmroHref MALACARIA P (2015). Algebraic foundations for quantitative information flow. nameOfConference DOI: 10.1017/s0960129513000649 QMRO: qmroHref Phan Q-S, Malacaria P (2014). Abstract Model Counting: A Novel Approach for Quantification of Information Leaks. ASIA CCS '14 Proceedings of the 9th ACM symposium on Information, computer and communications security DOI: 10.1145/2590296.2590328 QMRO: https://uat2-qmro.qmul.ac.uk/xmlui/handle/123456789/6120 Panaousis E, Fielder A, Malacaria P et al. (2014). Cybersecurity Games and Investments: A Decision Support Approach. nameOfConference DOI: 10.1007/978-3-319-12601-2_15 QMRO: qmroHref Fielder A, Panaousis E, Malacaria P et al. (2014). Game Theory Meets Information Security Management. nameOfConference DOI: 10.1007/978-3-642-55415-5_2 QMRO: https://uat2-qmro.qmul.ac.uk/xmlui/handle/123456789/31355 Smeraldi F, Malacaria P (2014). How to spend it: Optimal investment for cyber security. nameOfConference DOI: 10.1145/2602945.2602952 QMRO: qmroHref Phan Q-S, Malacaria P, Pasareanu CS et al. (2014). Quantifying Information Leaks Using Reliability Analysis. SPIN 2014 Proceedings of the 2014 International SPIN Symposium on Model Checking of Software DOI: 10.1145/2632362.2632367 QMRO: https://uat2-qmro.qmul.ac.uk/xmlui/handle/123456789/6119 Huang X, Malacaria P (2013). SideAuto: Quantitative information flow for side-channel leakage in web applications. nameOfConference DOI: 10.1145/2517840.2517869 QMRO: qmroHref MALACARIA P, SMERALDI F (2013). Thermodynamic Aspects of Confidentiality. nameOfConference DOI: 10.1016/j.ic.2013.03.006 QMRO: qmroHref Hankin C, Malacaria P (2013). Payoffs, Intensionality and Abstraction in Games.. nameOfConference DOI: 10.1007/978-3-642-38164-5_6 QMRO: qmroHref Biondi F, Legay A, MALACARIA P et al. (2013). Quantifying Information Leakage of Randomized Protocols. 14th International Conference on Verification, Model Checking, and Abstract Interpretation (VMCAI) DOI: 10.1007/978-3-642-35873-9_7 QMRO: qmroHref Malacaria P, Smeraldi F (2012). The thermodynamics of confidentiality. nameOfConference DOI: 10.1109/CSF.2012.18 QMRO: qmroHref Köpf B, Malacaria P, Palamidessi C (2012). Quantitative Security Analysis (Dagstuhl Seminar 12481).. nameOfConference DOI: 10.4230/DagRep.2.11.135 QMRO: qmroHref Phan Q-S, Malacaria P, Tkachuk O et al. (2012). Symbolic quantitative information flow.. nameOfConference DOI: 10.1145/2382756.2382791 QMRO: https://uat2-qmro.qmul.ac.uk/xmlui/handle/123456789/6239 MALACARIA P, SMERALDI F (2012). The Thermodynamics of Confidentiality. 25th IEEE Computer Security Foundations Symposium DOI: 10.1109/CSF.2012.18 QMRO: qmroHref Malacaria P (2011). Algebraic Foundations for Information Theoretical, Probabilistic and Guessability measures of Information Flow. nameOfConference DOI: doi QMRO: https://uat2-qmro.qmul.ac.uk/xmlui/handle/123456789/13605 Heusser J, Malacaria P (2010). Quantifying Information Leak Vulnerabilities. nameOfConference DOI: doi QMRO: qmroHref Malacaria P (2010). Program Analysis Probably Counts: Discussant Contribution for the Computer Journal Lecture by Chris Hankin. nameOfConference DOI: 10.1093/comjnl/bxp037 QMRO: qmroHref Malacaria P (2010). Risk assessment of security threats for looping constructs.. nameOfConference DOI: 10.3233/JCS-2010-0360 QMRO: qmroHref Heusser J, Malacaria P (2010). Applied Quantitative Information Flow and Statistical Databases. nameOfConference DOI: 10.1007/978-3-642-12459-4_8 QMRO: qmroHref Malacaria P, Heusser J (2010). Information Theory and Security: Quantitative Information Flow. nameOfConference DOI: 10.1007/978-3-642-13678-8_3 QMRO: qmroHref Heusser J, MALACARIA P (2010). Quantifying information leaks in software. Twenty-Sixth Annual Computer Security Applications Conference, ACSAC 2010 DOI: 10.1145/1920261.1920300 QMRO: qmroHref Malacaria P (2010). Quantitative Information Flow: From Theory to Practice?. nameOfConference DOI: 10.1007/978-3-642-14295-6_3 QMRO: qmroHref Chen H, Malacaria P (2010). The Optimum Leakage Principle for Analyzing Multi-threaded Programs. nameOfConference DOI: 10.1007/978-3-642-14496-7_15 QMRO: qmroHref Chen H, Malacaria P (2009). Studying Maximum Information Leakage Using Karush-Kuhn-Tucker Conditions. nameOfConference DOI: 10.4204/EPTCS.7.1 QMRO: https://uat2-qmro.qmul.ac.uk/xmlui/handle/123456789/13606 Malacaria P, Smeraldi F (2009). On Adaboost and optimal betting strategies. nameOfConference DOI: doi QMRO: qmroHref MALACARIA P, SMERALDI F (2009). On Adaboost and Optimal Betting Strategies. WORLDCOMP: The 2009 International Conference on Data Mining, DMIN 2009 DOI: doi QMRO: qmroHref CHEN H, MALACARIA P (2009). Quantifying maximal loss of anonymity in protocols. Proceedings of the 2009 ACM Symposium on Information, Computer and Communications Security, ASIACCS 2009 DOI: 10.1145/1533057.1533087 QMRO: qmroHref Malacaria P, Chen H (2008). Lagrange Multipliers and Maximum Information Leakage in Different Observational Models. nameOfConference DOI: 10.1145/1375696.1375713 QMRO: qmroHref MALACARIA P, Hunt S, Clark D (2007). A static analysis for quantifying the information flow in a simple imperative language. nameOfConference DOI: 10.3233/JCS-2007-15302 QMRO: qmroHref Malacaria P (2007). Assessing Security Threats of Looping Constructs. nameOfConference DOI: 10.1145/1190215.1190251 QMRO: qmroHref Malacaria P (2007). Assessing security threats of looping constructs. nameOfConference DOI: 10.1145/1190216.1190251 QMRO: qmroHref Chen H, Malacaria P (2007). Quantitative Analysis of Leakage for Multi-threaded Programs. nameOfConference DOI: 10.1145/1255329.1255335 QMRO: qmroHref Malacaria P, Hankin C (1998). Generalised flowcharts and games. nameOfConference DOI: 10.1007/bfb0055067 QMRO: qmroHref Malacaria P, Hankin C (1998). A new approach to control flow analysis. nameOfConference DOI: 10.1007/bfb0026425 QMRO: qmroHref Ehrhard T, Malacaria P (1991). Stone duality for stable functions. nameOfConference DOI: 10.1007/bfb0013453 QMRO: qmroHref Abramsky S, Malacaria P, Jagadeesan R (1994). Full Abstraction for PCF (extended abstract). nameOfConference DOI: 10.1007/3-540-57887-0_87 QMRO: qmroHref Clark D, Hunt S, Malacaria P (2005). Quantitative information flow, relations and polymorphic types. nameOfConference DOI: 10.1093/logcom/exi009 QMRO: qmroHref Clark D, Hunt S, Malacaria P (2005). Quantified Interference for a while Language. nameOfConference DOI: 10.1016/j.entcs.2004.01.018 QMRO: qmroHref Bucciarelli A, Malacaria P (2002). Relative definability of boolean functions via hypergraphs. nameOfConference DOI: 10.1016/S0304-3975(00)00332-7 QMRO: qmroHref MALACARIA P, Clark D, Hunt S (2002). Quantitative Analysis of the Leakage of Confidential Data. nameOfConference DOI: 10.1016/S1571-0661(04)00290-7 QMRO: qmroHref Abramsky S, Jagadeesan R, Malacaria P (2000). Full abstraction for PCF. nameOfConference DOI: 10.1006/inco.2000.2930 QMRO: https://uat2-qmro.qmul.ac.uk/xmlui/handle/123456789/13604 Hankin C, Malacaria P (1999). Program analysis games. nameOfConference DOI: 10.1145/333580.333584 QMRO: qmroHref Malacaria P, Hankin C (1999). Non-deterministic games and program analysis: An application to security. nameOfConference DOI: 10.1109/lics.1999.782639 QMRO: qmroHref Malacaria P (1995). Studying equivalences of transition systems with algebraic tools. nameOfConference DOI: 10.1016/0304-3975(94)00047-m QMRO: qmroHref Malacaria P (1994). Equivalences of Transition Systems in an Algebraic Framework. nameOfConference DOI: 10.1007/978-1-4471-3227-1_27 QMRO: qmroHref Abramsky S, Malacaria P, Jagadeesan R (1994). Full abstraction for PCF. nameOfConference DOI: 10.1007/3-540-57887-0_87 QMRO: qmroHref Malacaria P, Regnier L (1991). Some results on the interpretation of lambda -calculus in operator algebras. [1991] Proceedings Sixth Annual IEEE Symposium on Logic in Computer Science DOI: 10.1109/lics.1991.151631 QMRO: qmroHref