Prof Pasquale Malacaria

Professor of Computer Science
School of Electronic Engineering and Computer Science
Queen Mary University of London
Queen Mary University of London
Research
information theory and program analysis, computer security, semantics of programming languages
Interests
I am interested in both the theoretical foundations of computer science and the practical implications and applications of the theoretical foundations.In particular, my theoretical interests focus on the use of information theory, logic and game theory to understand how information is transformed and leaked in computational processes.
On the applications side, I have worked on program analysis and the use of model-checkers to detect and quantify information leakage in programs and in side channels.
Publications
Publications of specific relevance to the Centre for Fundamentals of AI and Computational Theory2024
Smart topology detection using multi-armed bandit reinforcement learning methodSönmez FÖ Hankin C Malacaria P
Information Security Journal a Global Perspective, Taylor & Francis, 1-26.
10-12-2024
Dealing with uncertainty in cybersecurity decision supportZhang Y Malacaria P
Computers & Security, Elsevier vol. 148, 104153-104153.
10-10-2024
2023
Keep spending: Beyond optimal cyber-security investmentMalacaria P Zhang Y
2023 IEEE Computer Security Foundations Symposium.
01-07-2023
CROSS: A Framework for Cyber Risk Optimisation in Smart HomesZhang Y Malacaria P Loukas G Panaousis E
Computers and Security, Elsevier, 103250-103250.
05-04-2023
2022
Attack Dynamics: An Automatic Attack Graph Generation Framework Based on System Topology, CAPEC, CWE, and CVE Databaseszdemir S.nmez F Hankin C Malacaria P
Computers and Security, Elsevier vol. 123
14-10-2022
Decision support for healthcare cyber securitySönmez FÖ Hankin C Malacaria P
Computers and Security, Elsevier vol. 122, 102865-102865.
04-08-2022
Optimal Security Hardening over a Probabilistic Attack Graph: A Case Study of an Industrial Control System using CySecToolBuczkowski P Malacaria P Hankin C Fielder A
Sat-CPS '22: Proceedings of the 2022 ACM Workshop on Secure and Trustworthy Cyber-Physical Systems., 21-30.
28-04-2022
Optimal security hardening over a probabilistic attack graph: a case study of an industrial control system using the CySecTool toolBuczkowski P Malacaria P Hankin C Fielder A
In Arxiv
25-04-2022
Optimal Security Hardening over a Probabilistic Attack GraphBuczkowski P Malacaria P Hankin C Fielder A
Proceedings of the 2022 ACM Workshop on Secure and Trustworthy Cyber-Physical Systems., 21-30.
18-04-2022
Optimal Security Hardening over a Probabilistic Attack Graph: A Case Study of an Industrial Control System using CySecTool.Buczkowski P Malacaria P Hankin C Fielder A Gupta M Khorsandroo S Abdelsalam M
SAT-CPS@CODASPY., 21-30.
01-01-2022
2021
Channel-supermodular entropies: Order theory and an application to query anonymizationAmérico A Khouzani M Malacaria P
Entropy vol. 24 (1)
25-12-2021
Bayesian Stackelberg games for cyber-security decision supportZhang Y Malacaria P
Decision Support Systems, Elsevier vol. 148
15-05-2021
Optimization-Time Analysis for CybersecurityZhang Y Malacaria P
IEEE Transactions on Dependable and Secure Computing
01-02-2021
Concavity, Core-concavity, Quasiconcavity: A Generalizing Framework for Entropy Measures.Américo A Malacaria P
CSF., 1-14.
01-01-2021
2020
Conditional Entropy and Data Processing: an Axiomatic Approach Based on Core-ConcavityAmerico A Khouzani M Malacaria P
IEEE Transactions on Information Theory, Institute of Electrical and Electronics Engineers (IEEE), 1-1.
13-04-2020
QQIF: Quantum Quantitative Information Flow (invited paper)Américo A Malacaria P
2020 IEEE European Symposium on Security and Privacy Workshops (EuroS&PW). vol. 00, 261-270.
11-01-2020
PrefaceDi Pierro A Malacaria P Nagarajan R
01-01-2020
From Lambda Calculus to Cybersecurity Through Program Analysis - Essays Dedicated to Chris Hankin on the Occasion of His RetirementFrom Lambda Calculus to Cybersecurity Through Program Analysis. vol. 12065
01-01-2020
Conditional Entropy and Data Processing: An Axiomatic Approach Based on Core-Concavity.Américo A Khouzani MHR Malacaria P
IEEE Trans. Inf. Theory vol. 66, 5537-5547.
01-01-2020
2019
Scalable min-max multi-objective cyber-security optimisation over probabilistic attack graphsKhouzani MHR Liu Z Malacaria P
European Journal of Operational Research, Elsevier Bv
29-04-2019
Generalized Entropies and Metric-Invariant Optimal Countermeasures for Information Leakage Under Symmetric Constraints.Khouzani MHR Malacaria P
IEEE Trans. Inf. Theory vol. 65, 888-901.
01-02-2019
Pseudo-Random Number Generation Using Generative Adversarial NetworksDe Bernardi M Khouzani MHR Malacaria P
Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) vol. 11329 LNAI, 191-200.
01-01-2019
Core-concavity, Gain Functions and Axioms for Information LeakageAmérico A Khouzani MHR Malacaria P
In The Art of Modelling Computational Systems: a Journey From Logic and Concurrency to Security and Privacy, Springer Nature 261-275.
01-01-2019
Channel Ordering and SupermodularityAmerico A Malacaria P Khouzani MHR
2019 IEEE INFORMATION THEORY WORKSHOP (ITW)., 674-678.
01-01-2019
2018
Generalised Entropies and Metric-Invariant Optimal Countermeasures for Information Leakage under Symmetric ConstraintsMALACARIA P KHOUZANI MHR
IEEE Transactions on Information Theory, Institute of Electrical and Electronics Engineers vol. 65 (2), 888-901.
28-11-2018
Generalised Entropies and Metric-Invariant Optimal Countermeasures for Information Leakage under Symmetric ConstraintsKhouzani M Malacaria P
In Arxiv
23-11-2018
Information theory in game theoryKhouzani MHR Malacaria P
Entropy vol. 20 (11)
05-11-2018
Pseudo-Random Number Generation using Generative Adversarial NetworksDe Bernardi M Khouzani M Malacaria P
In Arxiv
30-09-2018
Optimal channel design: A game theoretical analysisKhouzani MHR Malacaria P
Entropy vol. 20 (9)
05-09-2018
Symbolic Side-Channel Analysis for Probabilistic Programs.Malacaria P Khouzani MHR Pasareanu CS Phan Q-S Luckow KS
Iacr Cryptol. Eprint Arch. vol. 2018, 329-329.
09-07-2018
Pseudo-Random Number Generation Using Generative Adversarial Networks.Bernardi MD Khouzani MHR Malacaria P Alzate C Monreale A Assem H Bifet A Buda TS et al.
Nemesis/UrbReas/SoGood/IWAISe/GDM@PKDD/ECML. vol. 11329, 191-200.
01-01-2018
2017
Synthesis of Adaptive Side-Channel AttacksMALACARIA P Phan Q-S Pasareanu C Bang L Bultan T
2017 IEEE Computer Security Foundations Symposium (CSF) Santa Barbara (California) 21 Aug 2017 - 25 Aug 2017.
25-09-2017
Leakage-Minimal Design: Universality, Limitations, and ApplicationsMALACARIA P Khouzani MHR
30th IEEE Computer Security Foundations Symposium Santa Barbara 21 Aug 2017 - 25 Aug 2017.
25-08-2017
Synthesis of Adaptive Side-Channel Attacks.Phan Q-S Bang L Pasareanu CS Malacaria P Bultan T
Iacr Cryptology Eprint Archive vol. 2017, 401-401.
09-05-2017
2016
Information leakage analysis of complex C code and its application to OpenSSLMALACARIA P TAUTCHNING M DISTEFANO D
7th International Symposium on Leveraging Applications CORFU 10 Oct 2016 - 14 Oct 2016.
05-10-2016
Efficient Numerical Frameworks for Multi-Objective Cyber Security PlanningKHOUZANI MHR MALACARIA P HANKIN C FIELDER A SMERALDI F
European Symposium on Research in Computer Security (ESORICS) 2016 Heraklion, Crete, Greece 26 Sep 2016 - 30 Sep 2016.
15-09-2016
Relative Perfect Secrecy: Universally Optimal Strategies and Channel DesignMALACARIA P Khouzani MHR
29th IEEE Computer Security Foundations Symposium Lisbon 27 Jun 2016 - 1 Jul 2016.
01-07-2016
Decision support approaches for cyber security investmentFielder A Panaousis E Malacaria P Hankin C Smeraldi F
Decision Support Systems vol. 86, 13-23.
19-03-2016
2015
Quantifying information leakage of randomized protocolsBiondi F Legay A Malacaria P Wasowski A
Theoretical Computer Science vol. 597, 62-87.
13-09-2015
Quantifying information leakage of randomized protocolsBiondi F Legay A Malacaria P Wąsowski A
Theoretical Computer Science, Elsevier vol. 597, 62-87.
01-09-2015
All-Solution Satisfiability Modulo Theories: Applications, Algorithms and BenchmarksPhan Q-S Malacaria P
Availability, Reliability and Security (ARES), 2015 10th International Conference on., 100-109.
01-08-2015
A Game-Theoretic Approach for Minimizing Security Risks in the Internet-of-ThingsRontidis G Panaousis E Laszka A Daziuklas T Malacaria P Alpcan T
2015 IEEE International Conference on Communication Workshop (ICCW)., 2639-2644.
01-06-2015
Comparing Decision Support Approaches for Cyber Security InvestmentFielder A Panaousis E Malacaria P Hankin C Smeraldi F
In Arxiv
19-02-2015
Concurrent Bounded Model CheckingPhan Q-S Malacaria P Pasareanu CS
Sigsoft Softw. Eng. Notes, Acm vol. 40, 1-5.
01-02-2015
2014
Information leakage of non-terminating processesBiondi F Legay A Nielsen BF Malacaria P Wąsowski A
Leibniz International Proceedings in Informatics Lipics. vol. 29, 517-529.
01-12-2014
Algebraic foundations for quantitative information flowMALACARIA P
Mathematical Structures in Computer Science, Cambridge University Press (Cup) vol. 25 (2), 404-428.
10-11-2014
How to spend itSmeraldi F Malacaria P
, Association For Computing Machinery (Acm), 1-4.
06-05-2014
Abstract Model Counting: A Novel Approach for Quantification of Information LeaksPhan Q-S Malacaria P
ASIA CCS '14 Proceedings of the 9th ACM symposium on Information, computer and communications security Kyoto, Japan 4 Jun 2014 - 6 Jun 2014., 283-292.
01-01-2014
Quantifying Information Leaks Using Reliability AnalysisPhan Q-S Malacaria P Pasareanu CS d Amorim M
SPIN 2014 Proceedings of the 2014 International SPIN Symposium on Model Checking of Software San Jose, CA. USA 21 Jul 2014 - 22 Jul 2014., 105-108.
01-01-2014
Cybersecurity Games and Investments: A Decision Support ApproachPanaousis E Fielder A Malacaria P Hankin C Smeraldi F
Lecture Notes in Computer Science. vol. 8840, 266-286.
01-01-2014
Game Theory Meets Information Security ManagementFielder A Panaousis E Malacaria P Hankin C Smeraldi F
IFIP Advances in Information and Communication Technology. vol. 428, 15-29.
01-01-2014
2013
Full Abstraction for PCFAbramsky S Jagadeesan R Malacaria P
In Arxiv
24-11-2013
Thermodynamic Aspects of ConfidentialityMALACARIA P SMERALDI F
Information and Computation vol. 226, 76-93.
01-05-2013
Quantifying Information Leakage of Randomized ProtocolsBiondi F Legay A MALACARIA P Wasowski A Giacobazzi R Berdine J Mastroeni I
14th International Conference on Verification, Model Checking, and Abstract Interpretation (VMCAI) Rome 20 Jan 2013 - 22 Jan 2013. vol. 7737, 68-87.
01-01-2013
Payoffs, Intensionality and Abstraction in Games.Hankin C Malacaria P Coecke B Ong L Panangaden P
Computation, Logic, Games, and Quantum Foundations. vol. 7860, 69-82.
01-01-2013
SideAuto: Quantitative information flow for side-channel leakage in web applicationsHuang X Malacaria P
Proceedings of The Acm Conference on Computer and Communications Security, 285-290.
01-01-2013
2012
The thermodynamics of confidentialityMalacaria P Smeraldi F
Proceedings of The Computer Security Foundations Workshop, 280-290.
05-10-2012
The Thermodynamics of ConfidentialityMALACARIA P SMERALDI F Cortier V Zdancewic S
25th IEEE Computer Security Foundations Symposium Harvard, MA, USA 25 Jun 2012 - 27 Jun 2012., 280-290.
01-01-2012
Symbolic quantitative information flow.Phan Q-S Malacaria P Tkachuk O Pasareanu CS
Acm Sigsoft Softw. Eng. Notes vol. 37, 1-5.
01-01-2012
Quantitative Security Analysis (Dagstuhl Seminar 12481).Köpf B Malacaria P Palamidessi C
Dagstuhl Reports vol. 2, 135-154.
01-01-2012
2011
Algebraic Foundations for Information Theoretical, Probabilistic and Guessability measures of Information FlowMalacaria P
In Arxiv
18-01-2011
Algebraic Foundations for Information Theoretical, Probabilistic and
Guessability measures of Information FlowMalacaria P
18-01-2011
2010
Quantifying Information Leak VulnerabilitiesHeusser J Malacaria P
In Arxiv
06-07-2010
Program Analysis Probably Counts: Discussant Contribution for the Computer Journal Lecture by Chris HankinMalacaria P
Comput J vol. 53 (6), 881-881.
01-07-2010
Risk assessment of security threats for looping constructs.Malacaria P
Journal of Computer Security, Ios Press vol. 18, 191-228.
22-03-2010
The Optimum Leakage Principle for Analyzing Multi-threaded ProgramsChen H Malacaria P Kurosawa K
INFORMATION THEORETIC SECURITY. vol. 5973, 177-193.
01-01-2010
Quantifying information leaks in softwareHeusser J MALACARIA P
Twenty-Sixth Annual Computer Security Applications Conference, ACSAC 2010 Austin Texas 6 Dec 2010 - 10 Dec 2010., 261-269.
01-01-2010
Applied Quantitative Information Flow and Statistical DatabasesHeusser J Malacaria P Degano P Guttman JD
FORMAL ASPECTS IN SECURITY AND TRUST. vol. 5983, 96-110.
01-01-2010
Quantitative Information Flow: From Theory to Practice?Malacaria P Touili T Cook B Jackson P
COMPUTER AIDED VERIFICATION, PROCEEDINGS. vol. 6174, 20-22.
01-01-2010
Information Theory and Security: Quantitative Information FlowMalacaria P Heusser J Aldini A Bernardo M Di Pierro A Wiklicky H
FORMAL METHODS FOR QUANTITATIVE ASPECTS OF PROGRAMMING LANGUAGES. vol. 6154, 87-134.
01-01-2010
2009
Studying Maximum Information Leakage Using Karush-Kuhn-Tucker ConditionsChen H Malacaria P
Eptcs 7, 2009, Pp. 1-15
21-10-2009
On Adaboost and optimal betting strategiesMalacaria P Smeraldi F
Proceedings of the 5th International Conference on Data Mining (DMIN/WORLDCOMP)., 326–332-326–332.
01-07-2009
On Adaboost and Optimal Betting StrategiesMALACARIA P SMERALDI F
WORLDCOMP: The 2009 International Conference on Data Mining, DMIN 2009 Las Vegas 13 Jul 2009 - 16 Jul 2009., 326-332.
01-01-2009
Quantifying maximal loss of anonymity in protocolsCHEN H MALACARIA P
Proceedings of the 2009 ACM Symposium on Information, Computer and Communications Security, ASIACCS 2009 Sydney, Australia 1 Jan 1970., 206-217.
01-01-2009
2008
Lagrange Multipliers and Maximum Information Leakage in Different Observational ModelsMalacaria P Chen H
PLAS'08: PROCEEDINGS OF THE ACM SIGPLAN THIRD WORKSHOP ON PROGRAMMING LANGUAGES AND ANALYSIS FOR SECURITY., 135-146.
01-01-2008
2007
A static analysis for quantifying the information flow in a simple imperative languageMALACARIA P Hunt S Clark D
Journal of Computer Security vol. 15 (3), 321-371.
01-03-2007
Quantitative Analysis of Leakage for Multi-threaded ProgramsChen H Malacaria P
PLAS'07: PROCEEDINGS OF THE 2007 ACM SIGPLAN WORKSHOP ON PROGRAMMING LANGUAGES AND ANALYSIS FOR SECURITY., 31-40.
01-01-2007
Assessing security threats of looping constructsMalacaria P
ACM SIGPLAN NOTICES. vol. 42 (1), 225-235.
01-01-2007
Assessing Security Threats of Looping ConstructsMalacaria P
CONFERENCE RECORD OF POPL 2007: THE 34TH ACM SIGPLAN SIGACT SYMPOSIUM ON PRINCIPLES OF PROGAMMING LANGUAGES., 225-235.
01-01-2007
2005
Quantitative information flow, relations and polymorphic typesClark D Hunt S Malacaria P
J Logic Comput vol. 15 (2), 181-199.
01-04-2005
Quantified Interference for a while LanguageClark D Hunt S Malacaria P
Electronic Notes in Theoretical Computer Science vol. 112 (SPEC. ISS.), 149-166.
02-01-2005
2002
Relative definability of boolean functions via hypergraphsBucciarelli A Malacaria P
Theor Comput Sci vol. 278 (1-2), 91-110.
06-05-2002
Quantitative Analysis of the Leakage of Confidential DataMALACARIA P Clark D Hunt S
Electronic Notes in Theoretical Computer Science vol. 59 (3)
01-01-2002
2000
Full abstraction for PCFAbramsky S Jagadeesan R Malacaria P
Inform Comput vol. 163 (2), 409-470.
15-12-2000
1999
Program analysis gamesHankin C Malacaria P
Acm Computing Surveys, Association For Computing Machinery (Acm) vol. 31 (3es)
01-09-1999
Non-deterministic games and program analysis: An application to securityMalacaria P Hankin C
2015 30th Annual Acm/IEEE Symposium on Logic in Computer Science, Institute of Electrical and Electronics Engineers (IEEE), 443-452.
01-01-1999
1998
A new approach to control flow analysisMalacaria P Hankin C
Lecture Notes in Computer Science. vol. 1383, 95-108.
01-01-1998
Generalised flowcharts and gamesMalacaria P Hankin C
Lecture Notes in Computer Science. vol. 1443, 363-374.
01-01-1998
1995
Studying equivalences of transition systems with algebraic toolsMalacaria P
Theoretical Computer Science, Elsevier vol. 139 (1-2), 187-205.
01-03-1995
1994
Full abstraction for PCFAbramsky S Malacaria P Jagadeesan R
Lecture Notes in Computer Science Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics. vol. 789 LNCS, 1-15.
01-01-1994
Full Abstraction for PCF (extended abstract)Abramsky S Malacaria P Jagadeesan R
In Theoretical Aspects of Computer Software, Springer Nature 1-15.
01-01-1994
Equivalences of Transition Systems in an Algebraic FrameworkMalacaria P
In Algebraic Methodology and Software Technology (Amast’93), Springer Nature 263-270.
01-01-1994
1991
Stone duality for stable functionsEhrhard T Malacaria P
Lecture Notes in Computer Science. vol. 530, 1-15.
01-01-1991
Some results on the interpretation of lambda -calculus in operator algebrasMalacaria P Regnier L
[1991] Proceedings Sixth Annual IEEE Symposium on Logic in Computer Science., 63-72.
01-01-1991
Quantifying information leaks in softwareMALACARIA P
Twenty-Sixth Annual Computer Security Applications Conference, ACSAC 2010 Austin Texas 6 Dec 2010 - 10 Dec 2010., 261-269.
Game theory meets information security managementFielder A Panaousis E Malacaria P Hankin C Smeraldi F
29th IFIP TC-11 International Information Security and Privacy Conference (SEC2014) Marrakech (Morocco) 2 Jun 2014 - 4 Jun 2014., 15-29.
Multi-run side-channel analysis using Symbolic Execution and Max-SMTMALACARIA P Pasareanu C Phan Q-S
29th IEEE Computer Security Foundations Symposium Lisbon 27 Jun 2016 - 1 Jul 2016.
Symbolic Side-Channel Analysis for Probabilistic ProgramsMALACARIA P Khouzani MHR Pasareanu C Phan Q-S Luckow K
2018 IEEE Computer Security Foundations Symposium Oxford 9 Jul 2018 - 12 Jul 2018.
Malware Detection Using 1-Dimensional Convolutional Neural NetworksMalacaria P Sharma A Khouzani MHR
Workshop on Machine Learning for Cyber-Crime Investigation and Cybersecurity (MaL2CSec).
Deterministic Channel Design for Minimum LeakageAmérico A Khouzani MHR Malacaria P
32nd IEEE Computer Security Foundations Symposium Hoboken, NJ, USA 25 Jun 2019 - 28 Jun 2019.
Channel Ordering and SupermodularityAmérico A Malacaria P Khouzani MHR
IEEE Information Theory Workshop.
QQIF: Quantum Quantitative Information FlowMalacaria P Passos De Rezende A
Hot Issues in Security Principles and Trust (HotSpot 2020) 7 Sep 2020.
Concavity, Core-concavity, Quasiconcavity: A Generalizing Framework for Entropy MeasuresArthur Americo PDR Malacaria P
34th IEEE Computer Security Foundations Symposium.
Grants
Grants of specific relevance to the Centre for Fundamentals of AI and Computational Theory
Unrestricted donation: Formal verification of privacy propertiesPasquale Malacaria
£58,029 Meta Platforms Inc
01-10-2022 - 31-12-2025
CHAI: Cyber Hygiene in AI enabled domestic lifePasquale Malacaria
£329,505 EPSRC Engineering and Physical Sciences Research Council
01-12-2020 - 30-11-2023
Optimal Cybersecurity InvestmentPasquale Malacaria
£388,777 EPSRC Engineering and Physical Sciences Research Council
01-08-2017 - 31-07-2021
Research Group
News
No news items found.
