| Title: | 
						Reliably determining data leakage in the presence of strong attackers | 
					
					
						| Article URLs: | 
						
							
						 | 
					
					
						| Alternative Article URLs: | 
						 | 
					
					
						| Authors: | 
						Riccardo Bortolameotti | 
						
							
						 | 
					
					
						| Andreas Peter | 
						
							
						 | 
					
					
						| Maarten H. Everts | 
						
							
						 | 
					
					
						| Willem Jonker | 
						
							
								- 
									University of Twente
								
 
								- 
									EIT Digital
								
 
							 
						 | 
					
					
						| Pieter H. Hartel | 
						
							
						 | 
					
					
						| Sharing: | 
						
							Not able to share produced artifacts
						 | 
					
					
						| Verification: | 
						
							Authors have
							verified
							information
						 | 
					
					
						| Artifact Evaluation Badge: | 
						
							none
						 | 
					
					
						| Artifact URLs: | 
						
							
						 | 
					
					
						| Artifact Correspondence Email Addresses: | 
						
							
						 | 
					
					
						| NSF Award Numbers: | 
						
						 | 
					
					
						| DBLP Key: | 
						
							conf/acsac/BortolameottiPE16
						 | 
					
					
						| Author Comments: |  
						The dataset we used for the results in 8.2 contained sensitive information, therefore we cannot share it. The code is not available anymore, however it was a script implementing the formula discussed in Section 7.3. |