2013
DOI: 10.1007/978-3-642-39799-8_47
|View full text |Cite
|
Sign up to set email alerts
|

A Tool for Estimating Information Leakage

Abstract: Abstract. We present leakiEst, a tool that estimates how much information leaks from systems. To use leakiEst, an analyst must run a system with a range of secret values and record the outputs that may be exposed to an attacker. Our tool then estimates the amount of information leaked from the secret values to the observable outputs of the system. Importantly, our tool calculates the confidence intervals for these estimates, and tests whether they represent real evidence of an information leak in the system. l… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
33
0

Year Published

2013
2013
2023
2023

Publication Types

Select...
7
1
1

Relationship

4
5

Authors

Journals

citations
Cited by 39 publications
(33 citation statements)
references
References 9 publications
0
33
0
Order By: Relevance
“…As remarked above, the stochastic simulation techniques implemented in HyLeak have also been developed in the tools LeakiEst [CKN13] (with its extension [KCP14]) and LeakWatch [CKNP13,CKN14]. The performance of these tools as compared to HyLeak is represented by the "statistical" analysis approach in Section 8.…”
Section: Related Workmentioning
confidence: 99%
“…As remarked above, the stochastic simulation techniques implemented in HyLeak have also been developed in the tools LeakiEst [CKN13] (with its extension [KCP14]) and LeakWatch [CKNP13,CKN14]. The performance of these tools as compared to HyLeak is represented by the "statistical" analysis approach in Section 8.…”
Section: Related Workmentioning
confidence: 99%
“…Chothia et al have developed this approach in tools leakiEst [3,39] and LeakWatch [5,29]. The hybrid statistical method in this paper can be considered as their extension with the inclusion of component weighting and adaptive priors inspired by the importance sampling in statistical model checking [40,41].…”
Section: Related Workmentioning
confidence: 99%
“…For example, statistical methods [2,3,4,5,6] have been studied for quantitative information flow analysis [7,8,9], which estimates an entropy-based property to quantify the leakage of confidential information in a system. More specifically, the analysis estimates mutual information or other properties between two random variables on the secrets and on the observable outputs in the system to measure the amount of information that is inferable about the secret by observing the output.…”
Section: Introductionmentioning
confidence: 99%
“…Execution and sandboxing of the target program are achieved using the core Java libraries, and leakage estimates are calculated by leakiEst [19,20], our information leakage estimation library for Java, which now implements our min-entropy leakage result from Section 3; this ensures that LeakWatch is not tethered to a particular version or implementation of the JVM specification.…”
Section: Implementing Leakwatchmentioning
confidence: 99%