2010 23rd IEEE Computer Security Foundations Symposium 2010
DOI: 10.1109/csf.2010.8
|View full text |Cite
|
Sign up to set email alerts
|

Approximation and Randomization for Quantitative Information-Flow Analysis

Abstract: Abstract-Quantitative information-flow analysis (QIF) is an emerging technique for establishing information-theoretic confidentiality properties. Automation of QIF is an important step towards ensuring its practical applicability, since manual reasoning about program security has been shown to be a tedious and expensive task. Existing automated techniques for QIF fall short of providing full coverage of all program executions, especially in the presence of unbounded loops and data structures, which are notorio… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2

Citation Types

0
71
0

Year Published

2011
2011
2022
2022

Publication Types

Select...
7
1
1

Relationship

2
7

Authors

Journals

citations
Cited by 57 publications
(71 citation statements)
references
References 46 publications
0
71
0
Order By: Relevance
“…A quite different approach to approximating leakage is given in the recent work of Köpf and Rybalchenko [34], which uses statistical sampling to estimate the mutualinformation leakage of a deterministic imperative program from input to output , under a uniform a priori distribution. While they present the technique in terms of estimating ( | ), it is clearer to remember that the mutualinformation leakage is just ( ).…”
Section: Techniques For Computing Min-entropy Leakagementioning
confidence: 99%
See 1 more Smart Citation
“…A quite different approach to approximating leakage is given in the recent work of Köpf and Rybalchenko [34], which uses statistical sampling to estimate the mutualinformation leakage of a deterministic imperative program from input to output , under a uniform a priori distribution. While they present the technique in terms of estimating ( | ), it is clearer to remember that the mutualinformation leakage is just ( ).…”
Section: Techniques For Computing Min-entropy Leakagementioning
confidence: 99%
“…Nevertheless, this is an area that is now seeing a great deal of work, both in the context of probabilistic systems [32], [33] and deterministic imperative programs [8], [34], [35], [36].…”
Section: Techniques For Computing Min-entropy Leakagementioning
confidence: 99%
“…We also leverage techniques from quantitative-information-flow analysis that enable establishing bounds for the amount of information that a program leaks about its input. One key observation is that (an upper bound on) the number of reachable states of a program corresponds to (an upper bound on) the number of leaked bits [31,42]. Such upper bounds can be obtained by computing super-sets of the set of reachable states by abstract interpretation, and by determining their sizes [31].…”
Section: Introductionmentioning
confidence: 99%
“…Statistical sampling is used by Chatzikokolakis et al (2010) and Köpf and Rybalchenko (2010). Also, the computational complexity of quantitative information flow problems is studied by Yasuoka and Terauchi (2010).…”
mentioning
confidence: 99%