2013
DOI: 10.1007/978-3-642-38874-3_1
|View full text |Cite
|
Sign up to set email alerts
|

Automation of Quantitative Information-Flow Analysis

Abstract: Abstract. Quantitative information-flow analysis (QIF) is an emerging technique for establishing information-theoretic confidentiality properties. Automation of QIF is an important step towards ensuring its practical applicability, since manual reasoning about program security has been shown to be a tedious and expensive task. In this chapter we describe a approximation and randomization techniques to bear on the challenge of sufficiently precise, yet efficient computation of quantitative information flow prop… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
5
0

Year Published

2014
2014
2024
2024

Publication Types

Select...
3
3
1

Relationship

0
7

Authors

Journals

citations
Cited by 7 publications
(5 citation statements)
references
References 59 publications
(75 reference statements)
0
5
0
Order By: Relevance
“…Some prior work aims to quantify the information released by a (possibly randomized) program (e.g., Köpf and Rybalchenko [2013]; Mu and Clark [2009]) according to entropy-based measures. Work on verifying the correctness of differentially private algorithms [Barthe et al 2013;Zhang and Kifer 2017;Zhang et al 2019b], essentially aims to bound possible leakage; by contrast, we enforce that no information leaks due to a program's execution.…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…Some prior work aims to quantify the information released by a (possibly randomized) program (e.g., Köpf and Rybalchenko [2013]; Mu and Clark [2009]) according to entropy-based measures. Work on verifying the correctness of differentially private algorithms [Barthe et al 2013;Zhang and Kifer 2017;Zhang et al 2019b], essentially aims to bound possible leakage; by contrast, we enforce that no information leaks due to a program's execution.…”
Section: Related Workmentioning
confidence: 99%
“…Their programming model is not as rich as ours, as a secret random number is never permitted to be made public; such an ability is the main source of complexity in λ obliv , and is crucial for supporting oblivious algorithms. Some prior work aims to quantify the information released by a (possibly randomized) program (e.g., Köpf and Rybalchenko [2013]; Mu and Clark [2009]) according to entropy-based measures. Work on verifying the correctness of differentially private algorithms [Barthe et al 2013;Zhang and Kifer 2017;Zhang et al 2019], essentially aims to bound possible leakage; by contrast, we enforce that no information leaks due to a program's execution.…”
Section: Related Workmentioning
confidence: 99%
“…While challenging to compute, this approach provides meaningful results for non-uniform priors. Work that has focused on other, easier-to-compute metrics, such as Shannon entropy and channel capacity, require deterministic programs and priors that conform to uniform distributions [2,21,23,24,28,33]. Like Mardziel et al [26], we are able to compute the worst-case vulnerability, i.e., due to a particular output, rather than a static estimate, i.e., as an expectation over all possible outputs.…”
Section: Related Workmentioning
confidence: 99%
“…We perform a quantitative information-flow analysis [38] to measure the information leakage caused by the accelerators when protected with the DIFT shell. In our analysis, we found that information leakage depends on the following factors.…”
Section: B Information Leakage: Metric Analysismentioning
confidence: 99%