2013 IEEE 26th Computer Security Foundations Symposium 2013
DOI: 10.1109/csf.2013.20
|View full text |Cite
|
Sign up to set email alerts
|

Probabilistic Point-to-Point Information Leakage

Abstract: Abstract-The outputs of a program that processes secret data may reveal information about the values of these secrets. This paper develops an information leakage model that can measure the leakage between arbitrary points in a probabilistic program. Our aim is to create a model of information leakage that makes it convenient to measure specific leaks, and provide a tool that may be used to investigate a program's information security. To make our leakage model precise, we base our work on a simple probabilisti… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
23
0

Year Published

2014
2014
2021
2021

Publication Types

Select...
6
2

Relationship

4
4

Authors

Journals

citations
Cited by 25 publications
(27 citation statements)
references
References 29 publications
(35 reference statements)
0
23
0
Order By: Relevance
“…For example, statistical methods [2,3,4,5,6] have been studied for quantitative information flow analysis [7,8,9], which estimates an entropy-based property to quantify the leakage of confidential information in a system. More specifically, the analysis estimates mutual information or other properties between two random variables on the secrets and on the observable outputs in the system to measure the amount of information that is inferable about the secret by observing the output.…”
Section: Introductionmentioning
confidence: 99%
“…For example, statistical methods [2,3,4,5,6] have been studied for quantitative information flow analysis [7,8,9], which estimates an entropy-based property to quantify the leakage of confidential information in a system. More specifically, the analysis estimates mutual information or other properties between two random variables on the secrets and on the observable outputs in the system to measure the amount of information that is inferable about the secret by observing the output.…”
Section: Introductionmentioning
confidence: 99%
“…It is based on a "point-to-point" information leakage model in which secret and publicly-observable data may occur at any time during the program's execution, including inside complex code structures such as branches and nested loops. This model, which we developed previously using a semantics based on discrete-time Markov chains [4], is particularly well-suited to analysing complex programs where secret and publiclyobservable data may occur at any point: if secret and publicly-observable values are "tagged" using the secret and observe commands respectively, it measures how much information a passive attacker with knowledge of the program's source code learns about the secret values by examining the observable values.…”
Section: Introductionmentioning
confidence: 99%
“…In [15], this type of information leakage model has been discussed. In the paper, leakage in practical JAVA programs has been quantified.…”
Section: Imperative Program With Point To Point Information Leakagementioning
confidence: 99%
“…Point to point information leakage in the imperative program: This method was first proposed by Tom Chothiya et al in [15]. In this paper, a method has been proposed to find leakage between any two arbitrary points in the imperative probabilistic program.…”
Section: Introductionmentioning
confidence: 99%