2014 IEEE Symposium on Security and Privacy 2014
DOI: 10.1109/sp.2014.41
|View full text |Cite
|
Sign up to set email alerts
|

Quantifying Information Flow for Dynamic Secrets

Abstract: Abstract-A metric is proposed for quantifying leakage of information about secrets and about how secrets change over time. The metric is used with a model of information flow for probabilistic, interactive systems with adaptive adversaries. The model and metric are implemented in a probabilistic programming language and used to analyze several examples. The analysis demonstrates that adaptivity increases information flow.

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
40
0
1

Year Published

2015
2015
2019
2019

Publication Types

Select...
6
1
1

Relationship

0
8

Authors

Journals

citations
Cited by 44 publications
(42 citation statements)
references
References 37 publications
0
40
0
1
Order By: Relevance
“…Notable exceptions are the works [4,8,21], which consider attackers who interact with and influence the system, possibly in an adaptive way, with the purpose of maximizing the leakage of information.…”
Section: Example 2 (Dining Cryptographers)mentioning
confidence: 99%
See 1 more Smart Citation
“…Notable exceptions are the works [4,8,21], which consider attackers who interact with and influence the system, possibly in an adaptive way, with the purpose of maximizing the leakage of information.…”
Section: Example 2 (Dining Cryptographers)mentioning
confidence: 99%
“…Boreale and Pampaloni [8] consider adaptive attackers, but not adaptive defenders, and show that in this case the adversary's optimal strategy can be always deterministic. Mardziel et al [21] propose a model for both adaptive attackers and defenders, but in none of their extensive case-studies the attacker needs a probabilistic strategy to maximize leakage. In this paper we characterize when randomization is necessary, for either attacker or defender, to achieve optimality in our general information leakage games.…”
Section: Related Workmentioning
confidence: 99%
“…In [8] adaptive adversaries are analyzed, however, no cost structure is considered. More general models are in Mardziel et al's [23] and [24]. The model in [23] generalizes the classical model in several respects, in particular the defender is allowed to dynamically replace the current secret with a new one, and can adaptively submit inputs to the system, based on feedback from past outputs.…”
Section: Conclusion and Related Workmentioning
confidence: 99%
“…More general models are in Mardziel et al's [23] and [24]. The model in [23] generalizes the classical model in several respects, in particular the defender is allowed to dynamically replace the current secret with a new one, and can adaptively submit inputs to the system, based on feedback from past outputs. [24] enriches this model one step further, by neatly distinguishing the defender loss from the adversary's gain when quantifying leakage.…”
Section: Conclusion and Related Workmentioning
confidence: 99%
“…Mardziel et al [72] consider information-flow in dynamic systems, where defender and adversary can interact. Their focus is on secrets that are dynamically changing, whereas our approach specifically considers the aggregation of information about longterm secrets, such as secret keys.…”
Section: Related Work Quantitative Information Flow Analysismentioning
confidence: 99%