2017
DOI: 10.1016/j.jcss.2017.03.013
|View full text |Cite
|
Sign up to set email alerts
|

Quantifying leakage in the presence of unreliable sources of information

Abstract: Belief and min-entropy leakage are two well-known approaches to quantify information flow in security systems. Both concepts stand as alternatives to the traditional approaches founded on Shannon entropy and mutual information, which were shown to provide inadequate security guarantees. In this paper we unify the two concepts in one model so as to cope with the frequent (potentially inaccurate, misleading or outdated) attackers' side information about individuals on social networks, online forums, blogs and ot… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
7
0

Year Published

2020
2020
2023
2023

Publication Types

Select...
4
2
1

Relationship

0
7

Authors

Journals

citations
Cited by 7 publications
(7 citation statements)
references
References 54 publications
(87 reference statements)
0
7
0
Order By: Relevance
“…Concisely, mutual information measures the correlation between two variables. Authors in [40] discussed how an attacker's belief change by observing the execution of a program whereas Hamadou et al [41] unified the notion of belief and leakage for an adversary. In [40], the authors introduced a metric where an adversary observes the execution of a program and consequently updates their initial belief about the private variable.…”
Section: Optimized Worst-case Leakage Valuesmentioning
confidence: 99%
See 2 more Smart Citations
“…Concisely, mutual information measures the correlation between two variables. Authors in [40] discussed how an attacker's belief change by observing the execution of a program whereas Hamadou et al [41] unified the notion of belief and leakage for an adversary. In [40], the authors introduced a metric where an adversary observes the execution of a program and consequently updates their initial belief about the private variable.…”
Section: Optimized Worst-case Leakage Valuesmentioning
confidence: 99%
“…The authors did not consider the case where an adversary approximates the privacy mechanism. Authors in [41] nevertheless introduced the metrics to represent the belief of the attacker when they had different (and potentially wrong) initial beliefs regarding the distribution of the secret and consequently presented several properties to measure the accuracy and belief of the adversary. In the current paper, we assumed the approximation of the privacy mechanism.…”
Section: Optimized Worst-case Leakage Valuesmentioning
confidence: 99%
See 1 more Smart Citation
“…Concisely, mutual information measures the correlation between two variables. Authors in [40] discussed how an attacker's belief change by observing the execution of a program whereas Hamadou et al [41] unified the notion of belief and leakage for an adversary. In [40], the authors introduced a metric where an adversary observes the execution of a program and consequently updates their initial belief about the private variable.…”
Section: Optimized Worst-case Leakage Valuesmentioning
confidence: 99%
“…[22], [23] proposed model checking techniques to compute the Shannon entropy leakage and the min-entropy leakage in probabilistic transition systems. [24], [25] studied the problem of information hiding in systems characterized by the presence of randomization and concurrency. [26], [27], [28], [29] used diagnosis to detect whether or not the given sequence of observed labels indicates that some unobservable fault has occurred.…”
Section: Introductionmentioning
confidence: 99%