2010 IEEE Symposium on Security and Privacy 2010
DOI: 10.1109/sp.2010.13
|View full text |Cite
|
Sign up to set email alerts
|

Reconciling Belief and Vulnerability in Information Flow

Abstract: Abstract-Belief and vulnerability have been proposed recently to quantify information flow in security systems. Both concepts stand as alternatives to the traditional approaches founded on Shannon entropy and mutual information, which were shown to provide inadequate security guarantees. In this paper we unify the two concepts in one model so as to cope with (potentially inaccurate) attackers' extra knowledge. To this end we propose a new metric based on vulnerability that takes into account the adversary's be… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1

Citation Types

1
27
0

Year Published

2010
2010
2017
2017

Publication Types

Select...
4
2
2

Relationship

2
6

Authors

Journals

citations
Cited by 29 publications
(28 citation statements)
references
References 32 publications
1
27
0
Order By: Relevance
“…More subtly, the amount of time taken by a cryptographic operation may be observable by an adversary, and may inadvertently reveal information about the secret key. As a result, the last decade has seen growing interest in quantitative theories of information flow [1], [2], [3], [4], [5], which allow us to talk about "how much" information is leaked and (perhaps) allow us to tolerate "small" leaks.…”
Section: Introductionmentioning
confidence: 99%
“…More subtly, the amount of time taken by a cryptographic operation may be observable by an adversary, and may inadvertently reveal information about the secret key. As a result, the last decade has seen growing interest in quantitative theories of information flow [1], [2], [3], [4], [5], which allow us to talk about "how much" information is leaked and (perhaps) allow us to tolerate "small" leaks.…”
Section: Introductionmentioning
confidence: 99%
“…Among its several advantages, our model allows to identify the levels of accuracy for the adversary's beliefs which are compatible with the security of a given program or protocol. This paper revises and expends an earlier version [29]. First, we have simplified the model of the adversary's belief.…”
Section: Introductionmentioning
confidence: 98%
“…In the past decade, there has been growing interest in quantitative theories of information flow [7,15] that allow us to talk about "how much" information is leaked and (perhaps) allow us to tolerate "small" leaks. One theory of quantitative information flow that has received considerable attention recently [21,6,4,13,3] is based on measuring uncertainty using Rényi's min-entropy [18], rather than using Shannon entropy [20]. The advantage of min-entropy leakage is that it is based directly on a secret's vulnerability to being guessed in one try by an adversary, resulting in stronger operational security guarantees than are obtained with Shannon entropy and mutual information [21].…”
Section: Introductionmentioning
confidence: 99%