2009 30th IEEE Symposium on Security and Privacy 2009
DOI: 10.1109/sp.2009.18
|View full text |Cite
|
Sign up to set email alerts
|

Automatic Discovery and Quantification of Information Leaks

Abstract: Information-flow analysis is a powerful technique for reasoning about the sensitive information exposed by a program during its execution. We present the first automatic method for information-flow analysis that discovers what information is leaked and computes its comprehensive quantitative interpretation. The leaked information is characterized by an equivalence relation on secret artifacts, and is represented by a logical assertion over the corresponding program variables. Our measurement procedure computes… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
228
0

Year Published

2010
2010
2020
2020

Publication Types

Select...
6
2
1

Relationship

0
9

Authors

Journals

citations
Cited by 179 publications
(228 citation statements)
references
References 41 publications
0
228
0
Order By: Relevance
“…A highly desirable outcome of this effort would be the automatic checking of enforcement via either model checking or program analysis. So far, the efforts have lead to some notable progress for simple imperative languages [13,21,20,4,10]. By contrast, progress for process algebras has been notably slower.…”
Section: Discussionmentioning
confidence: 99%
See 1 more Smart Citation
“…A highly desirable outcome of this effort would be the automatic checking of enforcement via either model checking or program analysis. So far, the efforts have lead to some notable progress for simple imperative languages [13,21,20,4,10]. By contrast, progress for process algebras has been notably slower.…”
Section: Discussionmentioning
confidence: 99%
“…where the first equality comes from the definition of the operational semantics and the last two ones are due to Proposition 3 (4,5). Similarly, (∆ 2 f ) h = (∆ 2 ) h f .…”
Section: We Prove Thatmentioning
confidence: 99%
“…Information leakage in deterministic programs has been investigated previously (e.g., [4], [5], [6], [7], [8]). While related to our work, much of this previous research does not directly investigate the detection of information leaks in probabilistic programs.…”
Section: A Related Workmentioning
confidence: 99%
“…The theory is preliminarily extended to multi-threaded programs [13]. Recently an automatic method for information flow analysis is developed in [18]. Lowe's work [19] defined quantitative channel capacity in the context of CSP.…”
Section: Related Workmentioning
confidence: 99%