2016 IEEE 29th Computer Security Foundations Symposium (CSF) 2016
DOI: 10.1109/csf.2016.13
|View full text |Cite
|
Sign up to set email alerts
|

Axioms for Information Leakage

Abstract: Quantitative information flow aims to assess and control the leakage of sensitive information by computer systems.A key insight in this area is that no single leakage measure is appropriate in all operational scenarios; as a result, many leakage measures have been proposed, with many different properties. To clarify this complex situation, this paper studies information leakage axiomatically, showing important dependencies among different axioms. It also establishes a completeness result about the -leakage fam… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
49
0

Year Published

2017
2017
2019
2019

Publication Types

Select...
5
1

Relationship

2
4

Authors

Journals

citations
Cited by 38 publications
(49 citation statements)
references
References 29 publications
0
49
0
Order By: Relevance
“…It is known from the literature [5] that the posterior vulnerability is a convex function of π. Namely, for any channel C, any family of distributions {π i }, and any set of convex coefficients {c i }, we have:…”
Section: Secrets and Vulnerabilitymentioning
confidence: 99%
See 3 more Smart Citations
“…It is known from the literature [5] that the posterior vulnerability is a convex function of π. Namely, for any channel C, any family of distributions {π i }, and any set of convex coefficients {c i }, we have:…”
Section: Secrets and Vulnerabilitymentioning
confidence: 99%
“…In this paper we consider a very general notion of vulnerability, following [5], and we define a vulnerability V to be any continuous and convex function of type DX → R. It has been shown in [5] that these functions coincide with the set of g-vulnerabilities, and are, in a precise sense, the most general information measures w.r.t. a set of basic axioms.…”
Section: Secrets and Vulnerabilitymentioning
confidence: 99%
See 2 more Smart Citations
“…Entropy can conveniently represent the information that the adversary has about the secret message before and after an attack. Consequently entropy can be used to quantify the information gained by the adversary due to the attack [19], [20], [21], [5], [22], [23]. The entropy of a probability distribution ρ over a support set X = {x 1 , .…”
Section: A Khouzani-malacaria Entropymentioning
confidence: 99%