2010
DOI: 10.1007/978-3-642-12002-2_32
|View full text |Cite
|
Sign up to set email alerts
|

Computing the Leakage of Information-Hiding Systems

Abstract: Abstract. We address the problem of computing the information leakage of a system in an efficient way. We propose two methods: one based on reducing the problem to reachability, and the other based on techniques from quantitative counterexample generation. The second approach can be used either for exact or approximate computation, and provides feedback for debugging. These methods can be applied also in the case in which the input distribution is unknown. We then consider the interactive case and we point out… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

1
31
0

Year Published

2010
2010
2018
2018

Publication Types

Select...
6
2
2

Relationship

5
5

Authors

Journals

citations
Cited by 32 publications
(32 citation statements)
references
References 16 publications
1
31
0
Order By: Relevance
“…Concerning the efficient computation of the channel matrix and the leakage, the only work we are aware of is [1], in which the authors propose various automatic techniques. One of these is able to generate counterexamples, namely points on the execution where the channel exhibits an excessive amount of leakage.…”
Section: Vulnerability Approachmentioning
confidence: 99%
“…Concerning the efficient computation of the channel matrix and the leakage, the only work we are aware of is [1], in which the authors propose various automatic techniques. One of these is able to generate counterexamples, namely points on the execution where the channel exhibits an excessive amount of leakage.…”
Section: Vulnerability Approachmentioning
confidence: 99%
“…Concerning the computation of the channel matrix and of the leakage for probabilistic systems, one of the first works to attack the problem was [45], in which the authors proposed various model-checking techniques. One of these is able to generate counterexamples, namely points in the execution where the channel exhibits an excessive amount of leakage.…”
Section: Related Workmentioning
confidence: 99%
“…Interactive Information Hiding Systems (IIHS) [2] are a variant of probabilistic automata in which we separate actions into secrets (inputs) and observables (outputs). "Interactive" means that secrets and observables can interleave and influence each other.…”
Section: Definition 2 In a Channel With Feedback The Directed Informentioning
confidence: 99%