2010
DOI: 10.1007/978-3-642-13678-8_3
|View full text |Cite
|
Sign up to set email alerts
|

Information Theory and Security: Quantitative Information Flow

Abstract: Abstract. We present the information theoretical basis of Quantitative Information Flow. We show the relationship between lattices, partitions and information theoretical concepts and their applicability to quantify leakage of confidential information in programs, including looping programs.We also report on recent works that use these ideas to build tools for the automatic quantitative analysis of programs. The applicability of this information theoretical framework to the wider context of network protocols a… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
11
0

Year Published

2014
2014
2020
2020

Publication Types

Select...
3
2
1

Relationship

1
5

Authors

Journals

citations
Cited by 11 publications
(11 citation statements)
references
References 42 publications
0
11
0
Order By: Relevance
“…There is also a vast literature (see [30], Section 3.3, and references therein) studying the "leakage of a program P [...] defined as the (Shannon) entropy of the partition Π(P )" [30]. One can easily see that their "leakage" is the same as the entropy H(f (X)), where X is the r.v.…”
Section: Additional Relationsmentioning
confidence: 99%
“…There is also a vast literature (see [30], Section 3.3, and references therein) studying the "leakage of a program P [...] defined as the (Shannon) entropy of the partition Π(P )" [30]. One can easily see that their "leakage" is the same as the entropy H(f (X)), where X is the r.v.…”
Section: Additional Relationsmentioning
confidence: 99%
“…Hence, leakage H(LoI(P )) for looping programs can be computed in terms of the chain (W 6n ) n>0 and the collision equivalence C. The equivalence of this technique with previous information theoretical analysis of loops (Malacaria 2010) is proved in Malacaria and Heusser (2010). Notice that Propositions 6 and 9 can be used for an analysis of loops using Smith's vulnerability leakage and guessability leakage: ME(P ) = log(G(LoI(P ))) − log(G(h)) = log(G( n>0 W 6n C)) − log(G(h)) (10) GE(P ) = NG(h) − NG(LoI(P )) = NG(h) − NG(LoI( n>0 W 6n C)) (11)…”
Section: Loop Analysismentioning
confidence: 95%
“…is their self-composition ( Barthe et al 2004). Formally (Malacaria and Heusser 2010): Proposition 8. Given programs P 1 , P 2 there exists a program P 1 2 such that LoI(P 1 2 ) = LoI(P 1 ) LoI(P 2 ).…”
Section: Multiple Runsmentioning
confidence: 99%
See 1 more Smart Citation
“…It provides a framework that associates security policy and implementation of the security policy. While there are lots of classical information security models like BLP model [9],Biba model [13] and secure information flow model [14] and Unwinding and Inference Control model [15],we chose the BLP model to formally model the security policy of typical security gateway owing to the easy understanding of BLP model itself and familiarity of most projects engineers with BLP model; formal specification aims at describing the system functions in a simple, unanimous ③ manner. This paper presents a method which may be used to formally design and verify the typical security gateway.…”
Section: Introductionmentioning
confidence: 99%