Computing and estimating information leakage with a quantitative point-to-point information flow model
نویسنده
چکیده
Information leakage occurs when a system exposes its secret information to an unauthorised entity. Information flow analysis is concerned with tracking flows of information through systems to determine whether they process information securely or leak information. We present a novel information flow model that permits an arbitrary amount of secret and publicly-observable information to occur at any point and in any order in a system. This is an improvement over previous models, which generally assume that systems process a single piece of secret information present before execution and produce a single piece of publicly-observable information upon termination. Our model precisely quantifies the information leakage from secret to publicly-observable values at user-defined points — hence, a “point-to-point” model — using the informationtheoretic measures of mutual information and min-entropy leakage; it is ideal for analysing systems of low to moderate complexity. We also present a relaxed version of our information flow model that estimates, rather than computes, the measures of mutual information and min-entropy leakage via sampling of a system. We use statistical techniques to bound the accuracy of the estimates this model provides. We demonstrate how our relaxed model is more suitable for analysing complex systems by implementing it in a quantitative information flow analysis tool for Java programs. For my parents, Sue and Stevo, without whose unwavering support none of this would have been possible.
منابع مشابه
LeakWatch: Estimating Information Leakage from Java Programs
Programs that process secret data may inadvertently reveal information about those secrets in their publicly-observable output. This paper presents LeakWatch, a quantitative information leakage analysis tool for the Java programming language; it is based on a flexible “point-to-point” information leakage model, where secret and publiclyobservable data may occur at any time during a program’s ex...
متن کاملComparison of Two-point and Two-Time Methods for Estimating the Infiltration Parameters in Meandering Furrow Irrigation
Infiltration is the most important characteristic in the design and management of any surface irrigation system. Since the hydraulic of flow in meandering furrows is different from the standard furrows, the accuracy of infiltration function parameter estimation methods should be examined for the optimal design and management of meandering furrow irrigation. The main objective of this study was ...
متن کاملEstimating most productive scale size in DEA with real and integer value data
For better guiding a system, senior managers should have accurate information. Using Data Envelopment analysis (DEA) help managers in this objective. Thus, many investigations have been made in order to find the most productive scale size (MPSS) for the evaluating decision making units (DMUs). In this paper we consider this case where there exist subsets of input and output variables to be inte...
متن کاملEvaluation of Models to Describe Temporal Growth in Local Chickens of Ghana
The logistic, Gompertz, Richards and asymmetric logistic growth curve models were fitted to body weight data of local Ghanaian chickens and French SASSO T44 chickens. All four growth models provided good fit for each sex by genotype growth data with R2 values ranging from 86.7% to 96.7%. The rate constant parameter, k, ranged between 0.137 and 0.271 and were significantly different from zero fo...
متن کاملCAMAC: a context-aware mandatory access control model
Mandatory access control models have traditionally been employed as a robust security mechanism in multilevel security environments such as military domains. In traditional mandatory models, the security classes associated with entities are context-insensitive. However, context-sensitivity of security classes and flexibility of access control mechanisms may be required especially in pervasive c...
متن کامل