Automatically Calculating Quantitative Integrity Measures for Imperative Programs

نویسندگان

  • Tom Chothia
  • Chris Novakovic
  • Rajiv Ranjan Singh
چکیده

This paper presents a framework for calculating measures of data integrity for programs in a small imperative language. We develop a Markov chain semantics for our language which calculates Clarkson and Schneider’s definitions of data contamination and suppression. These definitions are based on conditional mutual information and entropy; we present a result relating them to mutual information, which can be calculated by a number of existing tools. We extend a quantitative information flow tool (CH-IMP) to calculate these measures of integrity and demonstrate this tool with examples based on error correcting codes, the Dining Cryptographers protocol and the attempts by a number of banks to influence the Libor rate.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Calculating Quantitative Integrity and Secrecy for Imperative Programs

This paper presents a framework for calculating measures of data integrity for programs in a small imperative language. We develop a Markov chain semantics for our language which calculates Clarkson and Schneider’s definitions of data contamination, data suppression, program suppression and program transmission. We then propose our own definition of program integrity for probabilistic specifica...

متن کامل

Influence: A Quantitative Approach for Data Integrity

A number of systems employ dynamic taint analysis to detect overwrite attacks in commodity software. These systems are based on the premise that low-integrity inputs should not control values such as function pointers and return addresses. Unfortunately, there are several programming constructs that can cause false positives and false negatives in these systems, which are currently handled by m...

متن کامل

Influence: A Quantitative Approach for Data Integrity (CMU-CyLab-08-005)

A number of systems employ dynamic taint analysis to detect overwrite attacks in commodity software. These systems are based on the premise that low-integrity inputs should not control values such as function pointers and return addresses. Unfortunately, there are several programming constructs that can cause false positives and false negatives in these systems, which are currently handled by m...

متن کامل

Integrity Evaluation in Conservation of Amir-chakhmagh Square in Yazd, Iran

The concept of integrity, as a factor which sustains values and significance of cultural heritage, is regarded as a key criterion in the process of urban heritage conservation and thus, the need for clarification of its factors has been emphasized in the international conventions, documents and scientific papers. Review and analysis of documents, conventions and theories concerning the role ...

متن کامل

Calculating likely Parallelism within Dependant Conjunctions for Logic Programs

The rate at which computers are becoming faster at sequential execution has dropped significantly. Instead parallel processing power is increasing, and multicore computers are becoming more common. Automatically parallelising programs is becoming much more desirable. Parallelising programs written in imperative programming languages is difficult and often leads to unreliable software. Paralleli...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2014