Quantifying information leakage of randomized protocols

被引:9
|
作者
Biondi, Fabrizio [1 ]
Legay, Axel [1 ]
Malacaria, Pasquale [2 ]
Wasowski, Andrzej [3 ]
机构
[1] IRISA INRIA Rennes, F-35042 Rennes, France
[2] Queen Mary Univ London, London E1 4NS, England
[3] IT Univ Copenhagen, DK-2300 Copenhagen S, Denmark
关键词
Model checking; Quantitative information flow; Information leakage; Markov chain; Markov decision process; Channel capacity; Probabilistic system; FLOW; RISK;
D O I
10.1016/j.tcs.2015.07.034
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
The quantification of information leakage provides a quantitative evaluation of the security of a system. We propose the usage of Markovian processes to model deterministic and probabilistic systems. By using a methodology generalizing the lattice of information approach we model refined attackers capable to observe the internal behavior of the system, and quantify the information leakage of such systems. We also use our method to obtain an algorithm for the computation of channel capacity from our Markovian models. Finally, we show how to use the method to analyze timed and non-timed attacks on the Onion Routing protocol. (C) 2015 Elsevier B.V. All rights reserved.
引用
收藏
页码:62 / 87
页数:26
相关论文
共 50 条
  • [1] Quantifying Information Leakage of Randomized Protocols
    Biondi, Fabrizio
    Legay, Axel
    Malacaria, Pasquale
    Wasowski, Andrzej
    VERIFICATION, MODEL CHECKING, AND ABSTRACT INTERPRETATION (VMCAI 2013), 2013, 7737 : 68 - 87
  • [2] INFORMATION-LEAKAGE IN HYBRID RANDOMIZED PROTOCOLS
    Rass, Stefan
    Schartner, Peter
    SECRYPT 2011: PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON SECURITY AND CRYPTOGRAPHY, 2011, : 134 - 143
  • [3] Quantifying information leakage in tree-based hash protocols (Short paper)
    Nohl, Karsten
    Evans, David
    INFORMATION AND COMMUNICATIONS SECURITY, PROCEEDINGS, 2006, 4307 : 228 - +
  • [4] Information Leakage in Arbiter Protocols
    Tsiskaridze, Nestan
    Bang, Lucas
    McMahan, Joseph
    Bultan, Tevfik
    Sherwood, Timothy
    AUTOMATED TECHNOLOGY FOR VERIFICATION AND ANALYSIS (ATVA 2018), 2018, 11138 : 404 - 421
  • [5] Quantile: Quantifying Information Leakage
    Hadžić V.
    Cassiers G.
    Primas R.
    Mangard S.
    Bloem R.
    IACR Transactions on Cryptographic Hardware and Embedded Systems, 2023, 2024 (01): : 433 - 456
  • [6] Knowledge Transfer and Information Leakage in Protocols
    Khadir, Abdullah Abdul
    Mukund, Madhavan
    Suresh, S. P.
    AUTOMATED TECHNOLOGY FOR VERIFICATION AND ANALYSIS (ATVA 2017), 2017, 10482 : 225 - 240
  • [7] Quantifying information leakage in RFID systems
    Huang, Xu
    10TH INTERNATIONAL CONFERENCE ON ADVANCED COMMUNICATION TECHNOLOGY, VOLS I-III: INNOVATIONS TOWARD FUTURE NETWORKS AND SERVICES, 2008, : 84 - 89
  • [8] Quantifying Information Leakage of Deterministic Encryption
    Jurado, Mireya
    Smith, Geoffrey
    CCSW'19: PROCEEDINGS OF THE 2019 ACM SIGSAC CONFERENCE ON CLOUD COMPUTING SECURITY WORKSHOP, 2019, : 129 - 139
  • [9] Quantifying information leakage in process calculi
    Boreale, Michele
    INFORMATION AND COMPUTATION, 2009, 207 (06) : 699 - 725
  • [10] Quantifying information leakage in process calculi
    Boreale, Michele
    AUTOMATA, LANGUAGES AND PROGRAMMING, PT 2, 2006, 4052 : 119 - 131