Quantifying information flow in interactive systems

被引:3
作者
Mestel, David [1 ]
机构
[1] Univ Luxembourg, Luxembourg, Luxembourg
来源
2019 IEEE 32ND COMPUTER SECURITY FOUNDATIONS SYMPOSIUM (CSF 2019) | 2019年
关键词
Quantified information flow; automata theory; NONINTERFERENCE; LEAKAGE;
D O I
10.1109/CSF.2019.00035
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
We consider the problem of quantifying information flow in interactive systems, modelled as finite-state transducers in the style of Goguen and Meseguer. Our main result is that if the system is deterministic then the information flow is either logarithmic or linear, and there is a polynomial-time algorithm to distinguish the two cases and compute the rate of logarithmic flow. To achieve this we first extend the theory of information leakage through channels to the case of interactive systems, and establish a number of results which greatly simplify computation. We then show that for deterministic systems the information flow corresponds to the growth rate of antichains inside a certain regular language, a property called the width of the language. In a companion work we have shown that there is a dichotomy between polynomial and exponential antichain growth, and a polynomial time algorithm to distinguish the two cases and to compute the order of polynomial growth. We observe that these two cases correspond to logarithmic and linear information flow respectively. Finally, we formulate several attractive open problems, covering the cases of probabilistic systems, systems with more than two users and nondeterministic systems where the nondeterminism is assumed to be innocent rather than demonic.
引用
收藏
页码:414 / 427
页数:14
相关论文
共 22 条
[1]   Additive and multiplicative notions of leakage, and their capacities [J].
Alvim, Mario S. ;
Chatzikokolakis, Konstantinos ;
McIver, Annabelle ;
Morgan, Carroll ;
Palamidessi, Catuscia ;
Smith, Geoffrey .
2014 IEEE 27TH COMPUTER SECURITY FOUNDATIONS SYMPOSIUM (CSF), 2014, :308-322
[2]   Quantitative information flow in interactive systems [J].
Alvim, Mario S. ;
Andres, Miguel E. ;
Palamidessi, Catuscia .
JOURNAL OF COMPUTER SECURITY, 2012, 20 (01) :3-50
[3]   Measuring Information Leakage using Generalized Gain Functions [J].
Alvim, Mario S. ;
Chatzikokolakis, Kostas ;
Palamidessi, Catuscia ;
Smith, Geoffrey .
2012 IEEE 25TH COMPUTER SECURITY FOUNDATIONS SYMPOSIUM (CSF), 2012, :265-279
[4]  
Andrés ME, 2010, LECT NOTES COMPUT SC, V6015, P373, DOI 10.1007/978-3-642-12002-2_32
[5]   QUANTITATIVE INFORMATION FLOW UNDER GENERIC LEAKAGE FUNCTIONS AND ADAPTIVE ADVERSARIES [J].
Boreale, Michele ;
Pampaloni, Francesca .
LOGICAL METHODS IN COMPUTER SCIENCE, 2015, 11 (04)
[6]  
Boreale M, 2011, LECT NOTES COMPUT SC, V6604, P396, DOI 10.1007/978-3-642-19805-2_27
[7]   Quantitative Notions of Leakage for One-try Attacks [J].
Braun, Christelle ;
Chatzikokolakis, Konstantinos ;
Palamidessi, Catuscia .
ELECTRONIC NOTES IN THEORETICAL COMPUTER SCIENCE, 2009, 249 :75-91
[8]  
Clark D, 2009, LECT NOTES COMPUT SC, V5491, P50
[9]   A DECOMPOSITION THEOREM FOR PARTIALLY ORDERED SETS [J].
DILWORTH, RP .
ANNALS OF MATHEMATICS, 1950, 51 (01) :161-166
[10]  
Dwork C., 2006, Encyclopedia of Cryptography and Security, P1