Automatic Discovery and Quantification of Information Leaks

被引:114
作者
Backes, Michael [1 ]
Koepf, Boris [2 ]
Rybalchenko, Andrey [2 ]
机构
[1] Univ Saarland, Saarland, Germany
[2] MPI SWS, Kaiserslautern, Germany
来源
PROCEEDINGS OF THE 2009 30TH IEEE SYMPOSIUM ON SECURITY AND PRIVACY | 2009年
关键词
FLOW;
D O I
10.1109/SP.2009.18
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Information-flow analysis is a powerful technique for reasoning about the sensitive information exposed by a program during its execution. We present the first automatic method for information-flow analysis that discovers what information is leaked and computes its comprehensive quantitative interpretation. The leaked information is characterized by an equivalence relation on secret artifacts, and is represented by a logical assertion over the corresponding program variables. Our measurement procedure computes the number of discovered equivalence classes and their sizes. This provides a basis for computing a set of quantitative properties, which includes all established information-theoretic measures in quantitative information-flow. Our method exploits an inherent connection between formal models of qualitative information-flow and program verification techniques. We provide an implementation of our method that builds upon existing tools for program verification and information-theoretic analysis. Our experimental evaluation indicates the practical applicability of the presented method.
引用
收藏
页码:141 / +
页数:3
相关论文
共 41 条
[1]  
AMTOFT T, 2006, P S PRINC PROGR LANG
[2]  
[Anonymous], MATH OPERATIONS RES
[3]  
[Anonymous], LATTE
[4]  
[Anonymous], P 14 ACM C COMP COMM
[5]  
Ash R., 1990, Information Theory
[6]  
BALL T, 2001, ACM SIGPLAN NOTICES, V36
[7]   Expressive declassification policies and modular static enforcement [J].
Banerjee, Anindya ;
Naumann, David A. ;
Rosenberg, Stan .
PROCEEDINGS OF THE 2008 IEEE SYMPOSIUM ON SECURITY AND PRIVACY, 2008, :339-+
[8]   Secure information flow by self-composition [J].
Barthe, G ;
D'Argenio, PR ;
Rezk, T .
17TH IEEE COMPUTER SECURITY FOUNDATIONS WORKSHOP, PROCEEDINGS, 2004, :100-114
[9]  
Cachin Christian, 1997, Entropy measures and unconditional security in cryptography
[10]   Compositional Shape Analysis by means of Bi-Abduction [J].
Calcagno, Cristiano ;
Distefano, Dino ;
O'Hearn, Peter ;
Yang, Hongseok .
ACM SIGPLAN NOTICES, 2009, 44 (01) :289-300