Maximizing entropy over Markov processes

被引:16
作者
Biondi, Fabrizio [1 ]
Legay, Axel [1 ]
Nielsen, Bo Friis [2 ]
Wasowski, Andrzej [3 ]
机构
[1] IRISA INRIA Rennes, F-35042 Rennes, France
[2] Tech Univ Denmark, DK-2800 Lyngby, Denmark
[3] IT Univ Copenhagen, DK-2300 Copenhagen S, Denmark
关键词
INFORMATION-FLOW; NONINTERFERENCE;
D O I
10.1016/j.jlamp.2014.05.001
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
The channel capacity of a deterministic system with confidential data is an upper bound on the amount of bits of data an attacker can learn from the system. We encode all possible attacks to a system using a probabilistic specification, an Interval Markov Chain. Then the channel capacity computation reduces to finding a model of a specification with highest entropy. Entropy maximization for probabilistic process specifications has not been studied before, even though it is well known in Bayesian inference for discrete distributions. We give a characterization of global entropy of a process as a reward function, a polynomial algorithm to verify the existence of a system maximizing entropy among those respecting a specification, a procedure for the maximization of reward functions over Interval Markov Chains and its application to synthesize an implementation maximizing entropy. We show how to use Interval Markov Chains to model abstractions of deterministic systems with confidential data, and use the above results to compute their channel capacity. These results are a foundation for ongoing work on computing channel capacity for abstractions of programs derived from code. (C) 2014 Elsevier Inc. All rights reserved.
引用
收藏
页码:384 / 399
页数:16
相关论文
共 35 条
[1]   Estimating the maximum information leakage [J].
Aldini, Alessandro ;
Di Pierro, Alessandra .
INTERNATIONAL JOURNAL OF INFORMATION SECURITY, 2008, 7 (03) :219-242
[2]   Measuring Information Leakage using Generalized Gain Functions [J].
Alvim, Mario S. ;
Chatzikokolakis, Kostas ;
Palamidessi, Catuscia ;
Smith, Geoffrey .
2012 IEEE 25TH COMPUTER SECURITY FOUNDATIONS SYMPOSIUM (CSF), 2012, :265-279
[3]  
[Anonymous], 2006, Elements of Information Theory
[4]  
Bhargava M, 2005, LECT NOTES COMPUT SC, V3653, P171, DOI 10.1007/11539452_16
[5]  
Biondi F, 2013, LECT NOTES COMPUT SC, V7737, P68
[6]   Constraint Markov Chains [J].
Caillaud, Benoit ;
Delahaye, Benoit ;
Larsen, Kim G. ;
Legay, Axel ;
Pedersen, Mikkel L. ;
Wasowski, Andrzej .
THEORETICAL COMPUTER SCIENCE, 2011, 412 (34) :4373-4404
[7]  
Chatterjee K, 2008, LECT NOTES COMPUT SC, V4962, P302, DOI 10.1007/978-3-540-78499-9_22
[8]   Anonymity protocols as noisy channels [J].
Chatzikokolaks, Konstantincis ;
Palamidessi, Catuscia ;
Panangaden, Prakash .
INFORMATION AND COMPUTATION, 2008, 206 (2-4) :378-401
[9]  
Chen Han., 2009, Proceedings of the 4th International Symposium on Information, Computer, and Communications Security, P206
[10]   Quantitative information flow, relations and polymorphic types [J].
Clark, D ;
Hunt, S ;
Malacaria, P .
JOURNAL OF LOGIC AND COMPUTATION, 2005, 15 (02) :181-199