Quantifying information flow with beliefs

被引:42
作者
Clarkson, Michael R. [1 ]
Myers, Andrew C. [1 ]
Schneider, Fred B. [1 ]
机构
[1] Cornell Univ, Dept Comp Sci, Ithaca, NY 14850 USA
基金
美国国家科学基金会;
关键词
Quantitative information flow; belief; accuracy; insider; security policies; probabilistic semantics;
D O I
10.3233/JCS-2009-0353
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
To reason about information flow, a new model is developed that describes how attacker beliefs change due to the attacker's observation of the execution of a probabilistic (or deterministic) program. The model enables compositional reasoning about information flow from attacks involving sequences of interactions. The model also supports a new metric for quantitative information flow that measures accuracy of an attacker's beliefs. Applying this new metric reveals inadequacies of traditional information flow metrics, which are based on reduction of uncertainty. However, the new metric is sufficiently general that it can be instantiated to measure either accuracy or uncertainty. The new metric can also be used to reason about misinformation; deterministic programs are shown to be incapable of producing misinformation. Additionally, programs in which nondeterministic choices are made by insiders, who collude with attackers, can be analyzed.
引用
收藏
页码:655 / 701
页数:47
相关论文
共 40 条
[1]   THE EXISTENCE OF REFINEMENT MAPPINGS [J].
ABADI, M ;
LAMPORT, L .
THEORETICAL COMPUTER SCIENCE, 1991, 82 (02) :253-284
[2]  
Browne R., 1991, P 1991 IEEE S SEC PR, P375
[3]   Quantitative information flow, relations and polymorphic types [J].
Clark, D ;
Hunt, S ;
Malacaria, P .
JOURNAL OF LOGIC AND COMPUTATION, 2005, 15 (02) :181-199
[4]  
Clark D., 2004, WORKSH ISS THEOR SEC
[5]   Quantified Interference for a While Language [J].
Clark, David ;
Hunt, Sebastian ;
Malacaria, Pasquale .
ELECTRONIC NOTES IN THEORETICAL COMPUTER SCIENCE, 2005, 112 :149-166
[6]   Belief in information flow [J].
Clarkson, MR ;
Myers, AC ;
Schneider, FB .
18TH IEEE COMPUTER SECURITY FOUNDATIONS WORKSHOP, PROCEEDINGS, 2005, :31-45
[7]  
Cover T. M., 2006, ELEMENTS INFORM THEO, DOI [DOI 10.1002/047174882X, DOI 10.1002/047174882X.CH5]
[8]  
Denning D.E.R., 1982, CRYPTOGRAPHY DATA SE, V112, DOI [10.5555/539308, DOI 10.5555/539308]
[9]   \Measuring the confinement of probabilistic systems [J].
Di Pierro, A ;
Hankin, C ;
Wiklicky, H .
THEORETICAL COMPUTER SCIENCE, 2005, 340 (01) :3-56
[10]  
Di Pierro A., 2004, Journal of Computer Security, V12, P37