Florida International University
Edit Your Profile
FIU Discovery
Toggle navigation
Browse
Home
People
Organizations
Scholarly & Creative Works
Research Facilities
Support
Calculating bounds on information leakage using two-bit patterns
Conference
Meng, Z, Smith, G. (2011). Calculating bounds on information leakage using two-bit patterns .
10.1145/2166956.2166957
Share this citation
Twitter
Email
Meng, Z, Smith, G. (2011). Calculating bounds on information leakage using two-bit patterns .
10.1145/2166956.2166957
Copy Citation
Share
Overview
Identifiers
View All
Overview
cited authors
Meng, Z; Smith, G
abstract
Theories of quantitative information flow have seen growing interest recently, in view of the fundamental importance of controlling the leakage of confidential information, together with the pragmatic necessity of tolerating intuitively "small" leaks. Given such a theory, it is crucial to develop automated techniques for calculating the leakage in a system. In this paper, we address this question in the context of deterministic imperative programs and under the recently-proposed min-entropy measure of information leakage, which measures leakage in terms of the confidential information's vulnerability to being guessed in one try by an adversary. In this context, calculating the maximum leakage of a program reduces to counting the number of feasible outputs that it can produce. We approach this task by determining patterns among pairs of bits in the output, for instance by determining that two bits must be unequal. By counting the number of solutions to the two-bit patterns, we obtain an upper bound on the number of feasible outputs and hence on the leakage. We explore the effectiveness of our approach on a number of case studies, in terms of both efficiency and accuracy. © 2011 ACM.
authors
Smith, Geoffrey
publication date
December 1, 2011
Identifiers
Digital Object Identifier (DOI)
https://doi.org/10.1145/2166956.2166957