Automatic Discovery and Quantification of Information Leaks

被引:111
作者
Backes, Michael [1 ]
Koepf, Boris [2 ]
Rybalchenko, Andrey [2 ]
机构
[1] Univ Saarland, Saarland, Germany
[2] MPI SWS, Kaiserslautern, Germany
来源
PROCEEDINGS OF THE 2009 30TH IEEE SYMPOSIUM ON SECURITY AND PRIVACY | 2009年
关键词
FLOW;
D O I
10.1109/SP.2009.18
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Information-flow analysis is a powerful technique for reasoning about the sensitive information exposed by a program during its execution. We present the first automatic method for information-flow analysis that discovers what information is leaked and computes its comprehensive quantitative interpretation. The leaked information is characterized by an equivalence relation on secret artifacts, and is represented by a logical assertion over the corresponding program variables. Our measurement procedure computes the number of discovered equivalence classes and their sizes. This provides a basis for computing a set of quantitative properties, which includes all established information-theoretic measures in quantitative information-flow. Our method exploits an inherent connection between formal models of qualitative information-flow and program verification techniques. We provide an implementation of our method that builds upon existing tools for program verification and information-theoretic analysis. Our experimental evaluation indicates the practical applicability of the presented method.
引用
收藏
页码:141 / +
页数:3
相关论文
共 41 条
  • [1] AMTOFT T, 2006, P S PRINC PROGR LANG
  • [2] [Anonymous], MATH OPERATIONS RES
  • [3] [Anonymous], LATTE
  • [4] [Anonymous], P 14 ACM C COMP COMM
  • [5] Ash R., 1990, Information Theory
  • [6] BALL T, 2001, ACM SIGPLAN NOTICES, V36
  • [7] Expressive declassification policies and modular static enforcement
    Banerjee, Anindya
    Naumann, David A.
    Rosenberg, Stan
    [J]. PROCEEDINGS OF THE 2008 IEEE SYMPOSIUM ON SECURITY AND PRIVACY, 2008, : 339 - +
  • [8] Secure information flow by self-composition
    Barthe, G
    D'Argenio, PR
    Rezk, T
    [J]. 17TH IEEE COMPUTER SECURITY FOUNDATIONS WORKSHOP, PROCEEDINGS, 2004, : 100 - 114
  • [9] Cachin Christian, 1997, Entropy measures and unconditional security in cryptography
  • [10] Compositional Shape Analysis by means of Bi-Abduction
    Calcagno, Cristiano
    Distefano, Dino
    O'Hearn, Peter
    Yang, Hongseok
    [J]. ACM SIGPLAN NOTICES, 2009, 44 (01) : 289 - 300