Precise quantitative information flow analysis - a symbolic approach

نویسنده

  • Vladimir Klebanov
چکیده

Quantitative information flow analysis (QIF) is a portfolio of software security assessment techniques measuring the amount of confidential information leaked by a program to its public outputs. In this paper, we extend the scope of precise QIF for deterministic imperative programs where information flow can be described with linear integer arithmetic. We propose two novel QIF analyses that precisely measure both residual Shannon entropy and min-entropy of the secret and that feature improved tolerance to large leaks and large input domains. For this purpose, we investigate the use of program specifications in QIF. We present criteria for specification admissibility and a program analysis that replaces exhaustive program exploration with symbolic execution, while incorporating user-supplied (but machine-checked) specifications. This kind of program analysis allows to trade automation for scalability, e.g., to programs with unbounded loops. Furthermore, we show how symbolic projection and counting, based in this instance on symbolic manipulation of polyhedra, avoid subsequent leak enumeration and enable precise QIF for programs with large leaks.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Precise Quantitative Information Flow Analysis Using Symbolic Model Counting

Quantitative information flow analyses (QIF) are a class of techniques for measuring the amount of confidential information leaked by a program to its public outputs. QIF analyses can be approximative or precise, offering different trade-offs. In this paper, we lift a particular limitation of precise QIF. We show how symbolic model counting replaces explicit leak enumeration with symbolic compu...

متن کامل

What's the Over/Under? Probabilistic Bounds on Information Leakage

Quantitative information flow (QIF) is concerned with measuring how much of a secret is leaked to an adversary who observes the result of a computation that uses it. Prior work has shown that QIF techniques based on abstract interpretation with probabilistic polyhedra can be used to analyze the worst-case leakage of a query, on-line, to determine whether that query can be safely answered. While...

متن کامل

Abstract Interpretation of Symbolic Execution with Explicit State Updates

Interpretation of Symbolic Execution with Explicit State Updates Richard Bubel, Reiner Hähnle, and Benjamin Weiß 1 Department of Computer Science and Engineering, Chalmers University of Technology and Göteborg University {bubel,reiner}@chalmers.se 2 Institute for Theoretical Computer Science, University of Karlsruhe [email protected] Abstract. Systems for deductive software verification model t...

متن کامل

Precise Guidance to Dynamic Test Generation

Dynamic symbolic execution has been shown an effective technique for automated test input generation. However, its scalability is limited due to the combinatorial explosion of the path space. We propose to take advantage of data flow analysis to better perform dynamic symbolic execution in the context of generating test inputs for maximum structural coverage. In particular, we utilize the chain...

متن کامل

The Order Steps of an Analytic Combinatorics

‎Analytic combinatorics aims to enable precise quantitative predictions of the properties of large combinatorial structures‎. ‎This theory has emerged over recent decades as essential both for the analysis of algorithms and for the study of scientific models in many disciplines‎, ‎including probability theory‎, ‎statistical physics‎, ‎computational biology and information theory‎. ‎With a caref...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:
  • Theor. Comput. Sci.

دوره 538  شماره 

صفحات  -

تاریخ انتشار 2014