Sciweavers

Share
TACAS
2010
Springer

Computing the Leakage of Information-Hiding Systems

8 years 10 months ago
Computing the Leakage of Information-Hiding Systems
We address the problem of computing the information leakage of a system in an efficient way. We propose two methods: one based on reducing the problem to reachability, and the other based on techniques from quantitative counterexample generation. The second approach can be used either for exact or approximate computation, and provides feedback for debugging. These methods can be applied also in the case in which the input distribution is unknown. We then consider the interactive case and we point out that the definition of associated channel proposed in literature is not sound. We show however that the leakage can still be defined consistently, and that our methods extend smoothly.
Miguel E. Andrés, Catuscia Palamidessi, Pet
Added 14 May 2010
Updated 14 May 2010
Type Conference
Year 2010
Where TACAS
Authors Miguel E. Andrés, Catuscia Palamidessi, Peter van Rossum, Geoffrey Smith
Comments (0)
books