An Algebraic Approach for Reasoning About Information Flow

01/24/2018
by   Arthur Américo, et al.
0

This paper concerns the analysis of information leaks in security systems. We address the problem of specifying and analyzing large systems in the (standard) channel model used in quantitative information flow (QIF). We propose several operators which match typical interactions between system components. We explore their algebraic properties with respect to the security-preserving refinement relation defined by Alvim et al. and McIver et al. We show how the algebra can be used to simplify large system specifications in order to facilitate the computation of information leakage bounds. We demonstrate our results on the specification and analysis of the Crowds Protocol. Finally, we use the algebra to justify a new algorithm to compute leakage bounds for this protocol.

READ FULL TEXT

page 1

page 2

page 3

page 4

research
08/24/2022

On Privacy Preserving Data Aggregation Protocols using BGN cryptosystem

The notion of aggregator oblivious (AO) security for privacy preserving ...
research
06/09/2020

Improving the Security of "Measurement-Device-Independent Quantum Communication without Encryption"

Recently in 2018, Niu et al. proposed a measurement-device-independent q...
research
10/21/2019

Cryptanalysis of two schemes of Baba et al. by linear algebra methods

We show that the attacks based on the linear decomposition method introd...
research
05/11/2019

On the Compositionality of Dynamic Leakage and Its Application to the Quantification Problem

Quantitative information flow (QIF) is traditionally defined as the expe...
research
04/11/2020

Analysing Flow Security Properties in Virtualised Computing Systems

This paper studies the problem of reasoning about flow security properti...
research
06/30/2014

Information Transfer in Swarms with Leaders

Swarm dynamics is the study of collections of agents that interact with ...
research
03/27/2018

A Game-Theoretic Approach to Information-Flow Control via Protocol Composition

In the inference attacks studied in Quantitative Information Flow (QIF),...

Please sign up or login with your details

Forgot password? Click here to reset