Information Leakage Games: Exploring Information as a Utility Function

12/22/2020
by   Mário S. Alvim, et al.
0

A common goal in the areas of secure information flow and privacy is to build effective defenses against unwanted leakage of information. To this end, one must be able to reason about potential attacks and their interplay with possible defenses. In this paper we propose a game-theoretic framework to formalize strategies of attacker and defender in the context of information leakage, and provide a basis for developing optimal defense methods. A crucial novelty of our games is that their utility is given by information leakage, which in some cases may behave in a non-linear way. This causes a significant deviation from classic game theory, in which utility functions are linear with respect to players' strategies. Hence, a key contribution of this paper is the establishment of the foundations of information leakage games. We consider two main categories of games, depending on the particular notion of information leakage being captured. The first category, which we call QIF-games, is tailored for the theory of quantitative information flow (QIF). The second one, which we call DP-games, corresponds to differential privacy (DP).

READ FULL TEXT

page 1

page 2

page 3

page 4

research
03/27/2018

A Game-Theoretic Approach to Information-Flow Control via Protocol Composition

In the inference attacks studied in Quantitative Information Flow (QIF),...
research
02/27/2018

Leakage and Protocol Composition in a Game-Theoretic Perspective

In the inference attacks studied in Quantitative Information Flow (QIF),...
research
04/23/2015

Security Games with Information Leakage: Modeling and Computation

Most models of Stackelberg security games assume that the attacker only ...
research
07/16/2018

Potential Games Design Using Local Information

Consider a multiplayer game, and assume a system level objective functio...
research
11/30/2018

Thinging Machine applied to Information Leakage

This paper introduces a case study that involves data leakage in a bank ...
research
04/11/2019

Mitigating Information Leakage in Image Representations: A Maximum Entropy Approach

Image recognition systems have demonstrated tremendous progress over the...
research
01/14/2019

Optimal Strategies of Blotto Games: Beyond Convexity

The Colonel Blotto game, first introduced by Borel in 1921, is a well-st...

Please sign up or login with your details

Forgot password? Click here to reset