Leakage and Protocol Composition in a Game-Theoretic Perspective

02/27/2018
by   Mário S. Alvim, et al.
0

In the inference attacks studied in Quantitative Information Flow (QIF), the adversary typically tries to interfere with the system in the attempt to increase its leakage of secret information. The defender, on the other hand, typically tries to decrease leakage by introducing some controlled noise. This noise introduction can be modeled as a type of protocol composition, i.e., a probabilistic choice among different protocols, and its effect on the amount of leakage depends heavily on whether or not this choice is visible to the adversary. In this work we consider operators for modeling visible and invisible choice in protocol composition, and we study their algebraic properties. We then formalize the interplay between defender and adversary in a game-theoretic framework adapted to the specific issues of QIF, where the payoff is information leakage. We consider various kinds of leakage games, depending on whether players act simultaneously or sequentially, and on whether or not the choices of the defender are visible to the adversary. Finally, we establish a hierarchy of these games in terms of their information leakage, and provide methods for finding optimal strategies (at the points of equilibrium) for both attacker and defender in the various cases.

READ FULL TEXT

page 1

page 2

page 3

page 4

research
03/27/2018

A Game-Theoretic Approach to Information-Flow Control via Protocol Composition

In the inference attacks studied in Quantitative Information Flow (QIF),...
research
12/22/2020

Information Leakage Games: Exploring Information as a Utility Function

A common goal in the areas of secure information flow and privacy is to ...
research
01/26/2021

Property Inference From Poisoning

Property inference attacks consider an adversary who has access to the t...
research
06/08/2018

A Tunable Measure for Information Leakage

A tunable measure for information leakage called maximal α-leakage is in...
research
02/03/2021

Information Leakage in Zero-Error Source Coding: A Graph-Theoretic Perspective

We study the information leakage to a guessing adversary in zero-error s...
research
02/22/2018

What's the Over/Under? Probabilistic Bounds on Information Leakage

Quantitative information flow (QIF) is concerned with measuring how much...
research
03/14/2018

A Game-Theoretic Framework for the Virtual Machines Migration Timing Problem

In a multi-tenant cloud, a number of Virtual Machines (VMs) are collocat...

Please sign up or login with your details

Forgot password? Click here to reset