4.4 Article Proceedings Paper

Estimating the maximum information leakage

Journal

INTERNATIONAL JOURNAL OF INFORMATION SECURITY
Volume 7, Issue 3, Pages 219-242

Publisher

SPRINGER
DOI: 10.1007/s10207-007-0050-x

Keywords

covert channels; approximate noninterference; probabilistic models; process algebra; bisimulation semantics

Ask authors/readers for more resources

Preventing improper information leaks is a greatest challenge of the modern society. In this paper, we present a technique for measuring the ability of several families of adversaries to set up a covert channel. Our approach relies on a noninterference based formulation of security which can be naturally expressed by semantic models of the program execution. In our analysis the most powerful adversary is measured via a notion of approximate process equivalence. Even if finding the most powerful adversary is in general impractical, we show that this requires only a finite number of checks for a particular family of adversaries which are related to a probabilistic information flow property.

Authors

I am an author on this paper
Click your name to claim this paper and add it to your profile.

Reviews

Primary Rating

4.4
Not enough ratings

Secondary Ratings

Novelty
-
Significance
-
Scientific rigor
-
Rate this paper

Recommended

No Data Available
No Data Available