peer reviewedWe consider the problem of quantifying information flow in interactive systems, modelled as finite-state transducers in the style of Goguen and Meseguer. Our main result is that if the system is deterministic then the information flow is either logarithmic or linear, and there is a polynomial-time algorithm to distinguish the two cases and compute the rate of logarithmic flow. To achieve this we first extend the theory of information leakage through channels to the case of interactive systems, and establish a number of results which greatly simplify computation. We then show that for deterministic systems the information flow corresponds to the growth rate of antichains inside a certain regular language, a property called the w...
In multilevel systems it is important to avoid unwanted indirect information flow from higher level...
The paper considers the complexity of verifying that a finite state system satisfies a number of def...
In multilevel systems it is important to avoid unwanted indirect information flow from higher levels...
We consider the problem of quantifying information flow in interactive systems, modelled as finite-s...
The main problem addressed by this thesis is that of characterising information leakage channels in...
International audienceWe consider the problem of defining the information leakage in interactive sys...
International audienceWe consider the problem of defining the information leakage in interactive sys...
International audienceWe consider the problem of defining a measure of information leakage in intera...
Despite the variety of tools and techniques deployed in order to protect sensitive data, ranging fro...
Information flow analysis is a powerful technique for reasoning about the sensitive information expo...
Classical quantitative information flow analysis often considers a system as an information-theoreti...
International audienceInformation flow is the branch of security that studies the leakage of informa...
Secrecy is fundamental to computer security, but real systems often cannot avoid leaking some secret...
Thesis (Ph.D.), Computer Science, Washington State UniversityIn this thesis, we present information-...
Information-theoretic measures based upon mutual information can be employed to quantify the informa...
In multilevel systems it is important to avoid unwanted indirect information flow from higher level...
The paper considers the complexity of verifying that a finite state system satisfies a number of def...
In multilevel systems it is important to avoid unwanted indirect information flow from higher levels...
We consider the problem of quantifying information flow in interactive systems, modelled as finite-s...
The main problem addressed by this thesis is that of characterising information leakage channels in...
International audienceWe consider the problem of defining the information leakage in interactive sys...
International audienceWe consider the problem of defining the information leakage in interactive sys...
International audienceWe consider the problem of defining a measure of information leakage in intera...
Despite the variety of tools and techniques deployed in order to protect sensitive data, ranging fro...
Information flow analysis is a powerful technique for reasoning about the sensitive information expo...
Classical quantitative information flow analysis often considers a system as an information-theoreti...
International audienceInformation flow is the branch of security that studies the leakage of informa...
Secrecy is fundamental to computer security, but real systems often cannot avoid leaking some secret...
Thesis (Ph.D.), Computer Science, Washington State UniversityIn this thesis, we present information-...
Information-theoretic measures based upon mutual information can be employed to quantify the informa...
In multilevel systems it is important to avoid unwanted indirect information flow from higher level...
The paper considers the complexity of verifying that a finite state system satisfies a number of def...
In multilevel systems it is important to avoid unwanted indirect information flow from higher levels...