메뉴 건너뛰기




Volumn , Issue , 2010, Pages 15-27

Quantitative information flow-verification hardness and possibilities

Author keywords

[No Author keywords available]

Indexed keywords

BOOLEAN PROGRAMS; COMPOSITION TECHNIQUE; FORMAL DEFINITION; MIN-ENTROPY; NON INTERFERENCE; QUANTITATIVE INFORMATION; SAFETY PROBLEMS; SAFETY PROPERTY; SHANNON ENTROPY;

EID: 77957590642     PISSN: 19401434     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/CSF.2010.9     Document Type: Conference Paper
Times cited : (46)

References (34)
  • 1
    • 70449625216 scopus 로고    scopus 로고
    • Automatic discovery and quantification of information leaks
    • IEEE Computer Society
    • M. Backes, B. Köpf, and A. Rybalchenko. Automatic discovery and quantification of information leaks. In IEEE Symposium on Security and Privacy, pages 141-153. IEEE Computer Society, 2009.
    • (2009) IEEE Symposium on Security and Privacy , pp. 141-153
    • Backes, M.1    Köpf, B.2    Rybalchenko, A.3
  • 2
    • 0036039066 scopus 로고    scopus 로고
    • The SLAM project: Debugging system software via static analysis
    • T. Ball and S. K. Rajamani. The SLAM project: debugging system software via static analysis. In POPL, pages 1-3, 2002.
    • (2002) POPL , pp. 1-3
    • Ball, T.1    Rajamani, S.K.2
  • 3
    • 4944265699 scopus 로고    scopus 로고
    • Secure information flow by self-composition
    • IEEE Computer Society
    • G. Barthe, P. R. D'Argenio, and T. Rezk. Secure information flow by self-composition. In CSFW, pages 100-114. IEEE Computer Society, 2004.
    • (2004) CSFW , pp. 100-114
    • Barthe, G.1    D'argenio, P.R.2    Rezk, T.3
  • 4
    • 35348951470 scopus 로고    scopus 로고
    • The software model checker Blast
    • D. Beyer, T. A. Henzinger, R. Jhala, and R. Majumdar. The software model checker Blast. STTT, 9(5-6):505-525, 2007.
    • (2007) STTT , vol.9 , Issue.5-6 , pp. 505-525
    • Beyer, D.1    Henzinger, T.A.2    Jhala, R.3    Majumdar, R.4
  • 6
    • 20844445346 scopus 로고    scopus 로고
    • Quantitative information flow, relations and polymorphic types
    • D. Clark, S. Hunt, and P. Malacaria. Quantitative information flow, relations and polymorphic types. J. Log. Comput., 15(2):181-199, 2005.
    • (2005) J. Log. Comput. , vol.15 , Issue.2 , pp. 181-199
    • Clark, D.1    Hunt, S.2    Malacaria, P.3
  • 7
    • 34249899908 scopus 로고    scopus 로고
    • A static analysis for quantifying information flow in a simple imperative language
    • D. Clark, S. Hunt, and P. Malacaria. A static analysis for quantifying information flow in a simple imperative language. Journal of Computer Security, 15(3):321-371, 2007.
    • (2007) Journal of Computer Security , vol.15 , Issue.3 , pp. 321-371
    • Clark, D.1    Hunt, S.2    Malacaria, P.3
  • 8
    • 28144442041 scopus 로고    scopus 로고
    • Belief in information flow
    • IEEE Computer Society
    • M. R. Clarkson, A. C. Myers, and F. B. Schneider. Belief in information flow. In CSFW, pages 31-45. IEEE Computer Society, 2005.
    • (2005) CSFW , pp. 31-45
    • Clarkson, M.R.1    Myers, A.C.2    Schneider, F.B.3
  • 9
    • 51749086409 scopus 로고    scopus 로고
    • Hyperproperties
    • IEEE Computer Society
    • M. R. Clarkson and F. B. Schneider. Hyperproperties. In CSF, pages 51-65. IEEE Computer Society, 2008.
    • (2008) CSF , pp. 51-65
    • Clarkson, M.R.1    Schneider, F.B.2
  • 10
    • 84976675687 scopus 로고
    • Information transmission in computational systems
    • E. S. Cohen. Information transmission in computational systems. In SOSP, pages 133-139, 1977.
    • (1977) SOSP , pp. 133-139
    • Cohen, E.S.1
  • 11
    • 24644445710 scopus 로고    scopus 로고
    • A theorem proving approach to analysis of secure information flow
    • D. Hutter and M. Ullmann, editors, Springer, Volume 3450 of Lecture Notes in Computer Science
    • Á . Darvas, R. Hähnle, and D. Sands. A theorem proving approach to analysis of secure information flow. In D. Hutter and M. Ullmann, editors, SPC, volume 3450 of Lecture Notes in Computer Science, pages 193-209. Springer, 2005.
    • (2005) SPC , pp. 193-209
    • Darvas, Á.1    Hähnle, R.2    Sands, D.3
  • 12
    • 0004238984 scopus 로고
    • Addison-Wesley Longman Publishing Co. Inc. Boston, MA, USA
    • D. E. R. Denning. Cryptography and data security. Addison-Wesley Longman Publishing Co., Inc., Boston, MA, USA, 1982.
    • (1982) Cryptography and Data Security
    • Denning, D.E.R.1
  • 13
    • 17644404426 scopus 로고    scopus 로고
    • Avoiding exponential explosion: Generating compact verification conditions
    • C. Flanagan and J. B. Saxe. Avoiding exponential explosion: generating compact verification conditions. In POPL, pages 193-205, 2001.
    • (2001) POPL , pp. 193-205
    • Flanagan, C.1    Saxe, J.B.2
  • 16
    • 67650696756 scopus 로고    scopus 로고
    • An information-theoretic model for adaptive side-channel attacks
    • P. Ning, S. D. C. di Vimercati, and P. F. Syverson, editors, ACM
    • B. K̈opf and D. A. Basin. An information-theoretic model for adaptive side-channel attacks. In P. Ning, S. D. C. di Vimercati, and P. F. Syverson, editors, ACM Conference on Computer and Communications Security, pages 286-296. ACM, 2007.
    • (2007) ACM Conference on Computer and Communications Security , pp. 286-296
    • K̈opf, B.1    Basin, D.A.2
  • 17
    • 13844267476 scopus 로고    scopus 로고
    • Efficient weakest preconditions
    • K. R. M. Leino. Efficient weakest preconditions. Inf. Process. Lett., 93(6):281-288, 2005.
    • (2005) Inf. Process. Lett. , vol.93 , Issue.6 , pp. 281-288
    • Leino, K.R.M.1
  • 18
    • 28144461940 scopus 로고    scopus 로고
    • Downgrading policies and relaxed noninterference
    • editors, ACM, In J. Palsberg and M. Abadi
    • P. Li and S. Zdancewic. Downgrading policies and relaxed noninterference. In J. Palsberg and M. Abadi, editors, POPL, pages 158-170. ACM, 2005.
    • (2005) POPL , pp. 158-170
    • Li, P.1    Zdancewic, S.2
  • 19
    • 34548282543 scopus 로고    scopus 로고
    • Assessing security threats of looping constructs
    • M. Hofmann and M. Felleisen, editors, ACM
    • P. Malacaria. Assessing security threats of looping constructs. In M. Hofmann and M. Felleisen, editors, POPL, pages 225- 235. ACM, 2007.
    • (2007) POPL , pp. 225-235
    • Malacaria, P.1
  • 20
    • 57349116220 scopus 로고    scopus 로고
    • Lagrange multipliers and maximum information leakage in different observational models
    • Ú . Erlingsson and M. Pistoia, editors, ACM
    • P. Malacaria and H. Chen. Lagrange multipliers and maximum information leakage in different observational models. In Ú . Erlingsson and M. Pistoia, editors, PLAS, pages 135- 146. ACM, 2008.
    • (2008) PLAS , pp. 135-146
    • Malacaria, P.1    Chen, H.2
  • 22
    • 57349180506 scopus 로고    scopus 로고
    • Quantitative information flow as network flow capacity
    • R. Gupta and S. P. Amarasinghe, editors, ACM
    • S. McCamant and M. D. Ernst. Quantitative information flow as network flow capacity. In R. Gupta and S. P. Amarasinghe, editors, PLDI, pages 193-205. ACM, 2008.
    • (2008) PLDI , pp. 193-205
    • Mccamant, S.1    Ernst, M.D.2
  • 23
    • 0028058408 scopus 로고
    • A general theory of composition for trace sets closed under selective interleaving functions
    • Washington, DC, USA, IEEE Computer Society
    • J. McLean. A general theory of composition for trace sets closed under selective interleaving functions. In SP '94: Proceedings of the 1994 IEEE Symposium on Security and Privacy, page 79, Washington, DC, USA, 1994. IEEE Computer Society.
    • (1994) SP '94: Proceedings of the 1994 IEEE Symposium on Security and Privacy , pp. 79
    • Mclean, J.1
  • 24
    • 33749856863 scopus 로고    scopus 로고
    • Lazy abstraction with interpolants
    • T. Ball and R. B. Jones, editors, Springer, Volume 4144 of Lecture Notes in Computer Science
    • K. L. McMillan. Lazy abstraction with interpolants. In T. Ball and R. B. Jones, editors, CAV, volume 4144 of Lecture Notes in Computer Science, pages 123-136. Springer, 2006.
    • (2006) CAV , pp. 123-136
    • McMillan, K.L.1
  • 26
    • 70450252184 scopus 로고    scopus 로고
    • Measuring channel capacity to distinguish undue influence
    • S. Chong and D. A. Naumann, editors, ACM
    • J. Newsome, S. McCamant, and D. Song. Measuring channel capacity to distinguish undue influence. In S. Chong and D. A. Naumann, editors, PLAS, pages 73-85. ACM, 2009.
    • (2009) PLAS , pp. 73-85
    • Newsome, J.1    McCamant, S.2    Song, D.3
  • 27
    • 35048828759 scopus 로고    scopus 로고
    • A model for delimited information release
    • K. Futatsugi, F. Mizoguchi, and N. Yonezaki, editors, Springer, Volume 3233 of Lecture Notes in Computer Science
    • A. Sabelfeld and A. C. Myers. A model for delimited information release. In K. Futatsugi, F. Mizoguchi, and N. Yonezaki, editors, ISSS, volume 3233 of Lecture Notes in Computer Science, pages 174-191. Springer, 2003.
    • (2003) ISSS , pp. 174-191
    • Sabelfeld, A.1    Myers, A.C.2
  • 28
    • 84856043672 scopus 로고
    • A mathematical theory of communication
    • 623-656
    • C. Shannon. A mathematical theory of communication. Bell System Technical Journal, 27:379-423, 623-656, 1948.
    • (1948) Bell System Technical Journal , vol.27 , pp. 379-423
    • Shannon, C.1
  • 29
    • 68549087948 scopus 로고    scopus 로고
    • On the foundations of quantitative information flow
    • L. de Alfaro, editor, Springer, Volume 5504 of Lecture Notes in Computer Science
    • G. Smith. On the foundations of quantitative information flow. In L. de Alfaro, editor, FOSSACS, volume 5504 of Lecture Notes in Computer Science, pages 288-302. Springer, 2009.
    • (2009) FOSSACS , pp. 288-302
    • Smith, G.1
  • 30
    • 33646037706 scopus 로고    scopus 로고
    • Secure information flow as a safety problem
    • C. Hankin and I. Siveroni, editors, Springer, Volume 3672 of Lecture Notes in Computer Science
    • T. Terauchi and A. Aiken. Secure information flow as a safety problem. In C. Hankin and I. Siveroni, editors, SAS, volume 3672 of Lecture Notes in Computer Science, pages 352-367. Springer, 2005.
    • (2005) SAS , pp. 352-367
    • Terauchi, T.1    Aiken, A.2
  • 31
    • 0026239342 scopus 로고
    • PP is as hard as the polynomial-time hierarchy
    • S. Toda. PP is as hard as the polynomial-time hierarchy. SIAM J. Comput., 20(5):865-877, 1991.
    • (1991) SIAM J. Comput. , vol.20 , Issue.5 , pp. 865-877
    • Toda, S.1
  • 32
    • 33745935759 scopus 로고    scopus 로고
    • Combining type-based analysis and model checking for finding counterexamples against non-interference
    • V. C. Sreedhar and S. Zdancewic, editors, ACM
    • H. Unno, N. Kobayashi, and A. Yonezawa. Combining type-based analysis and model checking for finding counterexamples against non-interference. In V. C. Sreedhar and S. Zdancewic, editors, PLAS, pages 17-26. ACM, 2006.
    • (2006) PLAS , pp. 17-26
    • Unno, H.1    Kobayashi, N.2    Yonezawa, A.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.