Quantitative Information Flow for Scheduler-Dependent Systems

Quantitative information flow analyses measure how much information on secrets is leaked by publicly observable outputs. One area of interest is to quantify and estimate the information leakage of composed systems. Prior work has focused on running disjoint component systems in parallel and reasonin...

Full description

Bibliographic Details
Main Authors: Yusuke Kawamoto, Thomas Given-Wilson
Format: Article
Language:English
Published: Open Publishing Association 2015-09-01
Series:Electronic Proceedings in Theoretical Computer Science
Online Access:http://arxiv.org/pdf/1509.08562v1
id doaj-91c6bba49635439897e32559163e8681
record_format Article
spelling doaj-91c6bba49635439897e32559163e86812020-11-25T01:51:51ZengOpen Publishing AssociationElectronic Proceedings in Theoretical Computer Science2075-21802015-09-01194Proc. QAPL 2015486210.4204/EPTCS.194.4:9Quantitative Information Flow for Scheduler-Dependent SystemsYusuke KawamotoThomas Given-WilsonQuantitative information flow analyses measure how much information on secrets is leaked by publicly observable outputs. One area of interest is to quantify and estimate the information leakage of composed systems. Prior work has focused on running disjoint component systems in parallel and reasoning about the leakage compositionally, but has not explored how the component systems are run in parallel or how the leakage of composed systems can be minimised. In this paper we consider the manner in which parallel systems can be combined or scheduled. This considers the effects of scheduling channels where resources may be shared, or whether the outputs may be incrementally observed. We also generalise the attacker's capability, of observing outputs of the system, to consider attackers who may be imperfect in their observations, e.g. when outputs may be confused with one another, or when assessing the time taken for an output to appear. Our main contribution is to present how scheduling and observation effect information leakage properties. In particular, that scheduling can hide some leaked information from perfect observers, while some scheduling may reveal secret information that is hidden to imperfect observers. In addition we present an algorithm to construct a scheduler that minimises the min-entropy leakage and min-capacity in the presence of any observer.http://arxiv.org/pdf/1509.08562v1
collection DOAJ
language English
format Article
sources DOAJ
author Yusuke Kawamoto
Thomas Given-Wilson
spellingShingle Yusuke Kawamoto
Thomas Given-Wilson
Quantitative Information Flow for Scheduler-Dependent Systems
Electronic Proceedings in Theoretical Computer Science
author_facet Yusuke Kawamoto
Thomas Given-Wilson
author_sort Yusuke Kawamoto
title Quantitative Information Flow for Scheduler-Dependent Systems
title_short Quantitative Information Flow for Scheduler-Dependent Systems
title_full Quantitative Information Flow for Scheduler-Dependent Systems
title_fullStr Quantitative Information Flow for Scheduler-Dependent Systems
title_full_unstemmed Quantitative Information Flow for Scheduler-Dependent Systems
title_sort quantitative information flow for scheduler-dependent systems
publisher Open Publishing Association
series Electronic Proceedings in Theoretical Computer Science
issn 2075-2180
publishDate 2015-09-01
description Quantitative information flow analyses measure how much information on secrets is leaked by publicly observable outputs. One area of interest is to quantify and estimate the information leakage of composed systems. Prior work has focused on running disjoint component systems in parallel and reasoning about the leakage compositionally, but has not explored how the component systems are run in parallel or how the leakage of composed systems can be minimised. In this paper we consider the manner in which parallel systems can be combined or scheduled. This considers the effects of scheduling channels where resources may be shared, or whether the outputs may be incrementally observed. We also generalise the attacker's capability, of observing outputs of the system, to consider attackers who may be imperfect in their observations, e.g. when outputs may be confused with one another, or when assessing the time taken for an output to appear. Our main contribution is to present how scheduling and observation effect information leakage properties. In particular, that scheduling can hide some leaked information from perfect observers, while some scheduling may reveal secret information that is hidden to imperfect observers. In addition we present an algorithm to construct a scheduler that minimises the min-entropy leakage and min-capacity in the presence of any observer.
url http://arxiv.org/pdf/1509.08562v1
work_keys_str_mv AT yusukekawamoto quantitativeinformationflowforschedulerdependentsystems
AT thomasgivenwilson quantitativeinformationflowforschedulerdependentsystems
_version_ 1724995958129819648