Quantitative Information Flow for Scheduler-Dependent Systems
Quantitative information flow analyses measure how much information on secrets is leaked by publicly observable outputs. One area of interest is to quantify and estimate the information leakage of composed systems. Prior work has focused on running disjoint component systems in parallel and reasonin...
Main Authors: | , |
---|---|
Format: | Article |
Language: | English |
Published: |
Open Publishing Association
2015-09-01
|
Series: | Electronic Proceedings in Theoretical Computer Science |
Online Access: | http://arxiv.org/pdf/1509.08562v1 |
id |
doaj-91c6bba49635439897e32559163e8681 |
---|---|
record_format |
Article |
spelling |
doaj-91c6bba49635439897e32559163e86812020-11-25T01:51:51ZengOpen Publishing AssociationElectronic Proceedings in Theoretical Computer Science2075-21802015-09-01194Proc. QAPL 2015486210.4204/EPTCS.194.4:9Quantitative Information Flow for Scheduler-Dependent SystemsYusuke KawamotoThomas Given-WilsonQuantitative information flow analyses measure how much information on secrets is leaked by publicly observable outputs. One area of interest is to quantify and estimate the information leakage of composed systems. Prior work has focused on running disjoint component systems in parallel and reasoning about the leakage compositionally, but has not explored how the component systems are run in parallel or how the leakage of composed systems can be minimised. In this paper we consider the manner in which parallel systems can be combined or scheduled. This considers the effects of scheduling channels where resources may be shared, or whether the outputs may be incrementally observed. We also generalise the attacker's capability, of observing outputs of the system, to consider attackers who may be imperfect in their observations, e.g. when outputs may be confused with one another, or when assessing the time taken for an output to appear. Our main contribution is to present how scheduling and observation effect information leakage properties. In particular, that scheduling can hide some leaked information from perfect observers, while some scheduling may reveal secret information that is hidden to imperfect observers. In addition we present an algorithm to construct a scheduler that minimises the min-entropy leakage and min-capacity in the presence of any observer.http://arxiv.org/pdf/1509.08562v1 |
collection |
DOAJ |
language |
English |
format |
Article |
sources |
DOAJ |
author |
Yusuke Kawamoto Thomas Given-Wilson |
spellingShingle |
Yusuke Kawamoto Thomas Given-Wilson Quantitative Information Flow for Scheduler-Dependent Systems Electronic Proceedings in Theoretical Computer Science |
author_facet |
Yusuke Kawamoto Thomas Given-Wilson |
author_sort |
Yusuke Kawamoto |
title |
Quantitative Information Flow for Scheduler-Dependent Systems |
title_short |
Quantitative Information Flow for Scheduler-Dependent Systems |
title_full |
Quantitative Information Flow for Scheduler-Dependent Systems |
title_fullStr |
Quantitative Information Flow for Scheduler-Dependent Systems |
title_full_unstemmed |
Quantitative Information Flow for Scheduler-Dependent Systems |
title_sort |
quantitative information flow for scheduler-dependent systems |
publisher |
Open Publishing Association |
series |
Electronic Proceedings in Theoretical Computer Science |
issn |
2075-2180 |
publishDate |
2015-09-01 |
description |
Quantitative information flow analyses measure how much information on secrets is leaked by publicly observable outputs. One area of interest is to quantify and estimate the information leakage of composed systems. Prior work has focused on running disjoint component systems in parallel and reasoning about the leakage compositionally, but has not explored how the component systems are run in parallel or how the leakage of composed systems can be minimised. In this paper we consider the manner in which parallel systems can be combined or scheduled. This considers the effects of scheduling channels where resources may be shared, or whether the outputs may be incrementally observed. We also generalise the attacker's capability, of observing outputs of the system, to consider attackers who may be imperfect in their observations, e.g. when outputs may be confused with one another, or when assessing the time taken for an output to appear. Our main contribution is to present how scheduling and observation effect information leakage properties. In particular, that scheduling can hide some leaked information from perfect observers, while some scheduling may reveal secret information that is hidden to imperfect observers. In addition we present an algorithm to construct a scheduler that minimises the min-entropy leakage and min-capacity in the presence of any observer. |
url |
http://arxiv.org/pdf/1509.08562v1 |
work_keys_str_mv |
AT yusukekawamoto quantitativeinformationflowforschedulerdependentsystems AT thomasgivenwilson quantitativeinformationflowforschedulerdependentsystems |
_version_ |
1724995958129819648 |