Automating quantitative information flow
Unprecedented quantities of personal and business data are collected, stored, shared, and processed by countless institutions all over the world. Prominent examples include sharing personal data on social networking sites, storing credit card details in every store, tracking customer preferences of...
Main Author: | |
---|---|
Published: |
Queen Mary, University of London
2011
|
Subjects: | |
Online Access: | https://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.535550 |
id |
ndltd-bl.uk-oai-ethos.bl.uk-535550 |
---|---|
record_format |
oai_dc |
spelling |
ndltd-bl.uk-oai-ethos.bl.uk-5355502019-02-27T03:25:25ZAutomating quantitative information flowHeusser, Jonathan2011Unprecedented quantities of personal and business data are collected, stored, shared, and processed by countless institutions all over the world. Prominent examples include sharing personal data on social networking sites, storing credit card details in every store, tracking customer preferences of supermarket chains, and storing key personal data on biometric passports. Confidentiality issues naturally arise from this global data growth. There are continously reports about how private data is leaked from confidential sources where the implications of the leaks range from embarrassment to serious personal privacy and business damages. This dissertation addresses the problem of automatically quantifying the amount of leaked information in programs. It presents multiple program analysis techniques of different degrees of automation and scalability. The contributions of this thesis are two fold: a theoretical result and two different methods for inferring and checking quantitative information flows are presented. The theoretical result relates the amount of possible leakage under any probability distribution back to the order relation in Landauer and Redmond’s lattice of partitions [35]. The practical results are split in two analyses: a first analysis precisely infers the information leakage using SAT solving and model counting; a second analysis defines quantitative policies which are reduced to checking a k-safety problem. A novel feature allows reasoning independent of the secret space. The presented tools are applied to real, existing leakage vulnerabilities in operating system code. This has to be understood and weighted within the context of the information flow literature which suffers under an apparent lack of practical examples and applications. This thesis studies such “real leaks” which could influence future strategies for finding information leaks.005.1Computer ScienceQueen Mary, University of Londonhttps://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.535550http://qmro.qmul.ac.uk/xmlui/handle/123456789/1260Electronic Thesis or Dissertation |
collection |
NDLTD |
sources |
NDLTD |
topic |
005.1 Computer Science |
spellingShingle |
005.1 Computer Science Heusser, Jonathan Automating quantitative information flow |
description |
Unprecedented quantities of personal and business data are collected, stored, shared, and processed by countless institutions all over the world. Prominent examples include sharing personal data on social networking sites, storing credit card details in every store, tracking customer preferences of supermarket chains, and storing key personal data on biometric passports. Confidentiality issues naturally arise from this global data growth. There are continously reports about how private data is leaked from confidential sources where the implications of the leaks range from embarrassment to serious personal privacy and business damages. This dissertation addresses the problem of automatically quantifying the amount of leaked information in programs. It presents multiple program analysis techniques of different degrees of automation and scalability. The contributions of this thesis are two fold: a theoretical result and two different methods for inferring and checking quantitative information flows are presented. The theoretical result relates the amount of possible leakage under any probability distribution back to the order relation in Landauer and Redmond’s lattice of partitions [35]. The practical results are split in two analyses: a first analysis precisely infers the information leakage using SAT solving and model counting; a second analysis defines quantitative policies which are reduced to checking a k-safety problem. A novel feature allows reasoning independent of the secret space. The presented tools are applied to real, existing leakage vulnerabilities in operating system code. This has to be understood and weighted within the context of the information flow literature which suffers under an apparent lack of practical examples and applications. This thesis studies such “real leaks” which could influence future strategies for finding information leaks. |
author |
Heusser, Jonathan |
author_facet |
Heusser, Jonathan |
author_sort |
Heusser, Jonathan |
title |
Automating quantitative information flow |
title_short |
Automating quantitative information flow |
title_full |
Automating quantitative information flow |
title_fullStr |
Automating quantitative information flow |
title_full_unstemmed |
Automating quantitative information flow |
title_sort |
automating quantitative information flow |
publisher |
Queen Mary, University of London |
publishDate |
2011 |
url |
https://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.535550 |
work_keys_str_mv |
AT heusserjonathan automatingquantitativeinformationflow |
_version_ |
1718984171522621440 |