Automating quantitative information flow

Unprecedented quantities of personal and business data are collected, stored, shared, and processed by countless institutions all over the world. Prominent examples include sharing personal data on social networking sites, storing credit card details in every store, tracking customer preferences of...

Full description

Bibliographic Details
Main Author: Heusser, Jonathan
Published: Queen Mary, University of London 2011
Subjects:
Online Access:https://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.535550
id ndltd-bl.uk-oai-ethos.bl.uk-535550
record_format oai_dc
spelling ndltd-bl.uk-oai-ethos.bl.uk-5355502019-02-27T03:25:25ZAutomating quantitative information flowHeusser, Jonathan2011Unprecedented quantities of personal and business data are collected, stored, shared, and processed by countless institutions all over the world. Prominent examples include sharing personal data on social networking sites, storing credit card details in every store, tracking customer preferences of supermarket chains, and storing key personal data on biometric passports. Confidentiality issues naturally arise from this global data growth. There are continously reports about how private data is leaked from confidential sources where the implications of the leaks range from embarrassment to serious personal privacy and business damages. This dissertation addresses the problem of automatically quantifying the amount of leaked information in programs. It presents multiple program analysis techniques of different degrees of automation and scalability. The contributions of this thesis are two fold: a theoretical result and two different methods for inferring and checking quantitative information flows are presented. The theoretical result relates the amount of possible leakage under any probability distribution back to the order relation in Landauer and Redmond’s lattice of partitions [35]. The practical results are split in two analyses: a first analysis precisely infers the information leakage using SAT solving and model counting; a second analysis defines quantitative policies which are reduced to checking a k-safety problem. A novel feature allows reasoning independent of the secret space. The presented tools are applied to real, existing leakage vulnerabilities in operating system code. This has to be understood and weighted within the context of the information flow literature which suffers under an apparent lack of practical examples and applications. This thesis studies such “real leaks” which could influence future strategies for finding information leaks.005.1Computer ScienceQueen Mary, University of Londonhttps://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.535550http://qmro.qmul.ac.uk/xmlui/handle/123456789/1260Electronic Thesis or Dissertation
collection NDLTD
sources NDLTD
topic 005.1
Computer Science
spellingShingle 005.1
Computer Science
Heusser, Jonathan
Automating quantitative information flow
description Unprecedented quantities of personal and business data are collected, stored, shared, and processed by countless institutions all over the world. Prominent examples include sharing personal data on social networking sites, storing credit card details in every store, tracking customer preferences of supermarket chains, and storing key personal data on biometric passports. Confidentiality issues naturally arise from this global data growth. There are continously reports about how private data is leaked from confidential sources where the implications of the leaks range from embarrassment to serious personal privacy and business damages. This dissertation addresses the problem of automatically quantifying the amount of leaked information in programs. It presents multiple program analysis techniques of different degrees of automation and scalability. The contributions of this thesis are two fold: a theoretical result and two different methods for inferring and checking quantitative information flows are presented. The theoretical result relates the amount of possible leakage under any probability distribution back to the order relation in Landauer and Redmond’s lattice of partitions [35]. The practical results are split in two analyses: a first analysis precisely infers the information leakage using SAT solving and model counting; a second analysis defines quantitative policies which are reduced to checking a k-safety problem. A novel feature allows reasoning independent of the secret space. The presented tools are applied to real, existing leakage vulnerabilities in operating system code. This has to be understood and weighted within the context of the information flow literature which suffers under an apparent lack of practical examples and applications. This thesis studies such “real leaks” which could influence future strategies for finding information leaks.
author Heusser, Jonathan
author_facet Heusser, Jonathan
author_sort Heusser, Jonathan
title Automating quantitative information flow
title_short Automating quantitative information flow
title_full Automating quantitative information flow
title_fullStr Automating quantitative information flow
title_full_unstemmed Automating quantitative information flow
title_sort automating quantitative information flow
publisher Queen Mary, University of London
publishDate 2011
url https://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.535550
work_keys_str_mv AT heusserjonathan automatingquantitativeinformationflow
_version_ 1718984171522621440