User Tools

Site Tools


20120113

Differences

This shows you the differences between two versions of the page.

Link to this comparison view

Both sides previous revisionPrevious revision
Next revision
Previous revision
20120113 [2012/01/11 14:59] sari20120113 [2012/01/13 13:48] (current) tanvir
Line 1: Line 1:
 +**Department news**: \\
 +From 2012, seminar room is changing to a bigger one 0.2.11
 +
 +**Presentation (discussion)** \\
 +This Friday Sari will give a presentation.
 +
 +**Title**\\
 +Refining a Quantitative Information Flow Metric
 +
 **Abstract**\\ **Abstract**\\
 We introduce a new perspective into the field of quantitative information flow (QIF) analysis that invites the community to bound the leakage, reported by QIF quantifiers, by a range consistent with the size of a program's secret input instead of by a mathematically sound (but counter-intuitive) upper bound of that leakage. To substantiate our position, we present a refinement of a recent QIF metric that appears in the literature. Our refinement is based on slight changes we bring into the design of that metric. These changes do not affect the theoretical premises onto which the original metric is laid. However, they enable the natural association between flow results and the exhaustive search effort needed to uncover program's secret information (or the residual secret part of that information) to be clearly established. The refinement we discuss in this paper validates our perspective and demonstrates its importance in the future design of QIF quantifiers. We introduce a new perspective into the field of quantitative information flow (QIF) analysis that invites the community to bound the leakage, reported by QIF quantifiers, by a range consistent with the size of a program's secret input instead of by a mathematically sound (but counter-intuitive) upper bound of that leakage. To substantiate our position, we present a refinement of a recent QIF metric that appears in the literature. Our refinement is based on slight changes we bring into the design of that metric. These changes do not affect the theoretical premises onto which the original metric is laid. However, they enable the natural association between flow results and the exhaustive search effort needed to uncover program's secret information (or the residual secret part of that information) to be clearly established. The refinement we discuss in this paper validates our perspective and demonstrates its importance in the future design of QIF quantifiers.
Line 4: Line 13:
 **Keywords**\\ **Keywords**\\
 computer security, quantitative information flow, leakage, information theory, measurement, program analysis, non-interference, confidentiality computer security, quantitative information flow, leakage, information theory, measurement, program analysis, non-interference, confidentiality
 +
 +
 +**Attendance:**\\
 +  * Sari Haj Hussein
 +  * Christian Thomsen
 +  * Chaithanya
 +  * Darius Sidlauskas
 +  * Mohamed Khalefa
 +  * Laurynas Siksnys
 +  * Saulius
 +  * Tanvir Ahmed
 +  * Torben Bach Pedersen
 +  * Kristian Torp
 +  * Liu Xiufeng
 +  * Yoann Pitarch
 +  * Asif Iqbal Baba
 +
20120113.1326293977.txt.gz · Last modified: by sari