Show simple item record

dc.contributor.authorPhan, Q-Sen_US
dc.contributor.authorMalacaria, Pen_US
dc.contributor.authorPasareanu, CSen_US
dc.contributor.authord Amorim, Men_US
dc.contributor.authorSPIN 2014 Proceedings of the 2014 International SPIN Symposium on Model Checking of Softwareen_US
dc.date.accessioned2014-09-16T08:31:20Z
dc.date.issued2014en_US
dc.identifier.isbn978-1-4503-2452-6en_US
dc.identifier.urihttp://qmro.qmul.ac.uk/xmlui/handle/123456789/6119
dc.descriptionacmid: 2632367 keywords: Model Counting, Quantitative Information Flow, Reliability Analysis, Symbolic Execution location: San Jose, CA, USA numpages: 4
dc.descriptionacmid: 2632367 keywords: Model Counting, Quantitative Information Flow, Reliability Analysis, Symbolic Execution location: San Jose, CA, USA numpages: 4en_US
dc.descriptionacmid: 2632367 keywords: Model Counting, Quantitative Information Flow, Reliability Analysis, Symbolic Execution location: San Jose, CA, USA numpages: 4en_US
dc.description.abstractWe report on our work-in-progress into the use of reliability analysis to quantify information leaks. In recent work we have proposed a software reliability analysis technique that uses symbolic execution and model counting to quantify the probability of reaching designated program states, e.g. assert violations, under uncertainty conditions in the environment. The technique has many applications beyond reliability analysis, ranging from program understanding and debugging to analysis of cyber-physical systems. In this paper we report on a novel application of the technique, namely Quantitative Information Flow analysis (QIF). The goal of QIF is to measure information leakage of a program by using information-theoretic metrics such as Shannon entropy or Renyi entropy. We exploit the model counting engine of the reliability analyzer over symbolic program paths, to compute an upper bound of the maximum leakage over all possible distributions of the confidential data. We have implemented our approach into a prototype tool, called QILURA, and explore its effectiveness on a number of case studiesen_US
dc.format.extent105 - 108 (4)en_US
dc.publisherACMen_US
dc.relation.replaceshttp://qmro.qmul.ac.uk/jspui/handle/123456789/6079
dc.subjectalgorithmsen_US
dc.subjectperformanceen_US
dc.subjectsecurityen_US
dc.subjectQuantitative Information Flowen_US
dc.subjectReliability Analysisen_US
dc.subjectmodel countingen_US
dc.subjectsymbolic executionen_US
dc.titleQuantifying Information Leaks Using Reliability Analysisen_US
dc.typeConference Proceeding
dc.identifier.doi10.1145/2632362.2632367en_US
pubs.notesNot knownen_US
pubs.publication-statusPublisheden_US
pubs.publisher-urlhttp://doi.acm.org/10.1145/2632362.2632367en_US


Files in this item

Thumbnail

This item appears in the following Collection(s)

Show simple item record