Show simple item record

dc.contributor.authorPhan, Q-Sen_US
dc.contributor.authorMalacaria, Pen_US
dc.contributor.authorASIA CCS '14 Proceedings of the 9th ACM symposium on Information, computer and communications securityen_US
dc.date.accessioned2014-09-16T08:57:50Z
dc.date.issued2014en_US
dc.identifier.isbn978-1-4503-2800-5en_US
dc.identifier.urihttp://qmro.qmul.ac.uk/xmlui/handle/123456789/6120
dc.descriptionacmid: 2590328 keywords: model checking, quantitative information flow, satisfiability modulo theories, symbolic execution location: Kyoto, Japan numpages: 10
dc.descriptionacmid: 2590328 keywords: model checking, quantitative information flow, satisfiability modulo theories, symbolic execution location: Kyoto, Japan numpages: 10en_US
dc.descriptionacmid: 2590328 keywords: model checking, quantitative information flow, satisfiability modulo theories, symbolic execution location: Kyoto, Japan numpages: 10en_US
dc.description.abstractWe present a novel method for Quantitative Information Flow analysis. We show how the problem of computing information leakage can be viewed as an extension of the Satisfiability Modulo Theories (SMT) problem. This view enables us to develop a framework for QIF analysis based on the framework DPLL(T) used in SMT solvers. We then show that the methodology of Symbolic Execution (SE) also fits our framework. Based on these ideas, we build two QIF analysis tools: the first one employs CBMC, a bounded model checker for ANSI C, and the second one is built on top of Symbolic PathFinder, a Symbolic Executor for Java. We use these tools to quantify leaks in industrial code such as C programs from the Linux kernel, a Java tax program from the European project HATS, and anonymity protocolsen_US
dc.format.extent283 - 292 (9)en_US
dc.publisherACMen_US
dc.subjectmodel checkingen_US
dc.subjectquantitative information flowen_US
dc.subjectsatisfiability modulo theoriesen_US
dc.subjectsymbolic executionen_US
dc.titleAbstract Model Counting: A Novel Approach for Quantification of Information Leaksen_US
dc.typeConference Proceeding
dc.identifier.doi10.1145/2590296.2590328en_US
pubs.notesNot knownen_US
pubs.publication-statusPublisheden_US
pubs.publisher-urlhttp://doi.acm.org/10.1145/2590296.2590328en_US


Files in this item

Thumbnail

This item appears in the following Collection(s)

Show simple item record