Information Leakage of Non-Terminating Processes - INRIA - Institut National de Recherche en Informatique et en Automatique Accéder directement au contenu
Communication Dans Un Congrès Année : 2014

Information Leakage of Non-Terminating Processes

Résumé

In recent years, quantitative security techniques have been providing effective measures of the security of a system against an attacker. Such techniques usually assume that the system produces a finite amount of observations based on a finite amount of secret bits and terminates, and the attack is based on these observations. By modeling systems with Markov chains, we are able to measure the effectiveness of attacks on non-terminating systems. Such systems do not necessarily produce a finite amount of output and are not necessarily based on a finite amount of secret bits. We provide characterizations and algorithms to define meaningful measures of security for non-terminating systems, and to compute them when possible. We also study the bounded versions of the problems, and show examples of non-terminating programs and how their effectiveness in protecting their secret can be measured.
Fichier principal
Vignette du fichier
main.pdf (508.08 Ko) Télécharger le fichier
Origine : Fichiers produits par l'(les) auteur(s)
Loading...

Dates et versions

hal-01086879 , version 1 (10-12-2014)

Licence

Paternité

Identifiants

Citer

Fabrizio Biondi, Axel Legay, Bo Friis Nielsen, Pasquale Malacaria, Andrzej Wasowski. Information Leakage of Non-Terminating Processes. IARCS Annual Conference on Foundations of Software Technology and Theoretical Computer Science, Dec 2014, Delhi, India. ⟨10.4230/LIPIcs.FSTTCS.2014.517⟩. ⟨hal-01086879⟩
1349 Consultations
61 Téléchargements

Altmetric

Partager

Gmail Facebook X LinkedIn More