Despite the variety of tools and techniques deployed in order to protect sensitive data, ranging from security types in programming languages to anonymity protocols, data sanitisation, cryptographic algorithms, . . . , real-world systems tend to disclose part of the information they are meant to protect. This happens either by design - when the output of the system is public (e.g. a password checker) - or for reasons depending on their actual deployment and implementation (e.g. side-channel attacks against cryptographic devices). Our work aims to study methods for analysing from a quantitative point of view the behaviour of information flow in computing systems, that is, the leakage of sensible information via public outputs. In general, we are interested in studying systems with a probabilistic behaviour, in situations where the attacker is allowed to run these systems several times, while the secret is kept fixed. We analyse quantitative information flow in various scenarios characterised by an increasing power of the adversary. We start from the case of a single, passive attacker, attempting to break the system solely based upon observed data. Then we examine more complex settings, where we are faced with adversaries that collect sequential observations, up to considering active adversaries, capable of directly interacting with the system. In all cases, we consider one-try re-execution attacks, where the adversary can make a single guess after observing a certain number of independent executions of the system. In particular, we define suitable security metrics and study their asymptotic behaviour as the number of observations increases, as well as their rate of convergence. We also consider a number of applications of our analysis techniques.
Quantitative models of information flow: tuning the power of the adversary
2014
Abstract
Despite the variety of tools and techniques deployed in order to protect sensitive data, ranging from security types in programming languages to anonymity protocols, data sanitisation, cryptographic algorithms, . . . , real-world systems tend to disclose part of the information they are meant to protect. This happens either by design - when the output of the system is public (e.g. a password checker) - or for reasons depending on their actual deployment and implementation (e.g. side-channel attacks against cryptographic devices). Our work aims to study methods for analysing from a quantitative point of view the behaviour of information flow in computing systems, that is, the leakage of sensible information via public outputs. In general, we are interested in studying systems with a probabilistic behaviour, in situations where the attacker is allowed to run these systems several times, while the secret is kept fixed. We analyse quantitative information flow in various scenarios characterised by an increasing power of the adversary. We start from the case of a single, passive attacker, attempting to break the system solely based upon observed data. Then we examine more complex settings, where we are faced with adversaries that collect sequential observations, up to considering active adversaries, capable of directly interacting with the system. In all cases, we consider one-try re-execution attacks, where the adversary can make a single guess after observing a certain number of independent executions of the system. In particular, we define suitable security metrics and study their asymptotic behaviour as the number of observations increases, as well as their rate of convergence. We also consider a number of applications of our analysis techniques.File | Dimensione | Formato | |
---|---|---|---|
Pampaloni_phdthesis.pdf
accesso aperto
Tipologia:
Altro materiale allegato
Dimensione
1.19 MB
Formato
Adobe PDF
|
1.19 MB | Adobe PDF | Visualizza/Apri |
I documenti in UNITESI sono protetti da copyright e tutti i diritti sono riservati, salvo diversa indicazione.
https://hdl.handle.net/20.500.14242/144880
URN:NBN:IT:IMTLUCCA-144880