Skip to main content

Towards Quantitative Analysis of Opacity

  • Conference paper

Part of the book series: Lecture Notes in Computer Science ((LNTCS,volume 8191))

Abstract

Opacity is a general approach for describing and unifying security properties expressed as predicates. A predicate is opaque if an observer of the system is unable to determine the satisfaction of the predicate in a given run of the system. The meaning of opacity is straightforward when considering the standard (qualitative) operational semantics, but there are a number of possible interpretations in a context where quantitative information about system evolutions is available. We propose four variants of quantitative opacity defined for probabilistic labelled transition systems, with each variant capturing a different aspect of quantifying the opacity of a predicate. Moreover, we present results showing how these four properties can be checked or approximated for specific classes of probabilistic labelled transition systems, observation functions, and system predicates.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   49.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Aldini, A., Pierro, A.D.: A quantitative approach to noninterference for probabilistic systems (2004)

    Google Scholar 

  2. Bérard, B., Mullins, J., Sassolas, M.: Quantifying opacity. In: QEST, pp. 263–272 (2010)

    Google Scholar 

  3. Boreale, M.: Quantifying information leakage in process calculi. In: Bugliesi, M., Preneel, B., Sassone, V., Wegener, I. (eds.) ICALP 2006, Part II. LNCS, vol. 4052, pp. 119–131. Springer, Heidelberg (2006)

    Chapter  Google Scholar 

  4. Boreale, M., Pampaloni, F., Paolini, M.: Asymptotic information leakage under one-try attacks. In: Hofmann, M. (ed.) FOSSACS 2011. LNCS, vol. 6604, pp. 396–410. Springer, Heidelberg (2011)

    Chapter  Google Scholar 

  5. Bryans, J.W., Koutny, M., Mazaré, L., Ryan, P.Y.A.: Opacity generalised to transition systems. In: Dimitrakos, T., Martinelli, F., Ryan, P.Y.A., Schneider, S. (eds.) FAST 2005. LNCS, vol. 3866, pp. 81–95. Springer, Heidelberg (2006)

    Chapter  Google Scholar 

  6. Bryans, J., Koutny, M., Mazaré, L., Ryan, P.Y.A.: Opacity generalised to transition systems. Int. J. Inf. Sec. 7(6), 421–435 (2008)

    Article  Google Scholar 

  7. Bryans, J., Koutny, M., Ryan, P.Y.A.: Modelling dynamic opacity using petri nets with silent actions. In: Dimitrakos, T., Martinelli, F. (eds.) FAST 2004. IFIP, vol. 173, pp. 159–172. Springer, Boston (2004)

    Google Scholar 

  8. Chatzikokolakis, K., Chothia, T., Guha, A.: Statistical measurement of information leakage. In: Esparza, J., Majumdar, R. (eds.) TACAS 2010. LNCS, vol. 6015, pp. 390–404. Springer, Heidelberg (2010)

    Chapter  Google Scholar 

  9. Clark, D., Hunt, S., Malacaria, P.: Quantitative analysis of the leakage of confidential data. Electronic Notes in Theoretical Computer Science 59 (2002)

    Google Scholar 

  10. Clark, D., Hunt, S., Malacaria, P.: Quantified interference for a while language. Electronic Notes in Theoretical Computer Science 112, 149–166 (2005)

    Google Scholar 

  11. Clark, D., Hunt, S., Malacaria, P.: Quantitative information flow, relations and polymorphic types. J. Log. and Comput. 15(2), 181–199 (2005)

    Article  MathSciNet  MATH  Google Scholar 

  12. Clark, D., Hunt, S., Malacaria, P.: A static analysis for quantifying information flow in a simple imperative language. Journal of Computer Security 15, 321–371 (2007)

    Google Scholar 

  13. Clarkson, M.R., Myers, A.C., Schneider, F.B.: Belief in information flow. In: 18th IEEE Computer Security Foundations Workshop, Aix-en-Provence, France, pp. 31–45 (June 2005)

    Google Scholar 

  14. Clarkson, M.R., Myers, A.C., Schneider, F.B.: Quantifying information flow with beliefs. Journal of Computer Security (2007)

    Google Scholar 

  15. Denning, D.E.R.: Cryptography and Data Security. Addison-Wesley (1982)

    Google Scholar 

  16. Goguen, J., Meseguer, J.: Security policies and security models. In: IEEE Symposium on Security and Privacy, pp. 11–20. IEEE Computer Society Press (1982)

    Google Scholar 

  17. Köpf, B., Basin, D.: An information-theoretic model for adaptive side-channel attacks. In: CCS 2007: Proceedings of the 14th ACM Conference on Computer and Communications Security, pp. 286–296. ACM SIGSAC, ACM Press, New York, NY (2007)

    Chapter  Google Scholar 

  18. Lakhnech, Y., Mazaré, L.: Probabilistic Opacity for a Passive Adversary and its Application to Chaum’s Voting Scheme. Technical Report 4, Verimag (2005)

    Google Scholar 

  19. Larsen, K.G., Skou, A.: Bisimulation through probabilistic testing (preliminary report). In: POPL, pp. 344–352. ACM (1989)

    Google Scholar 

  20. Lin, J.: Divergence measures based on the shannon entropy. IEEE Transactions on Information Theory 37, 145–151 (1991)

    Article  MATH  Google Scholar 

  21. Lowe, G.: Defining information flow quantity. Journal of Computer Security 12(3-4), 619–653 (2004)

    Google Scholar 

  22. Malacaria, P.: Assessing security threats of looping constructs. In: Proceedings of the 34th Annual ACM SIGPLAN-SIGACT Symposium on Principles of Programming Languages, pp. 225–235. ACM Press, Nice (2007)

    Chapter  Google Scholar 

  23. Mu, C., Clark, D.: An interval-baseed abstraction for quantifying information flow. ENTCS 59, 119–141 (2009)

    Google Scholar 

  24. Mu, C., Clark, D.: Quantitative analysis of secure information flow via probabilistic semantics. In: ARES, pp. 49–57 (2009)

    Google Scholar 

  25. Pierro, A.D., Hankin, C., Wiklicky, H.: Approximate non-interference. In: CSFW, pp. 3–17 (2002)

    Google Scholar 

  26. Shannon, C.E.: A mathematical theory of communication. SIGMOBILE Mob. Comput. Commun. Rev. 5(1), 3–55 (1948)

    Article  Google Scholar 

  27. Smith, G.: On the foundations of quantitative information flow. In: de Alfaro, L. (ed.) FOSSACS 2009. LNCS, vol. 5504, pp. 288–302. Springer, Heidelberg (2009)

    Chapter  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2013 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Bryans, J.W., Koutny, M., Mu, C. (2013). Towards Quantitative Analysis of Opacity. In: Palamidessi, C., Ryan, M.D. (eds) Trustworthy Global Computing. TGC 2012. Lecture Notes in Computer Science, vol 8191. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-41157-1_10

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-41157-1_10

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-41156-4

  • Online ISBN: 978-3-642-41157-1

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics