Abstract
In recent years, quantitative security techniques have been providing effective measures of the security of a system against an attacker. Such techniques usually assume that the system produces a finite amount of observations based on a finite amount of secret bits and terminates, and the attack is based on these observations. By modeling systems with Markov chains, we are able to measure the effectiveness of attacks on non-terminating systems. Such systems do not necessarily produce a finite amount of output and are not necessarily based on a finite amount of secret bits. We provide characterizations and algorithms to define meaningful measures of security for non-terminating systems, and to compute them when possible. We also study the bounded versions of the problems, and show examples of non-terminating programs and how their effectiveness in protecting their secret can be measured.
Originalsprog | Engelsk |
---|---|
Tidsskrift | Leibniz International Proceedings in Informatics |
Vol/bind | 29 |
Sider (fra-til) | 517-529 |
ISSN | 1868-8969 |
Status | Udgivet - 2014 |
Emneord
- Quantitative information flow
- Markov chain
- information leakage
- infinite execution