A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2019; you can also visit the original URL.
The file type is application/pdf
.
Filters
Axioms for Information Leakage
2016
2016 IEEE 29th Computer Security Foundations Symposium (CSF)
To clarify this complex situation, this paper studies information leakage axiomatically, showing important dependencies among different axioms. ...
Quantitative information flow aims to assess and control the leakage of sensitive information by computer systems. ...
INTRODUCTION The theory of quantitative information flow has seen rapid development over the past decade, motivated by the need for rigorous techniques to assess and control the leakage of sensitive information ...
doi:10.1109/csf.2016.13
dblp:conf/csfw/AlvimCMMPS16
fatcat:gns24qljy5g4tcmdkb3z2467zm
An axiomatization of information flow measures
2019
Theoretical Computer Science
To clarify this complex situation, this paper studies information leakage axiomatically, showing important dependencies among different axioms. ...
Quantitative information flow aims to assess and control the leakage of sensitive information by computer systems. ...
And hence refinement is also sound for the new leakage measure. Another application concerns the possibility of negative leakage for some information measures. ...
doi:10.1016/j.tcs.2018.10.016
fatcat:mqhzmgcxzbdrfhydxbjojz2pcq
A Self-Healing Cryptosystem Design Prevent from Side-Channel Attack
2012
Advanced Engineering Forum
And then, a masking update technique is applied for making the side-channel leakage invalid. ...
In view of existing cryptosystem of Side-channel leakage of safe hidden trouble, this paper presents a kind of self-healing properties with the cryptosystem design method. ...
Axiom 1 gives Side-channel leakage producing situations, on the basis of Axiom 1, given measuring effectiveness points are defined as follows: Define 1: for key related state set 1 2 n R={r , r ,...r ...
doi:10.4028/www.scientific.net/aef.6-7.200
fatcat:azsp6uhnqrai7fo3iqrr7abp6y
Measuring Information Leakage in Non-stochastic Brute-Force Guessing
2021
2020 IEEE Information Theory Workshop (ITW)
a measure of private information leakage. ...
We investigate the relationship between the newly-developed measure of information leakage with maximin information and stochastic maximal leakage that are shown to arise in one-shot guessing. ...
These axioms are, in fact, relevant to any notion of information leakage. ...
doi:10.1109/itw46852.2021.9457602
fatcat:2gh5seppd5b5hlvsuhz4dneq4e
A Unified Framework for the Analysis of Side-Channel Key Recovery Attacks
[chapter]
2009
Lecture Notes in Computer Science
It allows us to quantify the effect of practically relevant leakage functions with a combination of security and information theoretic metrics. ...
François-Xavier Standaert is a post doctoral researcher funded by the FNRS (Funds for ...
Acknowledgements: The authors would like to acknowledge Leonid Reyzin for his valuable contributions to the development and understanding of the issues discussed in the paper. ...
doi:10.1007/978-3-642-01001-9_26
fatcat:yb6h5btb4fhhpg7ffgw5gdrph4
Measuring Information Leakage in Non-stochastic Brute-Force Guessing
[article]
2021
arXiv
pre-print
a measure of private information leakage. ...
We investigate the relationship between the newly-developed measure of information leakage with the existing non-stochastic maximin information and stochastic maximal leakage that are shown arise in one-shot ...
These axioms are, in fact, relevant to any notion of information leakage. ...
arXiv:2004.10911v2
fatcat:dnmexbt7ivd6ba4h5rseqmqvha
Automatic Security Detection for Access Control Based on Guided Deep Testing
2016
Journal of Network Computing and ApplicationsJournal of Network Computing and Applications
Security detection for access control model by testing whether there is permission leakage, is the key measure to evaluate access control system security. ...
Introduction Information leakage in access control [1] has become a major problem in the past decades, which lead to a continuous potential threat to the information system. ...
Violations of the information dissemination often interrelated with permission leakage. Step 4. ...
doi:10.23977/jnca.2016.11007
fatcat:5vysa3tqxra2bkzie2wuq6cjpi
The Physically Observable Security of Signature Schemes
[chapter]
2005
Lecture Notes in Computer Science
An increasingly popular environment for cryptographic implementation is the smart-card. ...
In recent years much research has been devoted to producing formal models of security for cryptographic primitives and to designing schemes that can be proved secure in such models. ...
Axiom 3 Information leakage depends upon the chosen measurement. ...
doi:10.1007/11586821_15
fatcat:3mnm2ssmzjc6jfh2fmgt6zom3y
Composable Bounds on Information Flow from Distribution Differences
[chapter]
2016
Lecture Notes in Computer Science
We also prove general composability theorems analogous to the dataprocessing inequality for mutual information, or cascading channels for channel capacities. ...
We define information leakage in terms of a "difference" between the a priori distribution over some remote behavior and the a posteriori distribution of the remote behavior conditioned on a local observation ...
Rushanan, and the reviewers of this paper for helpful comments. ...
doi:10.1007/978-3-319-29883-2_2
fatcat:jdpinrcd4vha5nt3joewpike24
Efficient Multifactor Two-Server Authenticated Scheme under Mobile Cloud Computing
2018
Wireless Communications and Mobile Computing
As thus, once the server is hacked by attackers to cause the leakage of the fingerprint information, it will take a deadly threat to the user privacy. ...
Unfortunately, in the existing scheme, biometric information is stored on the server side. ...
fingerprint information leakage in the server side. ...
doi:10.1155/2018/9149730
fatcat:snuxh6wzb5bkfec5ydwjxc7wna
Physically Observable Cryptography
[chapter]
2004
Lecture Notes in Computer Science
Complexity-theoretic cryptography considers only abstract notions of computation, and hence cannot protect against attacks that exploit the information leakage (via electromagnetic fields, power consumption ...
Our general model allows for a variety of adversaries. ...
Intuition for Physically Observable Computation Our model for physically observable (PO for short) computation is based on the following (overlapping)
Informal Axioms
Computation, and only computation ...
doi:10.1007/978-3-540-24638-1_16
fatcat:tyvucrxggrbvxgcjbko6hjlria
Quantifying Dynamic Leakage: Complexity Analysis and Model Counting-based Calculation
[article]
2019
arXiv
pre-print
This counter-intuition raises a need for a new definition of information leakage of a particular run, i.e., dynamic leakage. ...
As discussed in [5], entropy-based definitions do not work well for quantifying information leakage dynamically; Belief-based definition on the other hand is appropriate for deterministic programs, however ...
Note that these axioms are for static QIF measures, which differ from dynamic leakage. ...
arXiv:1903.03802v1
fatcat:xubrcckohncrxavpvqw22wuewq
Quantifying Dynamic Leakage - Complexity Analysis and Model Counting-based Calculation -
2019
IEICE transactions on information and systems
This counter-intuition raises a need for a new definition of information leakage of a particular run, i.e., dynamic leakage. ...
As discussed in [5], entropybased definitions do not work well for quantifying information leakage dynamically; Belief-based definition on the other hand is appropriate for deterministic programs, however ...
Acknowledgements The authors thank the reviewers for providing invaluable comments to the paper. This work was supported by JSPS KAKENHI Grant Numbers JP17K00098, JP19H04083. ...
doi:10.1587/transinf.2019edp7132
fatcat:qqkipgtourgc3eaxhyl6r5vgbu
Directed Information as Privacy Measure in Cloud-based Control
[article]
2017
arXiv
pre-print
In order to address privacy concerns in such a control architecture, we first investigate the issue of finding an appropriate privacy measure for clients who desire to keep local state information as private ...
Specifically, we justify the use of Kramer's notion of causally conditioned directed information as a measure of privacy loss based on an axiomatic argument. ...
Postulate 2 (Data-processing axiom [24] ) For any distribution P X,Y on X × Y, the information leakage function L( , P X,Y ) satisfies L( , P T (X),Y ) = L( , P X,Y ) (1) for every T : X → X such that ...
arXiv:1705.02802v1
fatcat:nwxib3ghpfe3zc7b46qmpozdu4
FRAME: Evaluating Simulatability Metrics for Free-Text Rationales
[article]
2022
arXiv
pre-print
FRAME is based on three axioms: (1) good metrics should yield highest scores for reference rationales, which maximize rationale-label association by construction; (2) good metrics should be appropriately ...
To investigate this, we propose FRAME, a framework for evaluating free-text rationale simulatability metrics. ...
Axiom 1, for both GH-GOLD and NP-GH-PRED. ...
arXiv:2207.00779v1
fatcat:33dgea7nkzdhlbns3owd5qbk5q
« Previous
Showing results 1 — 15 out of 2,179 results