SlideShare une entreprise Scribd logo
1  sur  17
Télécharger pour lire hors ligne
THE PROBLEM
                  THE APPROACH
                    CONCLUSION




    Symbolic Quantitative Information Flow

Quoc-Sang Phan1     Pasquale Malacaria1             Oksana Tkachuk2
                    Corina S. P˘s˘reanu2
                               aa

                  Queen Mary University of London

                    Nasa Ames Research Center


                     November 12, 2012




                                                                      1 / 17
THE PROBLEM   Non-interference
                 THE APPROACH   Quantitative Information Flow
                   CONCLUSION   State of the art


Attacker model




                                                                2 / 17
THE PROBLEM   Non-interference
                      THE APPROACH   Quantitative Information Flow
                        CONCLUSION   State of the art


Attacker model: an example



  Example: an attacker steals your cash card
      Having no idea about your pin number.
      A priori probability to guess: 0.0001.

  Randomly try a pin number:
      The pin is accepted (with probability 0.0001)
      The pin is rejected (with probability 0.9999)
      What did the attacker learn?




                                                                     3 / 17
THE PROBLEM   Non-interference
                      THE APPROACH   Quantitative Information Flow
                        CONCLUSION   State of the art


Quantitative Information Flow Analysis

  Definition 1
     leakage = secrecy before observing - secrecy after observing

  Given a function F measuring secrecy

                      ∆F (H) = F (H) − F (H|L)

  F is based on Information Theory
      Shannon Entropy: cash machine ∆H = 0.00147
      Min Entropy
      Guessing Entropy


                                                                     4 / 17
THE PROBLEM   Non-interference
                     THE APPROACH   Quantitative Information Flow
                       CONCLUSION   State of the art


State of the art


  Channel Capacity

                        ∆F (H) ≤ log2 (N)

  Existing work:
      Barvinok-based counting (Backes et al, S&P 2009): too
      restrictive and over-complicated.
      Bit patterns counting (Meng and Smith, PLAS 2011): largely
      manual, imprecise when outputs are diverged in the state
      space.




                                                                    5 / 17
THE PROBLEM
                                     Symbolic Quantitative Information Flow
                      THE APPROACH
                                     Preliminary Experiment
                        CONCLUSION


Data Sanitization Example


             base = 8;
             if (H < 16) then
                 O = base + H
             else
                 O = base
             end if
     Output in [8..23]
     Output is represented by a bit vector bvo := bK bK −1 ..b1 .
     For each bit, check whether it’s always 0 or 1 or any




                                                                              6 / 17
THE PROBLEM
                                     Symbolic Quantitative Information Flow
                      THE APPROACH
                                     Preliminary Experiment
                        CONCLUSION


Automation of BitPattern method


     Input symbolic
     Extracting ith bit

             for all element bi in vector bvo do
                 bi = (O >> i) &1
             end for

     Check assert bi == 0
     Automate bit queries by verifying assertions by JPF




                                                                              7 / 17
THE PROBLEM
                                     Symbolic Quantitative Information Flow
                      THE APPROACH
                                     Preliminary Experiment
                        CONCLUSION


Bit Pattern Results for Sanitization Example



      Output in [8..23]
      One-Bit Pattern: 000000000000000000000000000*****
      Two-Bit Pattern: b4 b3 can only be {01,10} → 16 possible
      outputs
      Max leakage = 4 bits
      Translate BitPattern to CNF, count solutions by RelSat




                                                                              8 / 17
THE PROBLEM
                                    Symbolic Quantitative Information Flow
                     THE APPROACH
                                    Preliminary Experiment
                       CONCLUSION


Symbolic Quantitative Information Flow



     Output is represented by a bit vector bvo := bK bK −1 ..b1 .
     Use Symbolic Execution to explore all possible values of bvo
         Add one condition for each bit bi to test it.
         There are K additional conditions in total.
         There are 2K combinations of condition, each one represents a
         distinct possible value.
     Count the distinct concrete values return by Symbolic
     Pathfinder.




                                                                             9 / 17
THE PROBLEM
                                  Symbolic Quantitative Information Flow
                   THE APPROACH
                                  Preliminary Experiment
                     CONCLUSION


Symbolic Counting by Symbolic Execution
           base = 8;
           if (H < 16) then
               O = base + H
           else
               O = base
           end if
           for all element bi in vector bvo do
               bi = (O >> i) &1
           end for
           for all element bi in vector bvo do
               if (bi == 1) then
                   pi = True
               else
                   pi = False
               end if
           end for                                                         10 / 17
THE PROBLEM
                                          Symbolic Quantitative Information Flow
                     THE APPROACH
                                          Preliminary Experiment
                       CONCLUSION


Symbolic Counting by Symbolic Execution

                                     s1

                H < 16                                       H ≥ 16

                          s2                            s3
         InitializeP C                                       InitializeP C
         pc := (H < 16)                                      pc := (H ≥ 16)
                          p1                            p1
                               pc ∧ p1                           pc ∧ p1

                                p2                                p2

             pc ∧ p1 ∧ ¬p2                            pc ∧ p1 ∧ p2


     (H ≥ 16) and (H < 16): program conditions.
     p1 , p2 , ..: additional conditions.
                                                                                   11 / 17
THE PROBLEM
                                                 Symbolic Quantitative Information Flow
                         THE APPROACH
                                                 Preliminary Experiment
                           CONCLUSION


Path Exploration with Addtional Constraints

          p1
               pc ∧ p1


                 p2
                          pc ∧ p1 ∧ p2


                            p3
                                    pc ∧ p1 ∧ p2 ∧ p3


                                         p4
                                                 pc ∧ p1 ∧ p2 ∧ p3 ∧ p4


                                                     p5
                  pc ∧ p1 ∧ p2 ∧ p3 ∧ p4 ∧ ¬p5              pc ∧ p1 ∧ p2 ∧ p3 ∧ p4 ∧ p5


                                                             UNSAT



      assert p1 is SAT
      assert p1 && p2 && p3 && p4 && p5 is UNSAT                                          12 / 17
THE PROBLEM
               Symbolic Quantitative Information Flow
THE APPROACH
               Preliminary Experiment
  CONCLUSION




          DEMO




                                                        13 / 17
THE PROBLEM
                                    Symbolic Quantitative Information Flow
                     THE APPROACH
                                    Preliminary Experiment
                       CONCLUSION


Implicit Flow

                      O = 0;
                      if (H == 0) O = 0;
                      else if (H == 1) O = 1;
                      else if (H == 2) O = 2;
                      else if (H == 3) O = 3;
                      else if (H == 4) O = 4;
                      else if (H == 5) O = 5;
                      else if (H == 6) O = 6;
                      else O = 0;
                        Figure: Implicit Flow

      BitPattern: 45ms, channel capacity: 3 bits
      SQIF-SE: 717ms, channel capacity: 2.81 bits

                                                                             14 / 17
THE PROBLEM
                                    Symbolic Quantitative Information Flow
                     THE APPROACH
                                    Preliminary Experiment
                       CONCLUSION


Ten random outputs


                  if (H == r1) O = r1;
                  else if (H == r2) O = r2;
                  else if (H == r3) O = r3;
                  ...
                  else if (H == r9) O = r9;
                  else O = r10;
                    Figure: Ten random outputs

     BitPattern: 5 seconds, channel capacity: 18.645.
     SQIF-SE: less than 1 second, channel capacity: 3.322 bits.



                                                                             15 / 17
THE PROBLEM
                     THE APPROACH
                       CONCLUSION


Conclusions



     A novel method for precise QIF.
         Compare to Barvinok-based counting: simpler, less restrictive,
         more applicable.
         Compare to BitPattern : always more precise, faster when
         possible outputs are diverged in state-space.
     Automation of BitPattern method.
     jpf-qif: the first tool to support information-theoretic QIF
     analysis.




                                                                          16 / 17
THE PROBLEM
     THE APPROACH
       CONCLUSION




THANK YOU FOR YOUR ATTENTION!




                                17 / 17

Contenu connexe

Tendances

8085 Paper Presentation slides,ppt,microprocessor 8085 ,guide, instruction set
8085 Paper Presentation slides,ppt,microprocessor 8085 ,guide, instruction set8085 Paper Presentation slides,ppt,microprocessor 8085 ,guide, instruction set
8085 Paper Presentation slides,ppt,microprocessor 8085 ,guide, instruction setSaumitra Rukmangad
 
Math cl ccw_siemens_rev01_fa16
Math cl ccw_siemens_rev01_fa16Math cl ccw_siemens_rev01_fa16
Math cl ccw_siemens_rev01_fa16John Todora
 
Chapter 7 8051 programming in c
Chapter 7  8051 programming in cChapter 7  8051 programming in c
Chapter 7 8051 programming in cAbdelrahman Elewah
 
assembly language programming and organization of IBM PC" by YTHA YU
assembly language programming and organization of IBM PC" by YTHA YUassembly language programming and organization of IBM PC" by YTHA YU
assembly language programming and organization of IBM PC" by YTHA YUEducation
 
Assembly Language Programming By Ytha Yu, Charles Marut Chap 7 (Logic, Shift,...
Assembly Language Programming By Ytha Yu, Charles Marut Chap 7 (Logic, Shift,...Assembly Language Programming By Ytha Yu, Charles Marut Chap 7 (Logic, Shift,...
Assembly Language Programming By Ytha Yu, Charles Marut Chap 7 (Logic, Shift,...Bilal Amjad
 
N_Asm Assembly arithmetic instructions (sol)
N_Asm Assembly arithmetic instructions (sol)N_Asm Assembly arithmetic instructions (sol)
N_Asm Assembly arithmetic instructions (sol)Selomon birhane
 
chapter 7 Logic, shift and rotate instructions
chapter 7 Logic, shift and rotate instructionschapter 7 Logic, shift and rotate instructions
chapter 7 Logic, shift and rotate instructionswarda aziz
 
Liszt los alamos national laboratory Aug 2011
Liszt los alamos national laboratory Aug 2011Liszt los alamos national laboratory Aug 2011
Liszt los alamos national laboratory Aug 2011Ed Dodds
 
15-bit NOVEL Hamming Codec using HSPICE 22nm CMOS Technology based on GDI Tec...
15-bit NOVEL Hamming Codec using HSPICE 22nm CMOS Technology based on GDI Tec...15-bit NOVEL Hamming Codec using HSPICE 22nm CMOS Technology based on GDI Tec...
15-bit NOVEL Hamming Codec using HSPICE 22nm CMOS Technology based on GDI Tec...theijes
 
MeCC: Memory Comparison-based Code Clone Detector
MeCC: Memory Comparison-based Code Clone DetectorMeCC: Memory Comparison-based Code Clone Detector
MeCC: Memory Comparison-based Code Clone Detector영범 정
 
Chap 8 The stack and introduction to procedures & Chapter 9 multiplication an...
Chap 8 The stack and introduction to procedures & Chapter 9 multiplication an...Chap 8 The stack and introduction to procedures & Chapter 9 multiplication an...
Chap 8 The stack and introduction to procedures & Chapter 9 multiplication an...warda aziz
 

Tendances (19)

Verilog tutorial
Verilog tutorialVerilog tutorial
Verilog tutorial
 
8085 Paper Presentation slides,ppt,microprocessor 8085 ,guide, instruction set
8085 Paper Presentation slides,ppt,microprocessor 8085 ,guide, instruction set8085 Paper Presentation slides,ppt,microprocessor 8085 ,guide, instruction set
8085 Paper Presentation slides,ppt,microprocessor 8085 ,guide, instruction set
 
Math cl ccw_siemens_rev01_fa16
Math cl ccw_siemens_rev01_fa16Math cl ccw_siemens_rev01_fa16
Math cl ccw_siemens_rev01_fa16
 
Chapter 7 8051 programming in c
Chapter 7  8051 programming in cChapter 7  8051 programming in c
Chapter 7 8051 programming in c
 
assembly language programming and organization of IBM PC" by YTHA YU
assembly language programming and organization of IBM PC" by YTHA YUassembly language programming and organization of IBM PC" by YTHA YU
assembly language programming and organization of IBM PC" by YTHA YU
 
Assembly Language Programming By Ytha Yu, Charles Marut Chap 7 (Logic, Shift,...
Assembly Language Programming By Ytha Yu, Charles Marut Chap 7 (Logic, Shift,...Assembly Language Programming By Ytha Yu, Charles Marut Chap 7 (Logic, Shift,...
Assembly Language Programming By Ytha Yu, Charles Marut Chap 7 (Logic, Shift,...
 
04 sequentialbasics 1
04 sequentialbasics 104 sequentialbasics 1
04 sequentialbasics 1
 
N_Asm Assembly arithmetic instructions (sol)
N_Asm Assembly arithmetic instructions (sol)N_Asm Assembly arithmetic instructions (sol)
N_Asm Assembly arithmetic instructions (sol)
 
chapter 7 Logic, shift and rotate instructions
chapter 7 Logic, shift and rotate instructionschapter 7 Logic, shift and rotate instructions
chapter 7 Logic, shift and rotate instructions
 
Liszt los alamos national laboratory Aug 2011
Liszt los alamos national laboratory Aug 2011Liszt los alamos national laboratory Aug 2011
Liszt los alamos national laboratory Aug 2011
 
Mpmc lab
Mpmc labMpmc lab
Mpmc lab
 
Daa chapter10
Daa chapter10Daa chapter10
Daa chapter10
 
Intel 8051 Programming in C
Intel 8051 Programming in CIntel 8051 Programming in C
Intel 8051 Programming in C
 
Verilog tutorial
Verilog tutorialVerilog tutorial
Verilog tutorial
 
8051 programming in c
8051 programming in c8051 programming in c
8051 programming in c
 
15-bit NOVEL Hamming Codec using HSPICE 22nm CMOS Technology based on GDI Tec...
15-bit NOVEL Hamming Codec using HSPICE 22nm CMOS Technology based on GDI Tec...15-bit NOVEL Hamming Codec using HSPICE 22nm CMOS Technology based on GDI Tec...
15-bit NOVEL Hamming Codec using HSPICE 22nm CMOS Technology based on GDI Tec...
 
MeCC: Memory Comparison-based Code Clone Detector
MeCC: Memory Comparison-based Code Clone DetectorMeCC: Memory Comparison-based Code Clone Detector
MeCC: Memory Comparison-based Code Clone Detector
 
Chap 8 The stack and introduction to procedures & Chapter 9 multiplication an...
Chap 8 The stack and introduction to procedures & Chapter 9 multiplication an...Chap 8 The stack and introduction to procedures & Chapter 9 multiplication an...
Chap 8 The stack and introduction to procedures & Chapter 9 multiplication an...
 
Fpga 05-verilog-programming
Fpga 05-verilog-programmingFpga 05-verilog-programming
Fpga 05-verilog-programming
 

Similaire à Symbolic Quantitative Information Flow Analysis

Quantifying Information Leaks via Model Counting Modulo Theories
Quantifying Information Leaks via Model Counting Modulo TheoriesQuantifying Information Leaks via Model Counting Modulo Theories
Quantifying Information Leaks via Model Counting Modulo TheoriesQuoc-Sang Phan
 
cp467_12_lecture14_image compression1.pdf
cp467_12_lecture14_image compression1.pdfcp467_12_lecture14_image compression1.pdf
cp467_12_lecture14_image compression1.pdfshaikmoosa2003
 
第四次课程 Chap8
第四次课程 Chap8第四次课程 Chap8
第四次课程 Chap8Emma2013
 
Towards an SMT-based approach for Quantitative Information Flow
Towards an SMT-based approach for Quantitative Information FlowTowards an SMT-based approach for Quantitative Information Flow
Towards an SMT-based approach for Quantitative Information FlowQuoc-Sang Phan
 
DC Lecture Slides 1 - Information Theory.ppt
DC Lecture Slides 1 - Information Theory.pptDC Lecture Slides 1 - Information Theory.ppt
DC Lecture Slides 1 - Information Theory.pptshortstime400
 
D I G I T A L C O M M U N I C A T I O N S J N T U M O D E L P A P E R{Www
D I G I T A L  C O M M U N I C A T I O N S  J N T U  M O D E L  P A P E R{WwwD I G I T A L  C O M M U N I C A T I O N S  J N T U  M O D E L  P A P E R{Www
D I G I T A L C O M M U N I C A T I O N S J N T U M O D E L P A P E R{Wwwguest3f9c6b
 
Digital Communications Jntu Model Paper{Www.Studentyogi.Com}
Digital Communications Jntu Model Paper{Www.Studentyogi.Com}Digital Communications Jntu Model Paper{Www.Studentyogi.Com}
Digital Communications Jntu Model Paper{Www.Studentyogi.Com}guest3f9c6b
 
All-Solution Satisfiability Modulo Theories: applications, algorithms and ben...
All-Solution Satisfiability Modulo Theories: applications, algorithms and ben...All-Solution Satisfiability Modulo Theories: applications, algorithms and ben...
All-Solution Satisfiability Modulo Theories: applications, algorithms and ben...Quoc-Sang Phan
 
Digital Logic & Design (DLD) presentation
Digital Logic & Design (DLD) presentationDigital Logic & Design (DLD) presentation
Digital Logic & Design (DLD) presentationfoyez ahammad
 
Unit I DIGITAL COMMUNICATION-INFORMATION THEORY.pdf
Unit I DIGITAL COMMUNICATION-INFORMATION THEORY.pdfUnit I DIGITAL COMMUNICATION-INFORMATION THEORY.pdf
Unit I DIGITAL COMMUNICATION-INFORMATION THEORY.pdfvani374987
 
PREDICTING THE TIME OF OBLIVIOUS PROGRAMS. Euromicro 2001
PREDICTING THE TIME OF OBLIVIOUS PROGRAMS. Euromicro 2001PREDICTING THE TIME OF OBLIVIOUS PROGRAMS. Euromicro 2001
PREDICTING THE TIME OF OBLIVIOUS PROGRAMS. Euromicro 2001Casiano Rodriguez-leon
 
PREDICTING THE TIME OF OBLIVIOUS PROGRAMS. Euromicro 2001
PREDICTING THE TIME OF OBLIVIOUS PROGRAMS. Euromicro 2001PREDICTING THE TIME OF OBLIVIOUS PROGRAMS. Euromicro 2001
PREDICTING THE TIME OF OBLIVIOUS PROGRAMS. Euromicro 2001Casiano Rodriguez-leon
 
zkStudyClub - Improving performance of non-native arithmetic in SNARKs (Ivo K...
zkStudyClub - Improving performance of non-native arithmetic in SNARKs (Ivo K...zkStudyClub - Improving performance of non-native arithmetic in SNARKs (Ivo K...
zkStudyClub - Improving performance of non-native arithmetic in SNARKs (Ivo K...Alex Pruden
 

Similaire à Symbolic Quantitative Information Flow Analysis (17)

Quantifying Information Leaks via Model Counting Modulo Theories
Quantifying Information Leaks via Model Counting Modulo TheoriesQuantifying Information Leaks via Model Counting Modulo Theories
Quantifying Information Leaks via Model Counting Modulo Theories
 
cp467_12_lecture14_image compression1.pdf
cp467_12_lecture14_image compression1.pdfcp467_12_lecture14_image compression1.pdf
cp467_12_lecture14_image compression1.pdf
 
第四次课程 Chap8
第四次课程 Chap8第四次课程 Chap8
第四次课程 Chap8
 
Towards an SMT-based approach for Quantitative Information Flow
Towards an SMT-based approach for Quantitative Information FlowTowards an SMT-based approach for Quantitative Information Flow
Towards an SMT-based approach for Quantitative Information Flow
 
Channel coding
Channel codingChannel coding
Channel coding
 
DC Lecture Slides 1 - Information Theory.ppt
DC Lecture Slides 1 - Information Theory.pptDC Lecture Slides 1 - Information Theory.ppt
DC Lecture Slides 1 - Information Theory.ppt
 
D I G I T A L C O M M U N I C A T I O N S J N T U M O D E L P A P E R{Www
D I G I T A L  C O M M U N I C A T I O N S  J N T U  M O D E L  P A P E R{WwwD I G I T A L  C O M M U N I C A T I O N S  J N T U  M O D E L  P A P E R{Www
D I G I T A L C O M M U N I C A T I O N S J N T U M O D E L P A P E R{Www
 
Digital Communications Jntu Model Paper{Www.Studentyogi.Com}
Digital Communications Jntu Model Paper{Www.Studentyogi.Com}Digital Communications Jntu Model Paper{Www.Studentyogi.Com}
Digital Communications Jntu Model Paper{Www.Studentyogi.Com}
 
All-Solution Satisfiability Modulo Theories: applications, algorithms and ben...
All-Solution Satisfiability Modulo Theories: applications, algorithms and ben...All-Solution Satisfiability Modulo Theories: applications, algorithms and ben...
All-Solution Satisfiability Modulo Theories: applications, algorithms and ben...
 
Digital Logic & Design (DLD) presentation
Digital Logic & Design (DLD) presentationDigital Logic & Design (DLD) presentation
Digital Logic & Design (DLD) presentation
 
Unit I DIGITAL COMMUNICATION-INFORMATION THEORY.pdf
Unit I DIGITAL COMMUNICATION-INFORMATION THEORY.pdfUnit I DIGITAL COMMUNICATION-INFORMATION THEORY.pdf
Unit I DIGITAL COMMUNICATION-INFORMATION THEORY.pdf
 
PREDICTING THE TIME OF OBLIVIOUS PROGRAMS. Euromicro 2001
PREDICTING THE TIME OF OBLIVIOUS PROGRAMS. Euromicro 2001PREDICTING THE TIME OF OBLIVIOUS PROGRAMS. Euromicro 2001
PREDICTING THE TIME OF OBLIVIOUS PROGRAMS. Euromicro 2001
 
PREDICTING THE TIME OF OBLIVIOUS PROGRAMS. Euromicro 2001
PREDICTING THE TIME OF OBLIVIOUS PROGRAMS. Euromicro 2001PREDICTING THE TIME OF OBLIVIOUS PROGRAMS. Euromicro 2001
PREDICTING THE TIME OF OBLIVIOUS PROGRAMS. Euromicro 2001
 
Robust watermarking technique sppt
Robust watermarking technique spptRobust watermarking technique sppt
Robust watermarking technique sppt
 
zkStudyClub - Improving performance of non-native arithmetic in SNARKs (Ivo K...
zkStudyClub - Improving performance of non-native arithmetic in SNARKs (Ivo K...zkStudyClub - Improving performance of non-native arithmetic in SNARKs (Ivo K...
zkStudyClub - Improving performance of non-native arithmetic in SNARKs (Ivo K...
 
AI Lesson 29
AI Lesson 29AI Lesson 29
AI Lesson 29
 
Lesson 29
Lesson 29Lesson 29
Lesson 29
 

Plus de Quoc-Sang Phan

Model-counting Approaches For Nonlinear Numerical Constraints
Model-counting Approaches For Nonlinear Numerical ConstraintsModel-counting Approaches For Nonlinear Numerical Constraints
Model-counting Approaches For Nonlinear Numerical ConstraintsQuoc-Sang Phan
 
Concurrent Bounded Model Checking
Concurrent Bounded Model CheckingConcurrent Bounded Model Checking
Concurrent Bounded Model CheckingQuoc-Sang Phan
 
Symbolic Execution as DPLL Modulo Theories
Symbolic Execution as DPLL Modulo TheoriesSymbolic Execution as DPLL Modulo Theories
Symbolic Execution as DPLL Modulo TheoriesQuoc-Sang Phan
 
Quantifying Information Leaks using Reliability Analysis
Quantifying Information Leaks using Reliability AnalysisQuantifying Information Leaks using Reliability Analysis
Quantifying Information Leaks using Reliability AnalysisQuoc-Sang Phan
 
Quantifying Information Leaks using Reliability Analysis
Quantifying Information Leaks using Reliability AnalysisQuantifying Information Leaks using Reliability Analysis
Quantifying Information Leaks using Reliability AnalysisQuoc-Sang Phan
 
Self-composition by Symbolic Execution
Self-composition by Symbolic ExecutionSelf-composition by Symbolic Execution
Self-composition by Symbolic ExecutionQuoc-Sang Phan
 

Plus de Quoc-Sang Phan (6)

Model-counting Approaches For Nonlinear Numerical Constraints
Model-counting Approaches For Nonlinear Numerical ConstraintsModel-counting Approaches For Nonlinear Numerical Constraints
Model-counting Approaches For Nonlinear Numerical Constraints
 
Concurrent Bounded Model Checking
Concurrent Bounded Model CheckingConcurrent Bounded Model Checking
Concurrent Bounded Model Checking
 
Symbolic Execution as DPLL Modulo Theories
Symbolic Execution as DPLL Modulo TheoriesSymbolic Execution as DPLL Modulo Theories
Symbolic Execution as DPLL Modulo Theories
 
Quantifying Information Leaks using Reliability Analysis
Quantifying Information Leaks using Reliability AnalysisQuantifying Information Leaks using Reliability Analysis
Quantifying Information Leaks using Reliability Analysis
 
Quantifying Information Leaks using Reliability Analysis
Quantifying Information Leaks using Reliability AnalysisQuantifying Information Leaks using Reliability Analysis
Quantifying Information Leaks using Reliability Analysis
 
Self-composition by Symbolic Execution
Self-composition by Symbolic ExecutionSelf-composition by Symbolic Execution
Self-composition by Symbolic Execution
 

Dernier

Separation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesSeparation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesFatimaKhan178732
 
mini mental status format.docx
mini    mental       status     format.docxmini    mental       status     format.docx
mini mental status format.docxPoojaSen20
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...EduSkills OECD
 
Interactive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationInteractive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationnomboosow
 
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Krashi Coaching
 
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdfssuser54595a
 
Measures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeMeasures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeThiyagu K
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introductionMaksud Ahmed
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxheathfieldcps1
 
URLs and Routing in the Odoo 17 Website App
URLs and Routing in the Odoo 17 Website AppURLs and Routing in the Odoo 17 Website App
URLs and Routing in the Odoo 17 Website AppCeline George
 
Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxNirmalaLoungPoorunde1
 
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...Marc Dusseiller Dusjagr
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdfSoniaTolstoy
 
CARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxCARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxGaneshChakor2
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfciinovamais
 
How to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxHow to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxmanuelaromero2013
 
Z Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphZ Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphThiyagu K
 

Dernier (20)

Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1
 
Separation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesSeparation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and Actinides
 
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptxINDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
 
mini mental status format.docx
mini    mental       status     format.docxmini    mental       status     format.docx
mini mental status format.docx
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
 
Interactive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationInteractive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communication
 
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
 
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
 
Measures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeMeasures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and Mode
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introduction
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptx
 
URLs and Routing in the Odoo 17 Website App
URLs and Routing in the Odoo 17 Website AppURLs and Routing in the Odoo 17 Website App
URLs and Routing in the Odoo 17 Website App
 
Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptx
 
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
 
CARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxCARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptx
 
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdfTataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdf
 
How to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxHow to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptx
 
Z Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphZ Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot Graph
 

Symbolic Quantitative Information Flow Analysis

  • 1. THE PROBLEM THE APPROACH CONCLUSION Symbolic Quantitative Information Flow Quoc-Sang Phan1 Pasquale Malacaria1 Oksana Tkachuk2 Corina S. P˘s˘reanu2 aa Queen Mary University of London Nasa Ames Research Center November 12, 2012 1 / 17
  • 2. THE PROBLEM Non-interference THE APPROACH Quantitative Information Flow CONCLUSION State of the art Attacker model 2 / 17
  • 3. THE PROBLEM Non-interference THE APPROACH Quantitative Information Flow CONCLUSION State of the art Attacker model: an example Example: an attacker steals your cash card Having no idea about your pin number. A priori probability to guess: 0.0001. Randomly try a pin number: The pin is accepted (with probability 0.0001) The pin is rejected (with probability 0.9999) What did the attacker learn? 3 / 17
  • 4. THE PROBLEM Non-interference THE APPROACH Quantitative Information Flow CONCLUSION State of the art Quantitative Information Flow Analysis Definition 1 leakage = secrecy before observing - secrecy after observing Given a function F measuring secrecy ∆F (H) = F (H) − F (H|L) F is based on Information Theory Shannon Entropy: cash machine ∆H = 0.00147 Min Entropy Guessing Entropy 4 / 17
  • 5. THE PROBLEM Non-interference THE APPROACH Quantitative Information Flow CONCLUSION State of the art State of the art Channel Capacity ∆F (H) ≤ log2 (N) Existing work: Barvinok-based counting (Backes et al, S&P 2009): too restrictive and over-complicated. Bit patterns counting (Meng and Smith, PLAS 2011): largely manual, imprecise when outputs are diverged in the state space. 5 / 17
  • 6. THE PROBLEM Symbolic Quantitative Information Flow THE APPROACH Preliminary Experiment CONCLUSION Data Sanitization Example base = 8; if (H < 16) then O = base + H else O = base end if Output in [8..23] Output is represented by a bit vector bvo := bK bK −1 ..b1 . For each bit, check whether it’s always 0 or 1 or any 6 / 17
  • 7. THE PROBLEM Symbolic Quantitative Information Flow THE APPROACH Preliminary Experiment CONCLUSION Automation of BitPattern method Input symbolic Extracting ith bit for all element bi in vector bvo do bi = (O >> i) &1 end for Check assert bi == 0 Automate bit queries by verifying assertions by JPF 7 / 17
  • 8. THE PROBLEM Symbolic Quantitative Information Flow THE APPROACH Preliminary Experiment CONCLUSION Bit Pattern Results for Sanitization Example Output in [8..23] One-Bit Pattern: 000000000000000000000000000***** Two-Bit Pattern: b4 b3 can only be {01,10} → 16 possible outputs Max leakage = 4 bits Translate BitPattern to CNF, count solutions by RelSat 8 / 17
  • 9. THE PROBLEM Symbolic Quantitative Information Flow THE APPROACH Preliminary Experiment CONCLUSION Symbolic Quantitative Information Flow Output is represented by a bit vector bvo := bK bK −1 ..b1 . Use Symbolic Execution to explore all possible values of bvo Add one condition for each bit bi to test it. There are K additional conditions in total. There are 2K combinations of condition, each one represents a distinct possible value. Count the distinct concrete values return by Symbolic Pathfinder. 9 / 17
  • 10. THE PROBLEM Symbolic Quantitative Information Flow THE APPROACH Preliminary Experiment CONCLUSION Symbolic Counting by Symbolic Execution base = 8; if (H < 16) then O = base + H else O = base end if for all element bi in vector bvo do bi = (O >> i) &1 end for for all element bi in vector bvo do if (bi == 1) then pi = True else pi = False end if end for 10 / 17
  • 11. THE PROBLEM Symbolic Quantitative Information Flow THE APPROACH Preliminary Experiment CONCLUSION Symbolic Counting by Symbolic Execution s1 H < 16 H ≥ 16 s2 s3 InitializeP C InitializeP C pc := (H < 16) pc := (H ≥ 16) p1 p1 pc ∧ p1 pc ∧ p1 p2 p2 pc ∧ p1 ∧ ¬p2 pc ∧ p1 ∧ p2 (H ≥ 16) and (H < 16): program conditions. p1 , p2 , ..: additional conditions. 11 / 17
  • 12. THE PROBLEM Symbolic Quantitative Information Flow THE APPROACH Preliminary Experiment CONCLUSION Path Exploration with Addtional Constraints p1 pc ∧ p1 p2 pc ∧ p1 ∧ p2 p3 pc ∧ p1 ∧ p2 ∧ p3 p4 pc ∧ p1 ∧ p2 ∧ p3 ∧ p4 p5 pc ∧ p1 ∧ p2 ∧ p3 ∧ p4 ∧ ¬p5 pc ∧ p1 ∧ p2 ∧ p3 ∧ p4 ∧ p5 UNSAT assert p1 is SAT assert p1 && p2 && p3 && p4 && p5 is UNSAT 12 / 17
  • 13. THE PROBLEM Symbolic Quantitative Information Flow THE APPROACH Preliminary Experiment CONCLUSION DEMO 13 / 17
  • 14. THE PROBLEM Symbolic Quantitative Information Flow THE APPROACH Preliminary Experiment CONCLUSION Implicit Flow O = 0; if (H == 0) O = 0; else if (H == 1) O = 1; else if (H == 2) O = 2; else if (H == 3) O = 3; else if (H == 4) O = 4; else if (H == 5) O = 5; else if (H == 6) O = 6; else O = 0; Figure: Implicit Flow BitPattern: 45ms, channel capacity: 3 bits SQIF-SE: 717ms, channel capacity: 2.81 bits 14 / 17
  • 15. THE PROBLEM Symbolic Quantitative Information Flow THE APPROACH Preliminary Experiment CONCLUSION Ten random outputs if (H == r1) O = r1; else if (H == r2) O = r2; else if (H == r3) O = r3; ... else if (H == r9) O = r9; else O = r10; Figure: Ten random outputs BitPattern: 5 seconds, channel capacity: 18.645. SQIF-SE: less than 1 second, channel capacity: 3.322 bits. 15 / 17
  • 16. THE PROBLEM THE APPROACH CONCLUSION Conclusions A novel method for precise QIF. Compare to Barvinok-based counting: simpler, less restrictive, more applicable. Compare to BitPattern : always more precise, faster when possible outputs are diverged in state-space. Automation of BitPattern method. jpf-qif: the first tool to support information-theoretic QIF analysis. 16 / 17
  • 17. THE PROBLEM THE APPROACH CONCLUSION THANK YOU FOR YOUR ATTENTION! 17 / 17