24,031 research outputs found
Just forget it - The semantics and enforcement of information erasure
Abstract. There are many settings in which sensitive information is made available to a system or organisation for a specific purpose, on the understanding that it will be erased once that purpose has been fulfilled. A familiar example is that of online credit card transactions: a customer typically provides credit card details to a payment system on the understanding that the following promises are kept: (i) Noninterference (NI): the card details may flow to the bank (in order that the payment can be authorised) but not to other users of the system; (ii) Erasure: the payment system will not retain any record of the card details once the transaction is complete. This example shows that we need to reason about NI and erasure in combination, and that we need to consider interactive systems: the card details are used in the interaction between the principals, and then erased; without the interaction, the card details could be dispensed with altogether and erasure would be unnecessary. The contributions of this paper are as follows. (i) We show that an end-to-end erasure property can be encoded as a âflow sensitive â noninterference property. (ii) By a judicious choice of language construct to support erasur
Quantitative analysis of the leakage of confidential data
Basic information theory is used to analyse the amount of confidential information which may be leaked by programs written in a very simple imperative language. In particular, a detailed analysis is given of the possible leakage due to equality tests and if statements. The analysis is presented as a set of syntax-directed inference rules and can readily be automated
A static analysis for quantifying information flow in a simple imperative language
We propose an approach to quantify interference in a simple imperative language that includes a looping construct. In this paper we focus on a particular case of this definition of interference: leakage of information from private variables to public ones via a Trojan Horse attack. We quantify leakage in terms of Shannon's information theory and we motivate our definition by proving a result relating this definition of leakage and the classical notion of programming language interference. The major contribution of the paper is a quantitative static analysis based on this definition for such a language. The analysis uses some non-trivial information theory results like Fano's inequality and L1 inequalities to provide reasonable bounds for conditional statements. While-loops are handled by integrating a qualitative flow-sensitive dependency analysis into the quantitative analysis
Recommended from our members
Viscous coupling of shear-free turbulence across nearly flat fluid interfaces
The interactions between shear-free turbulence in two regions (denoted as + and â on either side of a nearly flat horizontal interface are shown here to be controlled by several mechanisms, which depend on the magnitudes of the ratios of the densities, Ï+/Ïâ, and kinematic viscosities of the fluids, ÎŒ+/ÎŒâ, and the root mean square (r.m.s.) velocities of the turbulence, u0+/u0â, above and below the interface. This study focuses on gasâliquid interfaces so that Ï+/Ïâ âȘ 1 and also on where turbulence is generated either above or below the interface so that u0+/u0â is either very large or very small. It is assumed that vertical buoyancy forces across the interface are much larger than internal forces so that the interface is nearly flat, and coupling between turbulence on either side of the interface is determined by viscous stresses. A formal linearized rapid-distortion analysis with viscous effects is developed by extending the previous study by Hunt & Graham (J. Fluid Mech., vol. 84, 1978, pp. 209â235) of shear-free turbulence near rigid plane boundaries. The physical processes accounted for in our model include both the blocking effect of the interface on normal components of the turbulence and the viscous coupling of the horizontal field across thin interfacial viscous boundary layers. The horizontal divergence in the perturbation velocity field in the viscous layer drives weak inviscid irrotational velocity fluctuations outside the viscous boundary layers in a mechanism analogous to Ekman pumping. The analysis shows the following. (i) The blocking effects are similar to those near rigid boundaries on each side of the interface, but through the action of the thin viscous layers above and below the interface, the horizontal and vertical velocity components differ from those near a rigid surface and are correlated or anti-correlated respectively. (ii) Because of the growth of the viscous layers on either side of the interface, the ratio uI/u0, where uI is the r.m.s. of the interfacial velocity fluctuations and u0 the r.m.s. of the homogeneous turbulence far from the interface, does not vary with time. If the turbulence is driven in the lower layer with Ï+/Ïâ âȘ 1 and u0+/u0â âȘ 1, then uI/u0â ~ 1 when Re (=u0âLâ/Îœâ) â« 1 and R = (Ïâ/Ï+)(vâ/v+)1/2 â« 1. If the turbulence is driven in the upper layer with Ï+/Ïâ âȘ 1 and u0+/u0â â« 1, then uI/u0+ ~ 1/(1 + R). (iii) Nonlinear effects become significant over periods greater than Lagrangian time scales. When turbulence is generated in the lower layer, and the Reynolds number is high enough, motions in the upper viscous layer are turbulent. The horizontal vorticity tends to decrease, and the vertical vorticity of the eddies dominates their asymptotic structure. When turbulence is generated in the upper layer, and the Reynolds number is less than about 106â107, the fluctuations in the viscous layer do not become turbulent. Nonlinear processes at the interface increase the ratio uI/u0+ for sheared or shear-free turbulence in the gas above its linear value of uI/u0+ ~ 1/(1 + R) to (Ï+/Ïâ)1/2 ~ 1/30 for airâwater interfaces. This estimate agrees with the direct numerical simulation results from Lombardi, De Angelis & Bannerjee (Phys. Fluids, vol. 8, no. 6, 1996, pp. 1643â1665). Because the linear viscousâinertial coupling mechanism is still significant, the eddy motions on either side of the interface have a similar horizontal structure, although their vertical structure differs
Transformations between HCLP and PCSP
We present a general methodology for transforming between HCLP and PCSP in both directions. HCLP and PCSP each have advantages when modelling problems, and each have advantages when implementing models and solving them. Using the work presented in this paper, the appropriate paradigm can be used for each of these steps, with a meaning-preserving transformation in between if necessary
Material Flow Analysis: Outcome Focus (MFA:OF) for Elucidating the Role of Infrastructure in the Development of a Liveable City
Engineered infrastructures (i.e., utilities, transport & digital) underpin modern society. Delivering services via these
is especially challenging in cities where differing infrastructures form a web of interdependencies. There must be a
step change in how infrastructures deliver services to cities, if those cities are to be liveable in the future (i.e., provide
for citizen wellbeing, produce less CO2 & ensure the security of the resources they use). Material Flow Analysis
(MFA) is a useful methodology for understanding how infrastructures transfer resources to, within and from cities
and contribute to the cityâs metabolism. Liveable Cities, a five-year research programme was established to identify
& test radical engineering interventions leading to liveable cities of the future. In this paper, the authors propose an
outcome-focussed variation on the MFA methodology (MFA: OF), evidenced through work on the resource flows of
Birmingham, UK. These flows include water, energy, food & carbon-intensive materials (e.g., steel, paper, glass), as
well as their associated waste. The contribution MFA: OF makes to elucidating the interactions & interdependencies
between the flows is highlighted and suggestions are made for how it can contribute to the (radical) rethinking of the
engineered infrastructure associated with such flow
Recommended from our members
Termination-insensitive noninterference leaks more than just a bit
Current tools for analysing information flow in programs build upon ideas going back to Denning's work from the 70's. These systems enforce an imperfect notion of information flow which has become known as termination-insensitive noninterference. Under this version of noninterference, information leaks are permitted if they are transmitted purely by the program's termination behaviour (i.e., whether it terminates or not). This imperfection is the price to pay for having a security condition which is relatively liberal (e.g. allowing while-loops whose termination may depend on the value of a secret) and easy to check. But what is the price exactly? We argue that, in the presence of output, the price is higher than the âone bitâ often claimed informally in the literature, and effectively such programs can leak all of their secrets. In this paper we develop a definition of termination-insensitive noninterference suitable for reasoning about programs with outputs. We show that the definition generalises âbatch-jobâ style definitions from the literature and that it is indeed satisfied by a Denning-style program analysis with output. Although more than a bit of information can be leaked by programs satisfying this condition, we show that the best an attacker can do is a brute-force attack, which means that the attacker cannot reliably (in a technical sense) learn the secret in polynomial time in the size of the secret. If we further assume that secrets are uniformly distributed, we show that the advantage the attacker gains when guessing the secret after observing a polynomial amount of output is negligible in the size of the secret
- âŠ