Data Management

Quantifying Information Leakage in Finite Order Deterministic Programs

Download Now Free registration required

Executive Summary

Sensitive and confidential data protection grows to hot and important in many different fields, such as electronic commerce, auctions, voting, and so on. In this area, information flow analysis is a powerful technique for reasoning about how much sensitive information is exposed by a program during execution. Existing approaches to information flow analysis can be broadly classified into two: qualitative and quantitative approach. Qualitative information flow analysis, such as taint tracking, are coarse-grained - often only distinguishing between possible leakage and no leakage.

  • Format: PDF
  • Size: 226.3 KB