Risk assessment of security threats for looping constructs

  • Authors:
  • Pasquale Malacaria

  • Affiliations:
  • School of Electronic Engineering and Computer Science, Queen Mary University of London, London. E-mail: pm@dcs.qmul.ac.uk

  • Venue:
  • Journal of Computer Security - Security Issues in Concurrency (SecCo'07)
  • Year:
  • 2010

Quantified Score

Hi-index 0.00

Visualization

Abstract

There is a clear intuitive connection between the notion of leakage of information in a program and concepts from Information Theory. We explore this connection by interpreting Information Theory as a security risk assessment of programs. Information Theory will then be used to introduce techniques to reason on looping constructs, which are the kind of programs that previous quantitative models failed to satisfactory address. The semantics here introduced allows to describe both the amount and rate of leakage; if either is small enough, then a program might be deemed “secure”. Using the semantics we provide an investigation and classification of bounded and unbounded covert channels.