Mathematical control theory: deterministic systems
Mathematical control theory: deterministic systems
Bisimulation through probabilistic testing
Information and Computation
Abstract interpretation and application to logic programs
Journal of Logic Programming
Reactive, generative, and stratified models of probabilistic processes
Information and Computation
Abstract interpretation of reactive systems
ACM Transactions on Programming Languages and Systems (TOPLAS)
Bisimulation for probabilistic transition systems: a coalgebraic approach
Theoretical Computer Science
Concurrent constraint programming: towards probabilistic abstract interpretation
Proceedings of the 2nd ACM SIGPLAN international conference on Principles and practice of declarative programming
A note on the confinement problem
Communications of the ACM
Process algebra and non-interference
Journal of Computer Security
POPL '77 Proceedings of the 4th ACM SIGACT-SIGPLAN symposium on Principles of programming languages
Algebraic Theory of Processes
A Calculus of Communicating Systems
A Calculus of Communicating Systems
Principles of Program Analysis
Principles of Program Analysis
Handbook of Process Algebra
Systematic design of program analysis frameworks
POPL '79 Proceedings of the 6th ACM SIGACT-SIGPLAN symposium on Principles of programming languages
The Metric Analogue of Weak Bisimulation for Probabilistic Processes
LICS '02 Proceedings of the 17th Annual IEEE Symposium on Logic in Computer Science
Testing Preorders for Probabilistic Processes
ICALP '92 Proceedings of the 19th International Colloquium on Automata, Languages and Programming
Probabilistic Simulations for Probabilistic Processes
CONCUR '94 Proceedings of the Concurrency Theory
Analysing Approximate Confinement under Uniform Attacks
SAS '02 Proceedings of the 9th International Symposium on Static Analysis
Weak Bisimulation for Fully Probabilistic Processes
CAV '97 Proceedings of the 9th International Conference on Computer Aided Verification
PRISM: Probabilistic Symbolic Model Checker
TOOLS '02 Proceedings of the 12th International Conference on Computer Performance Evaluation, Modelling Techniques and Tools
Bisimulation for labelled Markov processes
Information and Computation - Special issue: LICS'97
Compositional Testing Preorders for Probabilistic Processes
LICS '95 Proceedings of the 10th Annual IEEE Symposium on Logic in Computer Science
CSFW '02 Proceedings of the 15th IEEE workshop on Computer Security Foundations
Non-Interference: Who Needs It?
CSFW '01 Proceedings of the 14th IEEE workshop on Computer Security Foundations
A model for evaluating IT security investments
Communications of the ACM - Has the Internet become indispensable?
A process-algebraic approach for the analysis of probabilistic noninterference
Journal of Computer Security
Journal of Computer Security - Special issue on WITS'02
Anonymity protocols as noisy channels
Information and Computation
On the Bayes risk in information-hiding protocols
Journal of Computer Security - 20th IEEE Computer Security Foundations Symposium (CSF)
Relational Analysis and Precision via Probabilistic Abstract Interpretation
Electronic Notes in Theoretical Computer Science (ENTCS)
Quantifying Timing Leaks and Cost Optimisation
ICICS '08 Proceedings of the 10th International Conference on Information and Communications Security
Quantifying information flow with beliefs
Journal of Computer Security - 18th IEEE Computer Security Foundations Symposium (CSF 18)
A Semiring-based Quantitative Analysis of Mobile Systems
Electronic Notes in Theoretical Computer Science (ENTCS)
Anonymity protocols as noisy channels
TGC'06 Proceedings of the 2nd international conference on Trustworthy global computing
Long-run cost analysis by approximation of linear operators over dioids
Mathematical Structures in Computer Science
Probabilistic semantics and program analysis
SFM'10 Proceedings of the Formal methods for quantitative aspects of programming languages, and 10th international conference on School on formal methods for the design of computer, communication and software systems
The optimum leakage principle for analyzing multi-threaded programs
ICITS'09 Proceedings of the 4th international conference on Information theoretic security
Probabilistic linda-based coordination languages
FMCO'04 Proceedings of the Third international conference on Formal Methods for Components and Objects
Measuring the speed of information leakage in mobile processes
AMAST'06 Proceedings of the 11th international conference on Algebraic Methodology and Software Technology
ICALP'13 Proceedings of the 40th international conference on Automata, Languages, and Programming - Volume Part II
Hi-index | 0.00 |
In this paper we lay the semantic basis for a quantitative security analysis of probabilistic systems by introducing notions of approximate confinement based on various process equivalences. We recast the operational semantics classically expressed via probabilistic transition systems (PTS) in terms of linear operators and we present a technique for defining approximate semantics as probabilistic abstract interpretations of the PTS semantics. An operator norm is then used to quantify this approximation. This provides a quantitative measure ε of the indistinguishability of two processes and therefore of their confinement. In this security setting a statistical interpretation is then given of the quantity ε which relates it to the number of tests needed to breach the security of the system.