computing the leakage of information-hiding systems miguel e. andrés catuscia palamidessi radboud...

23
Computing the Computing the Leakage Leakage of of Information-Hiding Systems Information-Hiding Systems Miguel E. Andrés Catuscia Radboud University, The Netherlands INRIA and LIX, Franc Peter Van Rossum Geoffrey Sm Radboud Univeristy, The Netherlands SCIS, USA

Upload: talon-peirce

Post on 31-Mar-2015

212 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: Computing the Leakage of Information-Hiding Systems Miguel E. Andrés Catuscia Palamidessi Radboud University, The Netherlands INRIA and LIX, France Peter

Computing the Computing the LeakageLeakage of of Information-Hiding SystemsInformation-Hiding Systems

Miguel E. Andrés Catuscia Palamidessi Radboud University, The Netherlands INRIA and LIX, France

Peter Van Rossum Geoffrey SmithRadboud Univeristy, The Netherlands SCIS, USA

Page 2: Computing the Leakage of Information-Hiding Systems Miguel E. Andrés Catuscia Palamidessi Radboud University, The Netherlands INRIA and LIX, France Peter

2ReSeCo - December 17th 2009 FaMAF, Córdoba - Argentina

Miguel E. AndrésRadboud University

MotivationMotivation

Information HidingThe problem of constructing protocols or programs that protect sensitive information from being deduced by some adversary Anonymity: Design mechanisms to prevent an observer of network

traffic from deducing who is comunicating Secure Information Flow: Prevent programs from leaking their

secret input to an observer of their public output Example: Crowds

Page 3: Computing the Leakage of Information-Hiding Systems Miguel E. Andrés Catuscia Palamidessi Radboud University, The Netherlands INRIA and LIX, France Peter

3ReSeCo - December 17th 2009 FaMAF, Córdoba - Argentina

Miguel E. AndrésRadboud University

MotivationMotivation Quantitative Approach (Information Theory)

IHS’s as noisy channels

y1 … yn

X1 P(y1|x1) ... P(yn|x1)

…xm P(y1|xm) P(yn|xm)

Channel Matrix

YX Noisy Channel

Transmitter Receiver

P(y | x) inherent fixed property of the communication channel

Protocolor

Program

Channel Matrix C

Secrets S

Observables O

πs

P(o1 | s1)

P(om | s1)

o1

o2

om

s1

s2

sn

Noisy Channel

o1 … on

S1 P(o1|s1) ... P(on|s1)

Sm P(o1|sm) P(on|sm)

Page 4: Computing the Leakage of Information-Hiding Systems Miguel E. Andrés Catuscia Palamidessi Radboud University, The Netherlands INRIA and LIX, France Peter

4ReSeCo - December 17th 2009 FaMAF, Córdoba - Argentina

Miguel E. AndrésRadboud University

MotivationMotivation

Information LeakageInformation Leakage Vulnerability (in one try)

A priori vulnerability

A posteriori vulnerability

Multipilicative Leakage

Maximum Leakage

Lx(C,π) = V(S|O) / V(S) L+(C,π) = V(S|O) - V(S)

V(S)=max π(s) s

Additive Leakage

MLx(C) = max Lx(C,π) and ML+(C) = max L+(C,π) π ∈ D(S) π ∈ D(S)

Leakage is defined in terms of the channel matrix C!

o s o s V(S|O) = ∑ max P(s|o)×P(o) = ∑ max C(o|s)×π(s)

Page 5: Computing the Leakage of Information-Hiding Systems Miguel E. Andrés Catuscia Palamidessi Radboud University, The Netherlands INRIA and LIX, France Peter

5ReSeCo - December 17th 2009 FaMAF, Córdoba - Argentina

Miguel E. AndrésRadboud University

MotivationMotivation

What we do (contributions) Model IHS’s using automata We present two techniques to compute the channel matrix and

leakage of an IHS Reachability Analysis Quantitative Counterexample Generation

o Also providing approximation

o Also providing feedback for debugging

Show how to use our techniques to compute and approximate leakage of different different form of IHS’s

Show that for interactiving IHS’s the definition of associated channel proposed in literature is not sound.

However, we note that it is still possible to define its leakage in a consistent way and show that our methods extend smoothly to this case.

Page 6: Computing the Leakage of Information-Hiding Systems Miguel E. Andrés Catuscia Palamidessi Radboud University, The Netherlands INRIA and LIX, France Peter

6ReSeCo - December 17th 2009 FaMAF, Córdoba - Argentina

Miguel E. AndrésRadboud University

OverviewOverview

Motivation Information-hiding systems as automata Reachability analysis approach Iterative approach

Regular expressions techniques SCC analysis technique Identifying high-leakage sources

Information-hiding systems with variable a priori

Interactive information-hiding systems Future work

Page 7: Computing the Leakage of Information-Hiding Systems Miguel E. Andrés Catuscia Palamidessi Radboud University, The Netherlands INRIA and LIX, France Peter

7ReSeCo - December 17th 2009 FaMAF, Córdoba - Argentina

Miguel E. AndrésRadboud University

• I = (M , As , Ao , Aτ) where M =(Q , A , δ) is a probabilistic automaton As, Ao, and Aτ are disjoint sets of secret, observable, and internal actions δ satisfies:

Secret actions can occur only at the beginning Only internal actions can occur in cycles

• Assume a known a priori distribution π

Probabilistic automata

Information-hiding systems

Information-hiding systems as automataInformation-hiding systems as automata

M = (Q , A , δ) where• Q is a finite set of states• A a finite set of actions• δ : Q → D(A × Q) is the transition function

Paths represent possible evolutions of the automaton,each path has an associated probability

Page 8: Computing the Leakage of Information-Hiding Systems Miguel E. Andrés Catuscia Palamidessi Radboud University, The Netherlands INRIA and LIX, France Peter

8ReSeCo - December 17th 2009 FaMAF, Córdoba - Argentina

Miguel E. AndrésRadboud University

OverviewOverview

Motivation Information-hiding systems as automata Reachability analysis approach Iterative approach

Regular expressions techniques SCC analysis technique Identifying high-leakage sources

Information-hiding systems with variable a priori

Interactive information-hiding systems Future work

Page 9: Computing the Leakage of Information-Hiding Systems Miguel E. Andrés Catuscia Palamidessi Radboud University, The Netherlands INRIA and LIX, France Peter

9ReSeCo - December 17th 2009 FaMAF, Córdoba - Argentina

Miguel E. AndrésRadboud University

Goal: compute channel matrix C

Solution: system of linear equationsLema:

Reachability analysis approachReachability analysis approach

o1 … on

S1 P(o1|s1) ... P(on|s1)

Sm P(o1|sm) P(on|sm)

Note P(o|s)=P(o˄s)/π(s)We need to compute the probability of seeing o and s (for all o and s)

o1 … on

S1 P(o1˄s1) ... P(on˄s1)

…Sm P(o1˄sm) P(on˄sm)

Channel Matrix Matrix of joint Probabilities

P(oi|sj)=P(oi˄sj)/π(sj)P(oi|sj)=P(oi˄sj)/π(sj)P(oi|sj)=P(oi˄sj)/π(sj)P(oi|sj)=P(oi˄sj)/π(sj)

Page 10: Computing the Leakage of Information-Hiding Systems Miguel E. Andrés Catuscia Palamidessi Radboud University, The Netherlands INRIA and LIX, France Peter

10ReSeCo - December 17th 2009 FaMAF, Córdoba - Argentina

Miguel E. AndrésRadboud University

Reachability analysis approachReachability analysis approach

Example

Complexity O ( (|obs| × |Q|)³) In general

O ( |obs| × |Q|³ ) Some Scenarios (e.g observables at the end)

b

a

1/421/209/40

1/49/4021/40

UBA

Channel Matrix

Solution

Page 11: Computing the Leakage of Information-Hiding Systems Miguel E. Andrés Catuscia Palamidessi Radboud University, The Netherlands INRIA and LIX, France Peter

11ReSeCo - December 17th 2009 FaMAF, Córdoba - Argentina

Miguel E. AndrésRadboud University

OverviewOverview

Motivation Information-hiding systems as automata Reachability analysis approach Iterative approach

Regular expressions techniques SCC analysis technique Identifying high-leakage sources

Information-hiding systems with variable a priori

Interactive information-hiding systems Future work

Page 12: Computing the Leakage of Information-Hiding Systems Miguel E. Andrés Catuscia Palamidessi Radboud University, The Netherlands INRIA and LIX, France Peter

12ReSeCo - December 17th 2009 FaMAF, Córdoba - Argentina

Miguel E. AndrésRadboud University

Idea

Partial Matrices

Properties Lim Ck = C

Lim L(Ck/π, π) = L(C/π, π)

L(Ck/π, π) ≤ L(C/π, π) ≤ L(Ck/π, π) + g(Ck) for all k (g is decreassing)

Motivation Borrow ideas and tools from prob counterexample generation Provide approximation (with upper and low bounds) It allows to identify high-leakage sources

Idea

Iterative approachIterative approach

k → ∞

k → ∞

C0(o˄s) = 0, Ck+1(o˄s) =Ck(o˄s) + P(σk+1) if o-trace(σk+1)=o

and s-trace(σk+1)=s,Ck(o˄s) otherwise.

with σ1 , σ2 , … the paths of the systemP(on˄sm)P(o1˄sm)Sm

……

P(on˄s1)...P(o1˄s1)S1

on…o1

P(on˄sm)P(o1˄sm)Sm

……

P(on˄s1)...P(o1˄s1)S1

on…o1

Page 13: Computing the Leakage of Information-Hiding Systems Miguel E. Andrés Catuscia Palamidessi Radboud University, The Netherlands INRIA and LIX, France Peter

13ReSeCo - December 17th 2009 FaMAF, Córdoba - Argentina

Miguel E. AndrésRadboud University

Ck(o˄s) + P(rk+1) if o-trace(rk+1)=o and s-trace(rk+1)=sCk(o˄s) otherwise

Idea: Translate M into an equivalent regular expression rM=r1 + r2 + ... + rn

Each ri represents a set of paths Paths-ri of M Each ri has a probability and P(ri)=P(Paths-ri)

Example

Partial Matrices (with regexps)

Iterative approach [regexps]Iterative approach [regexps]

whereM ≡ r1 + … +rnC0(o˄s) = 0, Ck+1(o˄s) =

Page 14: Computing the Leakage of Information-Hiding Systems Miguel E. Andrés Catuscia Palamidessi Radboud University, The Netherlands INRIA and LIX, France Peter

14ReSeCo - December 17th 2009 FaMAF, Córdoba - Argentina

Miguel E. AndrésRadboud University

Idea: Group together paths that only differ in the way they traverse SCC

1. Abstract away SCC of M (we do it in such a way that the observable behaviour of the automaton does not change) obtaining an acyclic model Ac(M)

2. Construct the partial matrix of Ac(M) instead of M

Example

Partial Matrices (with SCC analysis)

Iterative approach [SCC analysis]Iterative approach [SCC analysis]

M Ac(M)

Obs

Paths of Ac(M)

Abstract SCCs

C0(o˄s) = 0, Ck+1(o˄s) =Ck(o˄s) + P(σk+1) if o-trace(σk+1)=o and s-trace(σk+1)=s,

Ck(o˄s) otherwise.

where σ1 , σ2 , … , σn are the paths of Ac(M)

Page 15: Computing the Leakage of Information-Hiding Systems Miguel E. Andrés Catuscia Palamidessi Radboud University, The Netherlands INRIA and LIX, France Peter

15ReSeCo - December 17th 2009 FaMAF, Córdoba - Argentina

Miguel E. AndrésRadboud University

Debugging SCC technique

REGEXPS technique

Goal: Identify sources of high leakage (debugging) Idea:

Example

Iterative approach [Identifying high-leakage sources]Iterative approach [Identifying high-leakage sources]

Matrix of joint probabilities

O1 O2 O3

S1 P(o1˄s1) P(o2˄s1) P(o3˄s1)

S2 P(o1˄s2) P(o2˄s2) P(o3˄s2)

S3 P(o1˄s3) P(o2˄s3) P(o3˄s3)

V(S|O) = P(o1˄s2)+P(o2˄s1)+P(o3˄s2)

V(S)=max π(s), V(S|O) = ∑ max C(o|s) × π(s) = ∑ max P(o ˄ s) s o s o s

Lx(C,π) = V(S|O) / V(S), L+(C,π) = V(S|O) - V(S)

A B U

a 7/40 3/40 1/12

b 3/20 7/20 1/6

1/3 × 21/40 × 1 = 7/40

1/3 × [ 3/7 ] × 1 = 1/7

Page 16: Computing the Leakage of Information-Hiding Systems Miguel E. Andrés Catuscia Palamidessi Radboud University, The Netherlands INRIA and LIX, France Peter

16ReSeCo - December 17th 2009 FaMAF, Córdoba - Argentina

Miguel E. AndrésRadboud University

OverviewOverview

Motivation Information-hiding systems as automata Reachability analysis approach Iterative approach

Regular expressions techniques SCC analysis technique Identifying high-leakage sources

Information-hiding systems with variable a priori

Interactive information-hiding systems Future work

Page 17: Computing the Leakage of Information-Hiding Systems Miguel E. Andrés Catuscia Palamidessi Radboud University, The Netherlands INRIA and LIX, France Peter

17ReSeCo - December 17th 2009 FaMAF, Córdoba - Argentina

Miguel E. AndrésRadboud University

Information-Hiding Systems with variable a prioriInformation-Hiding Systems with variable a priori

IHS with variable a priori

Lemma (The channel matrix is independet of π) For all π,ρ ∈ D(S) we have: Pπ(o | s)=Pρ(o | s), for all secrets s and observable o

Maximum leakage Computation

Multiplcative Leakage: easy taking π uniform distribution Additive Leakage: More difficult, we have to consider all corner points

distribution Lemma: Computing maximum additive leakage is NP-complete

I = (M , As , Ao , Aτ) where M =(Q , A , δ) is a non-deterministic automaton As, Ao, and Aτ are disjoint sets of secret, observable, and internal actions δ satisfies:

Non-determinism can occur only at the beginning Secret actions can occur only at the beginning Only internal actions can occur in cycles

MLx(C) = max Lx(C,π) and ML+(C) = max L+(C,π) π ∈ D(S) π ∈ D(S)

Page 18: Computing the Leakage of Information-Hiding Systems Miguel E. Andrés Catuscia Palamidessi Radboud University, The Netherlands INRIA and LIX, France Peter

18ReSeCo - December 17th 2009 FaMAF, Córdoba - Argentina

Miguel E. AndrésRadboud University

OverviewOverview

Motivation Information-hiding systems as automata Reachability analysis approach Iterative approach

Regular expressions techniques SCC analysis technique Identifying high-leakage sources

Information-hiding systems with variable a priori

Interactive information-hiding systems Future work

Page 19: Computing the Leakage of Information-Hiding Systems Miguel E. Andrés Catuscia Palamidessi Radboud University, The Netherlands INRIA and LIX, France Peter

19ReSeCo - December 17th 2009 FaMAF, Córdoba - Argentina

Miguel E. AndrésRadboud University

Idea: Secrets and observables can alternate Interactive IHS

Example (eBay Protocol)

As={poor, rich} Ao={cheap, expensive, sell, cancel} Aτ ={}

Interactive Information-Hiding SystemsInteractive Information-Hiding Systems

I = (M , As , Ao , Aτ) where M =(Q , A , δ) is a probabilistic automaton As, Ao, and Aτ are disjoint sets of secret, observable, and internal actions δ satisfies:

Transitions are either secret or observable (not both) Only internal actions can occur in cycles

M

Page 20: Computing the Leakage of Information-Hiding Systems Miguel E. Andrés Catuscia Palamidessi Radboud University, The Netherlands INRIA and LIX, France Peter

20ReSeCo - December 17th 2009 FaMAF, Córdoba - Argentina

Miguel E. AndrésRadboud University

Interactive Information-Hiding SystemsInteractive Information-Hiding Systems

Observation: The channel matrix depends on the distribution over secrets Why?

Consequence: We cannot model Interactive protocols as noisy channels. However we can still compute leakage Recall Then we compute

o1 o2

s1 a a

s2 b b

P(o1|s1)= p = a p+q

P(o1|s2)= p = b p+q

Channel Matrix

Notation: p = 1 - p Depends on p and q !!!

cheap

sell

cheap

cancel

expensive

sell

expensive

Cancel

poor 8/25 2/25 1/25 2/75

rich 1/5 1/15 19/75 1/75

V(S)=max π(s), V(S|O) = ∑ max C(o|s) × π(s) = ∑ max P(o ˄ s) s o s o s

A priori distribution Matrix of Joint Probabilities

π(poor)=P(poor)= 7/15π(rich) =P(rich) = 8/15

Page 21: Computing the Leakage of Information-Hiding Systems Miguel E. Andrés Catuscia Palamidessi Radboud University, The Netherlands INRIA and LIX, France Peter

21ReSeCo - December 17th 2009 FaMAF, Córdoba - Argentina

Miguel E. AndrésRadboud University

OverviewOverview

Motivation Information-hiding systems as automata Reachability analysis approach Iterative approach

Regular expressions techniques SCC analysis technique Identifying high-leakage sources

Information-hiding systems with variable a priori

Interactive information-hiding systems Future work

Page 22: Computing the Leakage of Information-Hiding Systems Miguel E. Andrés Catuscia Palamidessi Radboud University, The Netherlands INRIA and LIX, France Peter

22ReSeCo - December 17th 2009 FaMAF, Córdoba - Argentina

Miguel E. AndrésRadboud University

Future workFuture work

Use tools from counterexamples generation to compute/approximate leakage of large scale protocols

Try to identify flaws in protocols Extend the notion of noisy channel to capture

the dynamic nature of interactive protocolsLift channel inputs from secrets to schedulers on

secretsUse channels with history and/or feedback

Page 23: Computing the Leakage of Information-Hiding Systems Miguel E. Andrés Catuscia Palamidessi Radboud University, The Netherlands INRIA and LIX, France Peter

23ReSeCo - December 17th 2009 FaMAF, Córdoba - Argentina

Miguel E. AndrésRadboud University

QuestionsQuestions

Thanks for your attention!

Questions