Award Abstract # 0831114
CT-ISG: New Foundations for Quantitative Information Flow

NSF Org: CNS
Division Of Computer and Network Systems
Recipient: FLORIDA INTERNATIONAL UNIVERSITY
Initial Amendment Date: August 25, 2008
Latest Amendment Date: August 25, 2008
Award Number: 0831114
Award Instrument: Standard Grant
Program Manager: Nina Amla
namla@nsf.gov
 (703)292-7991
CNS
 Division Of Computer and Network Systems
CSE
 Direct For Computer & Info Scie & Enginr
Start Date: September 1, 2008
End Date: August 31, 2012 (Estimated)
Total Intended Award Amount: $335,852.00
Total Awarded Amount to Date: $335,852.00
Funds Obligated to Date: FY 2008 = $335,852.00
History of Investigator:
  • Geoffrey Smith (Principal Investigator)
    smithg@cis.fiu.edu
Recipient Sponsored Research Office: Florida International University
11200 SW 8TH ST
MIAMI
FL  US  33199-2516
(305)348-2494
Sponsor Congressional District: 26
Primary Place of Performance: Florida International University
11200 SW 8TH ST
MIAMI
FL  US  33199-2516
Primary Place of Performance
Congressional District:
26
Unique Entity Identifier (UEI): Q3KCVK5S9CP1
Parent UEI: Q3KCVK5S9CP1
NSF Program(s): CYBER TRUST
Primary Program Source: 01000809DB NSF RESEARCH & RELATED ACTIVIT
Program Reference Code(s): 9218, HPCC
Program Element Code(s): 737100
Award Agency Code: 4900
Fund Agency Code: 4900
Assistance Listing Number(s): 47.070

ABSTRACT

Protecting the confidentiality and integrity of sensitive information is central to trustworthy computing. This project focuses on one aspect of the problem, namely, the difficulty of developing software that satisfies critical information flow properties. The approach of secure information flow analysis is to do a static analysis, usually in the form of a type system, on a program prior to executing it, with the goal of proving that it does not leak any information from its high inputs to its low outputs; this is formalized as a property called noninterference. But noninterference is widely recognized to be too restrictive in practice -- often we need to have low output that depends on high input. In implementations, such deliberate leaks of information can be allowed through an explicit declassify construct, which functions like a type cast to circumvent the typing rules. But declassification, while expedient, throws into question what is then ensured by the analysis.

One promising disciplined approach to relaxing noninterference is to develop a quantitative theory of information flow that lets us talk about "how much" information is leaked. Such quantitative theories are being studied in a variety of contexts, including secure information flow, anonymity protocols, and side-channel analysis, and there is an emerging consensus to base such theories on the concepts of Shannon entropy and mutual information. But a useful theory of quantitative information flow must provide appropriate security guarantees: if the theory says that an attack leaks x bits of secret information, then x should be useful in calculating bounds on the resulting threat. Unfortunately, it can be argued that the standard theories actually fail to provide such guarantees, because a random variable can have arbitrarily large Shannon entropy even if it is highly vulnerable to being guessed.

This project will therefore explore an alternative foundation for quantitative information flow based on a concept of vulnerability (closely related to Bayes risk) and which measures uncertainty using Renyi?s min-entropy, rather than Shannon entropy. The goal is to develop the new foundation both theoretically and practically. The main technical challenge will be to develop type-based static analyses that can be used to guarantee that programs satisfy desired quantitative information flow policies. More broadly, this project aims to help to enable the disciplined development of software with guaranteed information flow properties, and to educate students about programming for secure information flow.

PUBLICATIONS PRODUCED AS A RESULT OF THIS RESEARCH

Note:  When clicking on a Digital Object Identifier (DOI) number, you will be taken to an external site maintained by the publisher. Some full text articles may not yet be available without a charge during the embargo (administrative interval).

Some links on this page may take you to non-federal websites. Their policies may differ from this site.

Geoffrey Smith and Rafael Alpizar "Nontermination and Secure Information Flow" Mathematical Structures in Computer Science , v.21 , 2011 , p.1183

Please report errors in award information by writing to: awardsearch@nsf.gov.

Print this page

Back to Top of page