Measuring the speed of information leakage in mobile processes

Benjamin Aziz*

*Corresponding author for this work

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Abstract

This paper presents a syntax-directed non-uniform static analysis of the stochastic π-calculus to safely approximate the amount of time required before name substitutions occur in a process. Name substitutions form the basis for defining security properties, like information leakage. The presence of the quantitative and qualitative information in the results of the analysis allows us to reason about the speed at which sensitive information is leaked in a computing environment with malicious mobile code. We demonstrate the applicability of the analysis through a simple example of firewall breaches.

Original languageEnglish
Title of host publicationAlgebraic Methodology and Software Technology - 11th International Conference, AMAST 2006
PublisherSpringer Verlag
Pages36-50
Number of pages15
ISBN (Print)3540356339, 9783540356332
DOIs
Publication statusPublished - 1 Jan 2006
Event11th International Conference on Algebraic Methodology and Software Technology - Kuressaare, Estonia
Duration: 5 Jul 20068 Jul 2006

Publication series

NameLecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
Volume4019 LNCS
ISSN (Print)0302-9743
ISSN (Electronic)1611-3349

Conference

Conference11th International Conference on Algebraic Methodology and Software Technology
Abbreviated titleAMAST 2006
Country/TerritoryEstonia
CityKuressaare
Period5/07/068/07/06

Fingerprint

Dive into the research topics of 'Measuring the speed of information leakage in mobile processes'. Together they form a unique fingerprint.

Cite this