Piotr Mardziel, Mario S. Alvim, Michael Hicks, Michael R. Clarkson
Oakland 14 and Tech-Report Implementation and Experiments
-
Quantifying Information Flow for Dynamic Secrets
Initial paper. Implementation and experiments.
-
Tech Report: Quantifying Information Flow for Dynamic Secrets
Includes proofs and analysis of a memory-limited adversary.
-
Adversary Gain vs. Defender Loss in Quantified Information Flow
Introduces a distinction between defender's loss and the adversary's gain. Implementation and experiments.
There are two options for running the experiments.
-
On your own computer. This requires to install various prerequisites and has only been tested on Debian Linux, FreeBSD, and Mac OSX. See README.txt inside experiments.tar.gz for further instruction.
-
Inside a VirtualBox image, located at:
http://www.cs.umd.edu/~piotrm/virtualboxes/debian_oakland14_fcs14.tar.gz
Everything has been already set up in this image. Login as user/user and look in the ~/oakland14 folder for more information. The root password is toor if you need it. The optional gnuplot package for generating the graphs in the paper is not installed to keep the image smaller. You can easily install it:
sudo apt-get install gnuplot
Piotr Mardziel: piotrm@gmail.com, http://www.cs.umd.edu/~piotrm