Skip to main content

From Operational Models to Information Theory; Side Channels in pGCL with Isabelle

  • Conference paper
Interactive Theorem Proving (ITP 2014)

Part of the book series: Lecture Notes in Computer Science ((LNTCS,volume 8558))

Included in the following conference series:

  • 934 Accesses

Abstract

In this paper, we formally derive the probabilistic security predicate (expectation) for a guessing attack against a system with side-channel leakage, modelled in pGCL. Our principal theoretical contribution is to link the process-oriented view, where attacker and system execute particular model programs, and the information-theoretic view, where the attacker solves an optimal-decoding problem, viewing the system as a noisy channel. Our practical contribution is to illustrate the selection of probabilistic loop invariants to verify such security properties, and the demonstration of a mechanical proof linking traditionally distinct domains.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  • Alvim, M.S., Chatzikokolakis, K., Palamidessi, C., Smith, G.: Measuring information leakage using generalized gain functions. In: 25th CSF, pp. 265–279. IEEE (2012), doi:10.1109/CSF.2012.26

    Google Scholar 

  • Cock, D.: Verifying probabilistic correctness in Isabelle with pGCL. In: 7th SSV, Sydney, Australia, pp. 1–10 (November 2012), doi:10.4204/EPTCS.102.15

    Google Scholar 

  • Cock, D.: Practical probability: Applying pGCL to lattice scheduling. In: Blazy, S., Paulin-Mohring, C., Pichardie, D. (eds.) ITP 2013. LNCS, vol. 7998, pp. 311–327. Springer, Heidelberg (2013)

    Chapter  Google Scholar 

  • Cock, D.: Leakage in Trustworthy Systems. PhD thesis, School Comp. Sci. & Engin., Sydney, Australia (2014)

    Google Scholar 

  • Dijkstra, E.W.: Guarded commands, nondeterminacy and formal derivation of programs. CACM 18(8), 453–457 (1975), doi:10.1145/360933.360975, ISSN 0001-0782

    Google Scholar 

  • Espinoza, B., Smith, G.: Min-entropy as a resource. Inform. & Comput. 226, 57–75 (2013), doi:10.1016/j.ic.2013.03.005, ISSN 0890-5401.

    Google Scholar 

  • Klein, G., Elphinstone, K., Heiser, G., Andronick, J., Cock, D., Derrin, P., Elkaduwe, D., Engelhardt, K., Kolanski, R., Norrish, M., Sewell, T., Tuch, H., Winwood, S.: seL4: Formal verification of an OS kernel. In: SOSP, Big Sky, MT, USA, pp. 207–220. ACM (October 2009), doi:10.1145/1629575.1629596

    Google Scholar 

  • McIver, A., Morgan, C.: Abstraction, Refinement and Proof for Probabilistic Systems. Springer (2004), doi:10.1007/b138392, ISBN 978-0-387-40115-7

    Google Scholar 

  • McIver, A., Meinicke, L., Morgan, C.: Compositional closure for bayes risk in probabilistic noninterference. In: Abramsky, S., Gavoille, C., Kirchner, C., Meyer auf der Heide, F., Spirakis, P.G. (eds.) ICALP 2010. LNCS, vol. 6199, pp. 223–235. Springer, Heidelberg (2010)

    Chapter  Google Scholar 

  • Morgan, C.: The shadow knows: Refinement of ignorance in sequential programs. In: Uustalu, T. (ed.) MPC 2006. LNCS, vol. 4014, pp. 359–378. Springer, Heidelberg (2006)

    Chapter  Google Scholar 

  • Shannon, C.E.: A mathematical theory of communication. In: The Bell Syst. Techn. J. (1948), doi:10.1145/584091.584093, Reprinted in SIGMOBILE Mobile Computing and Communications Review 5(1), 3–55 (2001)

    Google Scholar 

  • Smith, G.: On the foundations of quantitative information flow. In: de Alfaro, L. (ed.) FOSSACS 2009. LNCS, vol. 5504, pp. 288–302. Springer, Heidelberg (2009)

    Chapter  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2014 Springer International Publishing Switzerland

About this paper

Cite this paper

Cock, D. (2014). From Operational Models to Information Theory; Side Channels in pGCL with Isabelle. In: Klein, G., Gamboa, R. (eds) Interactive Theorem Proving. ITP 2014. Lecture Notes in Computer Science, vol 8558. Springer, Cham. https://doi.org/10.1007/978-3-319-08970-6_12

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-08970-6_12

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-08969-0

  • Online ISBN: 978-3-319-08970-6

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics