skip to main content
10.1145/2482513.2485731acmconferencesArticle/Chapter ViewAbstractPublication Pagesih-n-mmsecConference Proceedingsconference-collections
invited-talk

Bayesian inference to evaluate information leakage in complex scenarios

Published: 17 June 2013 Publication History

Abstract

Common security evaluation methods require the estimation of the likelihood of a hidden state given an observation of the system. For instance: identifying the type of tampering on an image given the tampered file, identifying communication partner given an anonymous channel trace, identifying the location from where a service has been accessed given an obfuscated version of this location. In this talk we explore the suitability of Bayesian Inference techniques, specifically Markov Chain Monte Carlo methods, to evaluate information leakage in complex scenarios.
Using anonymity systems, in particular mix networks, as case study we show that casting problems in the context of Bayesian inference provides an appropriate framework to evaluate security properties (e.g., traceability of messages) in complex constraints.
We present a generative probabilistic model of mix network architectures that incorporates a number of attack techniques in the trace analysis literature. We use the model to build a Markov Chain Monte Carlo inference engine based on the Metropolis-Hastings algorithm that calculates the probabilities of who is talking to whom given an observation of network traces. Finally, we briefly overview other Bayesian techniques, such as Gibbs sampling and particle filtering, that are useful to tackle other security problems, like user profiling, or to consider dynamic behaviour.

Recommendations

Comments

Information & Contributors

Information

Published In

cover image ACM Conferences
IH&MMSec '13: Proceedings of the first ACM workshop on Information hiding and multimedia security
June 2013
242 pages
ISBN:9781450320818
DOI:10.1145/2482513
Permission to make digital or hard copies of part or all of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for third-party components of this work must be honored. For all other uses, contact the Owner/Author.

Sponsors

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 17 June 2013

Check for updates

Author Tags

  1. bayesian inference
  2. information leakage
  3. monte carlo

Qualifiers

  • Invited-talk

Conference

IH&MMSec '13
Sponsor:

Acceptance Rates

IH&MMSec '13 Paper Acceptance Rate 27 of 74 submissions, 36%;
Overall Acceptance Rate 128 of 318 submissions, 40%

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • 0
    Total Citations
  • 164
    Total Downloads
  • Downloads (Last 12 months)1
  • Downloads (Last 6 weeks)0
Reflects downloads up to 08 Mar 2025

Other Metrics

Citations

View Options

Login options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Figures

Tables

Media

Share

Share

Share this Publication link

Share on social media