goback the thermodynamic of interference cow19 ucl may
play

GoBack The Thermodynamic of Interference COW19, UCL May 2012 - PowerPoint PPT Presentation

GoBack The Thermodynamic of Interference COW19, UCL May 2012 Pasquale Malacaria Queen Mary University of London pm@eecs.qmul.ac.uk Pasquale Malacaria Thermodynamic of Interference - slide #1 A surprising connection non-interference =


  1. GoBack

  2. The Thermodynamic of Interference COW19, UCL May 2012 Pasquale Malacaria Queen Mary University of London pm@eecs.qmul.ac.uk Pasquale Malacaria Thermodynamic of Interference - slide #1

  3. A surprising connection non-interference = perfect confidentiality ● title1 ● A surprising connection ● The problem and security model: ● Quantitative analysis of confidentiality : ● Quantitative analysis of ■ What has a property (confidentiality) of a human artefact confidentiality : ● Quantitative analysis of (software) in common with the fundamental laws of the confidentiality ● Quantitative analysis of physical world? confidentiality ● The Thermodynamics of Confidentiality ● The Thermodynamics of Confidentiality ● The Thermodynamics of Confidentiality ● The Thermodynamics of Confidentiality ● The Thermodynamics of Confidentiality ● The Thermodynamics of Computation ● The Thermodynamics of Confidentiality ● The Thermodynamics of Confidentiality ● A clarification about power analysis: ● Alternative measures of knowledge: ● The Thermodynamics of guessability ● Conclusions Pasquale Malacaria Thermodynamic of Interference - slide #2

  4. A surprising connection non-interference = perfect confidentiality ● title1 ● A surprising connection ● The problem and security model: ● Quantitative analysis of confidentiality : ● Quantitative analysis of ■ What has a property (confidentiality) of a human artefact confidentiality : ● Quantitative analysis of (software) in common with the fundamental laws of the confidentiality ● Quantitative analysis of physical world? confidentiality ● The Thermodynamics of ■ Abstract of this talk: Confidentiality ● The Thermodynamics of Confidentiality ● The Thermodynamics of Confidentiality ● The Thermodynamics of Confidentiality ● The Thermodynamics of Confidentiality ● The Thermodynamics of Computation ● The Thermodynamics of Confidentiality ● The Thermodynamics of Confidentiality ● A clarification about power analysis: ● Alternative measures of knowledge: ● The Thermodynamics of guessability ● Conclusions Pasquale Malacaria Thermodynamic of Interference - slide #2

  5. A surprising connection non-interference = perfect confidentiality ● title1 ● A surprising connection ● The problem and security model: ● Quantitative analysis of confidentiality : ● Quantitative analysis of ■ What has a property (confidentiality) of a human artefact confidentiality : ● Quantitative analysis of (software) in common with the fundamental laws of the confidentiality ● Quantitative analysis of physical world? confidentiality ● The Thermodynamics of ■ Abstract of this talk: Confidentiality ● The Thermodynamics of Confidentiality ■ thermodynamics foundations of confidentiality ● The Thermodynamics of Confidentiality ● The Thermodynamics of Confidentiality ● The Thermodynamics of Confidentiality ● The Thermodynamics of Computation ● The Thermodynamics of Confidentiality ● The Thermodynamics of Confidentiality ● A clarification about power analysis: ● Alternative measures of knowledge: ● The Thermodynamics of guessability ● Conclusions Pasquale Malacaria Thermodynamic of Interference - slide #2

  6. A surprising connection non-interference = perfect confidentiality ● title1 ● A surprising connection ● The problem and security model: ● Quantitative analysis of confidentiality : ● Quantitative analysis of ■ What has a property (confidentiality) of a human artefact confidentiality : ● Quantitative analysis of (software) in common with the fundamental laws of the confidentiality ● Quantitative analysis of physical world? confidentiality ● The Thermodynamics of ■ Abstract of this talk: Confidentiality ● The Thermodynamics of Confidentiality ■ thermodynamics foundations of confidentiality ● The Thermodynamics of Confidentiality ■ Aim of this talk: ● The Thermodynamics of Confidentiality ● The Thermodynamics of Confidentiality ● The Thermodynamics of Computation ● The Thermodynamics of Confidentiality ● The Thermodynamics of Confidentiality ● A clarification about power analysis: ● Alternative measures of knowledge: ● The Thermodynamics of guessability ● Conclusions Pasquale Malacaria Thermodynamic of Interference - slide #2

  7. A surprising connection non-interference = perfect confidentiality ● title1 ● A surprising connection ● The problem and security model: ● Quantitative analysis of confidentiality : ● Quantitative analysis of ■ What has a property (confidentiality) of a human artefact confidentiality : ● Quantitative analysis of (software) in common with the fundamental laws of the confidentiality ● Quantitative analysis of physical world? confidentiality ● The Thermodynamics of ■ Abstract of this talk: Confidentiality ● The Thermodynamics of Confidentiality ■ thermodynamics foundations of confidentiality ● The Thermodynamics of Confidentiality ■ Aim of this talk: ● The Thermodynamics of Confidentiality ● The Thermodynamics of ■ hopefully to be thought provoking (apologies, not an Confidentiality ● The Thermodynamics of engineering talk). Computation ● The Thermodynamics of Confidentiality ● The Thermodynamics of Confidentiality ● A clarification about power analysis: ● Alternative measures of knowledge: ● The Thermodynamics of guessability ● Conclusions Pasquale Malacaria Thermodynamic of Interference - slide #2

  8. The problem and security model: ■ An attacker has some a priori knowledge of the secret which ● title1 ● A surprising connection is improved by observing the system ● The problem and security model: ● Quantitative analysis of confidentiality : ● Quantitative analysis of confidentiality : ● Quantitative analysis of confidentiality ● Quantitative analysis of confidentiality ● The Thermodynamics of Confidentiality ● The Thermodynamics of Confidentiality ● The Thermodynamics of Confidentiality ● The Thermodynamics of Confidentiality ● The Thermodynamics of Confidentiality ● The Thermodynamics of Computation ● The Thermodynamics of Confidentiality ● The Thermodynamics of Confidentiality ● A clarification about power analysis: ● Alternative measures of knowledge: ● The Thermodynamics of guessability ● Conclusions Pasquale Malacaria Thermodynamic of Interference - slide #3

  9. The problem and security model: ■ An attacker has some a priori knowledge of the secret which ● title1 ● A surprising connection is improved by observing the system ● The problem and security model: ● Quantitative analysis of ■ measure this improvement: how much did the attacker gain confidentiality : ● Quantitative analysis of from the observations? confidentiality : ● Quantitative analysis of confidentiality ● Quantitative analysis of confidentiality ● The Thermodynamics of Confidentiality ● The Thermodynamics of Confidentiality ● The Thermodynamics of Confidentiality ● The Thermodynamics of Confidentiality ● The Thermodynamics of Confidentiality ● The Thermodynamics of Computation ● The Thermodynamics of Confidentiality ● The Thermodynamics of Confidentiality ● A clarification about power analysis: ● Alternative measures of knowledge: ● The Thermodynamics of guessability ● Conclusions Pasquale Malacaria Thermodynamic of Interference - slide #3

  10. The problem and security model: ■ An attacker has some a priori knowledge of the secret which ● title1 ● A surprising connection is improved by observing the system ● The problem and security model: ● Quantitative analysis of ■ measure this improvement: how much did the attacker gain confidentiality : ● Quantitative analysis of from the observations? confidentiality : ● Quantitative analysis of ◆ Example: confidentiality ● Quantitative analysis of ■ an attacker steal your cash card; he has no idea about confidentiality ● The Thermodynamics of your pin (apriori probability to guess it 0.0001) Confidentiality ● The Thermodynamics of ■ to randomly try a pin number at a cash machine will Confidentiality ● The Thermodynamics of generate two possible observations: Confidentiality ● The Thermodynamics of Confidentiality ● The Thermodynamics of Confidentiality ● The Thermodynamics of Computation ● The Thermodynamics of Confidentiality ● The Thermodynamics of Confidentiality ● A clarification about power analysis: ● Alternative measures of knowledge: ● The Thermodynamics of guessability ● Conclusions Pasquale Malacaria Thermodynamic of Interference - slide #3

Download Presentation
Download Policy: The content available on the website is offered to you 'AS IS' for your personal information and use only. It cannot be commercialized, licensed, or distributed on other websites without prior consent from the author. To download a presentation, simply click this link. If you encounter any difficulties during the download process, it's possible that the publisher has removed the file from their server.

Recommend


More recommend