Hostname: page-component-77f85d65b8-grvzd Total loading time: 0 Render date: 2026-04-20T20:15:59.761Z Has data issue: false hasContentIssue false

Hidden-Markov program algebra with iteration

Published online by Cambridge University Press:  10 November 2014

ANNABELLE MCIVER
Affiliation:
Dept Comp Sci, Macquarie University, NSW, Australia Email: annabelle.mciver@mq.edu.au
LARISSA MEINICKE
Affiliation:
Dept Comp Sci, Univ Queensland, Qld, Australia Email: l.meinicke@uq.edu.au
CARROLL MORGAN
Affiliation:
School Comp Sci and Eng, Univ NSW, NSW, Australia Email: carrollm@cse.unsw.edu.au

Abstract

We use hidden Markov models to motivate a quantitative compositional semantics for noninterference-based security with iteration, including a refinement- or ‘implements’ relation that compares two programs with respect to their information leakage; and we propose a program algebra for source-level reasoning about such programs, in particular as a means of establishing that an ‘implementation’ program leaks no more than its ‘specification’ program.

This joins two themes: we extend our earlier work, having iteration but only qualitative (Morgan 2009), by making it quantitative; and we extend our earlier quantitative work (McIver et al. 2010) by including iteration.

We advocate stepwise refinement and source-level program algebra – both as conceptual reasoning tools and as targets for automated assistance. A selection of algebraic laws is given to support this view in the case of quantitative noninterference; and it is demonstrated on a simple iterated password-guessing attack.

Information

Type
Special Issue: Quantitative Information Flow
Copyright
Copyright © Cambridge University Press 2014 

Access options

Get access to the full version of this content by using one of the access options below. (Log in options will check for institutional or personal access. Content may require purchase if you do not have access.)

Article purchase

Temporarily unavailable