Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Mário S. Alvim is active.

Publication


Featured researches published by Mário S. Alvim.


ieee computer security foundations symposium | 2012

Measuring Information Leakage Using Generalized Gain Functions

Mário S. Alvim; Konstantinos Chatzikokolakis; Catuscia Palamidessi; Geoffrey Smith

This paper introduces g-leakage, a rich generalization of the min-entropy model of quantitative information flow. In g-leakage, the benefit that an adversary derives from a certain guess about a secret is specified using a gain function g. Gain functions allow a wide variety of operational scenarios to be modeled, including those where the adversary benefits from guessing a value close to the secret, guessing a part of the secret, guessing a property of the secret, or guessing the secret within some number of tries. We prove important properties of g-leakage, including bounds between min-capacity, g-capacity, and Shannon capacity. We also show a deep connection between a strong leakage ordering on two channels, C1 and C2, and the possibility of factoring C1 into C2C3, for some C3. Based on this connection, we propose a generalization of the Lattice of Information from deterministic to probabilistic channels.


ieee computer security foundations symposium | 2014

Additive and Multiplicative Notions of Leakage, and Their Capacities

Mário S. Alvim; Konstantinos Chatzikokolakis; Annabelle McIver; Carroll Morgan; Catuscia Palamidessi; Geoffrey Smith

Protecting sensitive information from improper disclosure is a fundamental security goal. It is complicated, and difficult to achieve, often because of unavoidable or even unpredictable operating conditions that can lead to breaches in planned security defences. An attractive approach is to frame the goal as a quantitative problem, and then to design methods that measure system vulnerabilities in terms of the amount of information they leak. A consequence is that the precise operating conditions, and assumptions about prior knowledge, can play a crucial role in assessing the severity of any measured vunerability. We develop this theme by concentrating on vulnerability measures that are robust in the sense of allowing general leakage bounds to be placed on a program, bounds that apply whatever its operating conditions and whatever the prior knowledge might be. In particular we propose a theory of channel capacity, generalising the Shannon capacity of information theory, that can apply both to additive- and to multiplicative forms of a recently-proposed measure known as g-leakage. Further, we explore the computational aspects of calculating these (new) capacities: one of these scenarios can be solved efficiently by expressing it as a Kantorovich distance, but another turns out to be NP-complete. We also find capacity bounds for arbitrary correlations with data not directly accessed by the channel, as in the scenario of Daleniuss Desideratum.


formal aspects in security and trust | 2011

Differential privacy: on the trade-off between utility and information leakage

Mário S. Alvim; Miguel E. Andrés; Konstantinos Chatzikokolakis; Pierpaolo Degano; Catuscia Palamidessi

Differential privacy is a notion of privacy that has become very popular in the database community. Roughly, the idea is that a randomized query mechanism provides sufficient privacy protection if the ratio between the probabilities that two adjacent datasets give the same answer is bound by ee. In the field of information flow there is a similar concern for controlling information leakage, i.e. limiting the possibility of inferring the secret information from the observables. In recent years, researchers have proposed to quantify the leakage in terms of min-entropy leakage, a concept strictly related to the Bayes risk. In this paper, we show how to model the query system in terms of an information-theoretic channel, and we compare the notion of differential privacy with that of min-entropy leakage. We show that differential privacy implies a bound on the min-entropy leakage, but not vice-versa. Furthermore, we show that our bound is tight. Then, we consider the utility of the randomization mechanism, which represents how close the randomized answers are to the real ones, in average. We show that the notion of differential privacy implies a bound on utility, also tight, and we propose a method that under certain conditions builds an optimal randomization mechanism, i.e. a mechanism which provides the best utility while guaranteeing e-differential privacy.


ieee symposium on security and privacy | 2014

Quantifying Information Flow for Dynamic Secrets

Piotr Mardziel; Mário S. Alvim; Michael Hicks; Michael R. Clarkson

A metric is proposed for quantifying leakage of information about secrets and about how secrets change over time. The metric is used with a model of information flow for probabilistic, interactive systems with adaptive adversaries. The model and metric are implemented in a probabilistic programming language and used to analyze several examples. The analysis demonstrates that adaptivity increases information flow.


logic in computer science | 2010

Probabilistic Information Flow

Mário S. Alvim; Miguel E. Andrés; Catuscia Palamidessi

In recent years, there has been a growing interest in considering the probabilistic aspects of Information Flow. In this abstract we review some of the main approaches that have been considered to quantify the notion of information leakage, and we focus on some recent developments.


international conference on concurrency theory | 2010

Information flow in interactive systems

Mário S. Alvim; Miguel E. Andrés; Catuscia Palamidessi

We consider the problem of defining the information leakage in interactive systems where secrets and observables can alternate during the computation. We show that the information-theoretic approach which interprets such systems as (simple) noisy channels is not valid anymore. However, the principle can be recovered if we consider more complicated types of channels, that in Information Theory are known as channels with memory and feedback. We show that there is a complete correspondence between interactive systems and such kind of channels. Furthermore, we show that the capacity of the channels associated to such systems is a continuous function of the Kantorovich metric.


Foundations of security analysis and design VI | 2011

Quantitative information flow and applications to differential privacy

Mário S. Alvim; Miguel E. Andrés; Konstantinos Chatzikokolakis; Catuscia Palamidessi

Secure information flow is the problem of ensuring that the information made publicly available by a computational system does not leak information that should be kept secret. Since it is practically impossible to avoid leakage entirely, in recent years there has been a growing interest in considering the quantitative aspects of information flow, in order to measure and compare the amount of leakage. Information theory is widely regarded as a natural framework to provide firm foundations to quantitive information flow. In this notes we review the two main information-theoretic approaches that have been investigated: the one based on Shannon entropy, and the one based on Renyi min-entropy. Furthermore, we discuss some applications in the area of privacy. In particular, we consider statistical databases and the recently-proposed notion of differential privacy. Using the information-theoretic view, we discuss the bound that differential privacy induces on leakage, and the trade-off between utility and privacy.


ieee computer security foundations symposium | 2016

Axioms for Information Leakage

Mário S. Alvim; Konstantinos Chatzikokolakis; Annabelle McIver; Carroll Morgan; Catuscia Palamidessi; Geoffrey Smith

Quantitative information flow aims to assess and control the leakage of sensitive information by computer systems. A key insight in this area is that no single leakage measure is appropriate in all operational scenarios, as a result, many leakage measures have been proposed, with many different properties. To clarify this complex situation, this paper studies information leakage axiomatically, showing important dependencies among different axioms. It also establishes a completeness result about the g-leakage family, showing that any leakage measure satisfying certain intuitively-reasonable properties can be expressed as a g-leakage.


ifip international conference on theoretical computer science | 2010

Safe Equivalences for Security Properties

Mário S. Alvim; Miguel E. Andrés; Catuscia Palamidessi; Peter van Rossum

In the field of Security, process equivalences have been used to characterize various information-hiding properties (for instance secrecy, anonymity and non-interference) based on the principle that a protocol P with a variable x satisfies such property if and only if, for every pair of secrets s 1 and s 2, \(P[^{s_1}/ _x]\) is equivalent to \(P[^{s_2}/ _x]\). We argue that, in the presence of nondeterminism, the above principle relies on the assumption that the scheduler “works for the benefit of the protocol”, and this is usually not a safe assumption. Non-safe equivalences, in this sense, include complete-trace equivalence and bisimulation. We present a formalism in which we can specify admissible schedulers and, correspondingly, safe versions of these equivalences. We prove that safe bisimulation is still a congruence. Finally, we show that safe equivalences can be used to establish information-hiding properties.


principles of security and trust | 2014

When Not All Bits Are Equal: Worth-Based Information Flow

Mário S. Alvim; Andre Scedrov; Fred B. Schneider

Only recently have approaches to quantitative information flow started to challenge the presumption that all leaks involving a given number of bits are equally harmful. This paper proposes a framework to capture the semantics of information, making quantification of leakage independent of the syntactic representation of secrets. Secrets are defined in terms of fields, which are combined to form structures; and a worth assignment is introduced to associate each structure with a worth (perhaps in proportion to the harm that would result from disclosure). We show how worth assignments can capture inter-dependence among structures within a secret, modeling: (i) secret sharing, (ii) information-theoretic predictors, and (iii) computational (as opposed to information-theoretic) guarantees for security. Using non-trivial worth assignments, we generalize Shannon entropy, guessing entropy, and probability of guessing. For

Collaboration


Dive into the Mário S. Alvim's collaboration.

Top Co-Authors

Avatar
Top Co-Authors

Avatar

Konstantinos Chatzikokolakis

National and Kapodistrian University of Athens

View shared research outputs
Top Co-Authors

Avatar

Miguel E. Andrés

Radboud University Nijmegen

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Geoffrey Smith

Florida International University

View shared research outputs
Top Co-Authors

Avatar

Miguel E. Andrés

Radboud University Nijmegen

View shared research outputs
Top Co-Authors

Avatar

Yusuke Kawamoto

National Institute of Advanced Industrial Science and Technology

View shared research outputs
Top Co-Authors

Avatar

Konstantinos Chatzikokolakis

National and Kapodistrian University of Athens

View shared research outputs
Top Co-Authors

Avatar
Researchain Logo
Decentralizing Knowledge