PROBABILISTIC COMPUTATION FOR INFORMATION SECURITY Piotr (Peter) Mardziel (UMD) Kasturi Raghavan (UCLA)

Slides:



Advertisements
Similar presentations
Polylogarithmic Private Approximations and Efficient Matching
Advertisements

Bayes rule, priors and maximum a posteriori
Intelligent Tutoring System based on Belief networks Maomi Ueno Nagaoka University of Technology.
Controlled Functional Encryption Muhammad Naveed, Shashank Agrawal, Manoj Prabhakaran, Xiaofeng Wang, Erman Ayday, Jean-Pierre Hubaux, Carl A. Gunter.
State Estimation and Kalman Filtering CS B659 Spring 2013 Kris Hauser.
The Role of History and Prediction in Data Privacy Kristen LeFevre University of Michigan May 13, 2009.
Finding bugs: Analysis Techniques & Tools Comparison of Program Analysis Techniques CS161 Computer Security Cho, Chia Yuan.
1 Information complexity and exact communication bounds April 26, 2013 Mark Braverman Princeton University Based on joint work with Ankit Garg, Denis Pankratov,
NON-MALLEABLE EXTRACTORS AND SYMMETRIC KEY CRYPTOGRAPHY FROM WEAK SECRETS Yevgeniy Dodis and Daniel Wichs (NYU) STOC 2009.
Identity Management Based on P3P Authors: Oliver Berthold and Marit Kohntopp P3P = Platform for Privacy Preferences Project.
Bug Isolation via Remote Program Sampling Ben Liblit, Alex Aiken, Alice X.Zheng, Michael I.Jordan Presented by: Xia Cheng.
DYNAMIC ENFORCEMENT OF KNOWLEDGE-BASED SECURITY POLICIES Piotr (Peter) Mardziel, Stephen Magill, Michael Hicks, and Mudhakar Srivatsa.
What Are Partially Observable Markov Decision Processes and Why Might You Care? Bob Wall CS 536.
CSE 331 SOFTWARE DESIGN & IMPLEMENTATION TESTING II Autumn 2011.
CSE 221: Probabilistic Analysis of Computer Systems Topics covered: Statistical inference (Sec. )
CSE 221: Probabilistic Analysis of Computer Systems Topics covered: Statistical inference.
Frank McSherry Researcher Microsoft Research, Silicon Valley.
QM Spring 2002 Business Statistics Sampling Concepts.
Elisa Bertino Dept. of Computer Science University of Milano Page 1 Author-X Secure and selective access and flexible distribution mechanisms for XML documents.
Bayesian Filtering for Location Estimation D. Fox, J. Hightower, L. Liao, D. Schulz, and G. Borriello Presented by: Honggang Zhang.
Computer vision: models, learning and inference Chapter 6 Learning and Inference in Vision.
Chang Liu, Michael Hicks, Elaine Shi The University of Maryland, College Park.
Tell the robot exactly how to draw a square on the board.
Genetic Programming on Program Traces as an Inference Engine for Probabilistic Languages Vita Batishcheva, Alexey Potapov
Quantifying Location Privacy Reza Shokri George Theodorakopoulos Jean-Yves Le Boudec Jean-Pierre Hubaux May 2011.
DYNAMIC ENFORCEMENT OF KNOWLEDGE-BASED SECURITY POLICIES Michael Hicks University of Maryland, College Park Joint work with Piotr Mardziel, Stephen Magill,
Privacy Preserving Data Mining on Moving Object Trajectories Győző Gidófalvi Geomatic ApS Center for Geoinformatik Xuegang Harry Huang Torben Bach Pedersen.
Secure sharing in distributed information management applications: problems and directions Piotr Mardziel, Adam Bender, Michael Hicks, Dave Levin, Mudhakar.
Identity-Based Secure Distributed Data Storage Schemes.
Reasoning about Information Leakage and Adversarial Inference Matt Fredrikson 1.
1 Robot Environment Interaction Environment perception provides information about the environment’s state, and it tends to increase the robot’s knowledge.
Annual Conference of ITA ACITA 2010 Secure Sharing in Distributed Information Management Applications: Problems and Directions Piotr Mardziel, Adam Bender,
Ebrahim Tarameshloo, Philip W.L.Fong, Payman Mohassel University of Calgary Calgary, Alberta, Canada {etarames, pwlfong, On Protection.
International Technology Alliance in Network & Information Sciences Knowledge Inference for Securing and Optimizing Secure Computation Piotr (Peter) Mardziel,
Securing Class Initialization in Java-like Languages.
Presented by: Suparita Parakarn Kinzang Wangdi Research Report Presentation Computer Network Security.
C++ Programming Homework 11 Speaker: Ching-Chen Chang Date: 2008/05/02.
Facilities for Secure Communication The Internet is insecure The Internet is a shared collection of networks. Unfortunately, that makes it insecure An.
PROBABILISTIC PROGRAMMING FOR SECURITY Michael Hicks Piotr (Peter) Mardziel University of Maryland, College Park Stephen Magill Galois Michael Hicks UMD.
Estimating Component Availability by Dempster-Shafer Belief Networks Estimating Component Availability by Dempster-Shafer Belief Networks Lan Guo Lane.
- 1 - Bayesian inference of binomial problem Estimating a probability from binomial data –Objective is to estimate unknown proportion (or probability of.
General Purpose Packages Revision. Why GPPs? Information –Accurate –complete –up-to-date Share information.
Computing & Information Sciences Kansas State University Data Sciences Summer Institute Multimodal Information Access and Synthesis Learning and Reasoning.
CS 4100 Artificial Intelligence Prof. C. Hafner Class Notes Jan 17, 2012.
Abstract We offer a formal treatment of choice behaviour based on the premise that agents minimise the expected free energy of future outcomes. Crucially,
©2011 1www.id-book.com Data Gathering Chapter 7. ©2011 Data Gathering What is data gathering? –The act of gathering data through a study The data can.
Organisations and Data Management 1 Data Collection: Why organisations & individuals acquire data & supply data via websites 2Techniques used by organisations.
Information Leaks Without Memory Disclosures: Remote Side Channel Attacks on Diversified Code Jeff Seibert, Hamed Okhravi, and Eric Söderström Presented.
Human and Optimal Exploration and Exploitation in Bandit Problems Department of Cognitive Sciences, University of California. A Bayesian analysis of human.
1/14/ :59 PM1/14/ :59 PM1/14/ :59 PM Research overview Koen Victor, 12/2007.
Towards Robustness in Query Auditing Shubha U. Nabar Stanford University VLDB 2006 Joint Work With B. Marthi, K. Kenthapadi, N. Mishra, R. Motwani.
Semantic Web in Context Broker Architecture Presented by Harry Chen, Tim Finin, Anupan Joshi At PerCom ‘04 Summarized by Sungchan Park
Belief in Information Flow Michael Clarkson, Andrew Myers, Fred B. Schneider Cornell University 18 th IEEE Computer Security Foundations Workshop June.
Does Privacy Require True Randomness? Yevgeniy Dodis New York University Joint work with Carl Bosley.
KNOWLEDGE-ORIENTED MULTIPARTY COMPUTATION Piotr (Peter) Mardziel, Michael Hicks, Jonathan Katz, Mudhakar Srivatsa (IBM TJ Watson)
From NARS to a Thinking Machine Pei Wang Temple University.
DECISION TREE INDUCTION CLASSIFICATION AND PREDICTION What is classification? what is prediction? Issues for classification and prediction. What is decision.
Knowledge Representation Lecture 2 out of 5. Last Week Intelligence needs knowledge We need to represent this knowledge in a way a computer can process.
Computer vision: models, learning and inference
DEEP LEARNING BOOK CHAPTER to CHAPTER 6
563.10: Bloom Cookies Web Search Personalization without User Tracking
Probabilistic Reasoning Over Time
Reinforcement Learning with Partially Known World Dynamics
Knowledge Inference for Optimizing Secure Multi-party Computation
Missing Data Imputation in the Bayesian Framework
Stakeholders Unit 1Business Skills for e-commerce
Observation Use of one or more of the senses to gather information
CS 594: Empirical Methods in HCC Introduction to Bayesian Analysis
National Interest & Foreign Policy
Dr. Arslan Ornek MATHEMATICAL MODELS
Presentation transcript:

PROBABILISTIC COMPUTATION FOR INFORMATION SECURITY Piotr (Peter) Mardziel (UMD) Kasturi Raghavan (UCLA)

Convenience 2 ~params prior ~params | [ model(~params) == sample ] posterior B 1 ~secret Bob’s belief about secret params B 1 ~secret | [ sys(B 1 ~secret) == sys(secret) ] = B 2 ~secret Bob’s revised belief secret Alice’s secret ~sample = model(~params) B 1 ~visible = sys(B 1 ~secret)

Photography Convenience 3 B 1 ~secret Bob’s belief about secret B 1 ~secret | [ sys(B 1 ~secret) == special-offer(secret) ] = B 2 ~secret Bob’s revised belief secret = (age, gender, engaged?) Alice’s secret B 1 ~visible = special-offer(B 1 ~secret) special-offer(age, gender, engaged?) = return (24 <= age <= 30 and gender == ‘female and engaged?) B 2 ~visible = fun 1 (B 1 ~secret) B 2 ~secret | [ sys(B 2 ~secret) == fun 2 (secret) ] = B 3 ~secret

Photography Protection 4 B 1 ~secret B 2 ~secret secret = (age, gender, engaged?) Alice’s secret special-offer (secret) Assumptions

Obfuscation/Noising 5 special-offer(secret) special-offer’(secret) special-offer’(age, gender, engaged?) = return (24 <= age <= 30 and gender == ‘female and engaged?) or Bernoulli(0.1) N(special-offer(O(secret))) … ? ?

Information flow Information flow / Non-interference: Does information flow? B 2 ~secret =? B 1 ~secret Quantified information flow: How much information flows? H(B 2 ~secret) – H(B 1 ~secret) 6 Yes?No? 0 ∞ B 1 ~secret B 2 ~secretB 3 ~secret Entropy / Min-entropy / Guessing entropy / etc..

“Semantic” information flow Information flow / Non-interference: Does information flow? Quantified information flow: How much information flows? Knowledge tracking / “semantic” information flow What information flows? 7 distributions over secret. B 1 ~secret. B 2 ~secret. B 3 ~secret entropy min-entropy guessing entropy … …

“Semantic” information flow 8 distributions over secret. B 1 ~secret. B 2 ~secret. B 3 ~secret entropy min-entropy guessing entropy … … Which quantity is appropriate? H(B 2 ~s) H ∞ (B 2 ~s) G(B 2 ~s) KL(A~s || B 2 ~s) s = (age, gender, engaged?)

More convenience Alice wants to hide her political preference. (not an aspect of the secret) Take function pol-pref: secret  { } that predicts political preference from demographics (age, gender, engaged?) 9 distributions over secret. B 1 ~secret. B 2 ~secret. B 3 ~secret entropy min-entropy guessing entropy … …

“Blacklist” function 10 distributions over secret. B 1 ~secret. B 3 ~secret distributions over party. B 1 ~party. B 2 ~party. B 3 ~party. B 2 ~secret B i ~party = pol-ref(B i ~secret) ambiguous privacy implication

Limiting knowledge 11 Alice can use knowledge tracking to enforce limits to knowledge. distributions over secret. B 1 ~secret. B 2 ~secret. B 3 ~secret. B 4 ~secret Policy(~secret)  {true,false}

Assumptions 12 Alice knows what Bob believes about her secret initially. Alice can perform the probabilistic interpretation and conditioning “accurately enough”. distributions over secret. B 1 ~secret. B 3 ~secret. B 4 ~secret. B 2 ~secret. B’ 4 ~secret Policy(~secret)  {true,false}

Assumptions 13 Alice knows what Bob believes about her secret initially. Alice can perform the probabilistic interpretation and conditioning “accurately enough”. distributions over secret. B 1 ~secret. B 3 ~secret. B 4 ~secret. B 2 ~secret. B’ 4 ~secret Soundness: Policy(B i ~secret) == false  Policy(B’ i ~secret) == false Policy(~secret)  {true,false}

An approach 14 distributions over secret. B 3 ~secret. B 2 ~secret. B 1 ~secret Abstract representation of sets of distributions. Abstract probabilistic semantics and conditioning, over-approximating the exact semantics and conditioning. Policy: sound check for min-entropy bounds. B 4 ~secret Piotr Mardziel, Stephen Magill, Michael Hicks, Mudhakar Srivasta. Dynamic enforcement of knowledge-based security policies using abstract interpretation.

Probabilistic computation for information security Convenient reasoning about information security. “Semantic” information flow: more flexible than quantified information flow Enforcement mechanisms require soundness to guarantee security conditions.

Probabilistic computation for information security Convenient reasoning about information security. “Semantic” information flow: more flexible than quantified information flow Enforcement mechanisms require soundness to guarantee security conditions. How to take advantage of ML-inspired probabilistic programming techniques for information security? More efficient inference? Search problems: find “optimal” noising/obfuscation parameters. B 1 ~secret. B 2 ~secret. B 3 ~secret. B 4 ~secret

Go back. 17