• Search Research Projects
  • Search Researchers
  • How to Use
  1. Back to previous page

Formal models for quantitative analysis of software security

Research Project

Project/Area Number 26540025
Research Category

Grant-in-Aid for Challenging Exploratory Research

Allocation TypeMulti-year Fund
Research Field Software
Research InstitutionNagoya University

Principal Investigator

Seki Hiroyuki  名古屋大学, 情報学研究科, 教授 (80196948)

Co-Investigator(Renkei-kenkyūsha) HASHIMOTO KENJI  名古屋大学, 大学院情報学研究科, 助教 (90548447)
Project Period (FY) 2014-04-01 – 2018-03-31
Project Status Completed (Fiscal Year 2017)
Budget Amount *help
¥3,640,000 (Direct Cost: ¥2,800,000、Indirect Cost: ¥840,000)
Fiscal Year 2016: ¥1,040,000 (Direct Cost: ¥800,000、Indirect Cost: ¥240,000)
Fiscal Year 2015: ¥1,300,000 (Direct Cost: ¥1,000,000、Indirect Cost: ¥300,000)
Fiscal Year 2014: ¥1,300,000 (Direct Cost: ¥1,000,000、Indirect Cost: ¥300,000)
Keywordsセキュリティ / 量的情報流 / k-安全性 / XMLデータベース / 時間攻撃 / 差分プライバシー / SMT / SAT / プライバシー / データベース / 隠れマルコフモデル / タイミング攻撃 / 情報理論
Outline of Final Research Achievements

A few quantitative notions for security and privacy of software such as quantitative information flow (QIF) and differential privacy have been proposed. In this research, we developed methods that analyze given programs or systems based on such notions. Specifically, we proposed an approximation algorithm that computes leakage by timing attack against an RSA decoder, a verification algorithm of k-secrecy of XML databases. Furthermore, as a theoretical basis for QIF analysis of programs that dynamically generate strings, we propose algorithms that counts, for a given recognizable or algebraic series S and a natural number d, the summation of the coefficients (or weights) of words of length d in S efficiently. The proposed methods were shown to be effective either by computer simulation or by experiments based on the implemented tools.

Report

(5 results)
  • 2017 Annual Research Report   Final Research Report ( PDF )
  • 2016 Research-status Report
  • 2015 Research-status Report
  • 2014 Research-status Report
  • Research Products

    (11 results)

All 2018 2017 2016 2015 2014

All Journal Article (1 results) (of which Peer Reviewed: 1 results) Presentation (10 results) (of which Invited: 1 results)

  • [Journal Article] Counting Algorithms for Recognizable and Algebraic Series2018

    • Author(s)
      Trung CHU Bao, Kenji Hashimoto and Hiroyuki Seki
    • Journal Title

      IEICE Transactions on Information and Systems

      Volume: E101.D Issue: 6 Pages: 1479-1490

    • DOI

      10.1587/transinf.2017FOP0003

    • NAID

      130007382455

    • ISSN
      0916-8532, 1745-1361
    • Year and Date
      2018-06-01
    • Related Report
      2017 Annual Research Report
    • Peer Reviewed
  • [Presentation] モデル計数を用いた量的情報流解析のための論理式簡約と静的解析2017

    • Author(s)
      中島聖斗,橋本健二,酒井正彦,関浩之
    • Organizer
      電子情報通信学会ソフトウェアサイエンス研究会(講演番号:SS2016-61)
    • Place of Presentation
      那覇市,てんぷす那覇
    • Year and Date
      2017-03-09
    • Related Report
      2016 Research-status Report
  • [Presentation] Counting for Recognizable and Algebraic Series2017

    • Author(s)
      Hiroyuki Seki, Kenji Hashimoto and Trug Chu Bao
    • Organizer
      情報処理学会第113回プログラミング研究会
    • Place of Presentation
      東京都,東京大学
    • Year and Date
      2017-03-03
    • Related Report
      2016 Research-status Report
  • [Presentation] #SMTツールを用いた量的情報流解析手法の高速化2016

    • Author(s)
      中島聖斗,Trung Chu Bao, 橋本健二,酒井正彦,関浩之
    • Organizer
      電子情報通信学会ソフトウェアサイエンス研究会(講演番号:SS2016-26)
    • Place of Presentation
      彦根市,彦根勤労福祉会館
    • Year and Date
      2016-10-27
    • Related Report
      2016 Research-status Report
  • [Presentation] モデル計数を用いたXMLデータベースのk-安全性検査システムの高速化2016

    • Author(s)
      浅井孝俊,橋本健二,関浩之
    • Organizer
      電子情報通信学会ソフトウェアサイエンス研究会
    • Place of Presentation
      金沢市
    • Year and Date
      2016-01-25
    • Related Report
      2015 Research-status Report
  • [Presentation] モデル計数を用いたXMLデータベースのk-安全性検査2015

    • Author(s)
      浅井孝俊,上杉正紀,橋本健二,関浩之
    • Organizer
      電子情報通信学会ソフトウェアサイエンス研究会
    • Place of Presentation
      熊本市
    • Year and Date
      2015-05-12
    • Related Report
      2015 Research-status Report
  • [Presentation] RSA暗号の高速化手法に対するタイミング攻撃の情報理論的安全性評価2015

    • Author(s)
      小林靖幸,楫勇一,関浩之,伊藤実
    • Organizer
      2015年暗号と情報セキュリティシンポジウム, 4F1-2
    • Place of Presentation
      福岡県
    • Year and Date
      2015-01-23
    • Related Report
      2014 Research-status Report
  • [Presentation] セキュリティやプライバシーの定量的尺度について2014

    • Author(s)
      関浩之
    • Organizer
      電子情報通信学会情報理論研究会, IT2014-52, 114(353), 13-18
    • Place of Presentation
      富山県
    • Year and Date
      2014-12-09
    • Related Report
      2014 Research-status Report
    • Invited
  • [Presentation] Information Theoretical Evaluation of the Bucketing Technique to Mitigate Timing Attacks2014

    • Author(s)
      Yasuyuki Kobayashi, Yuichi Kaji, Hiroyuki Seki
    • Organizer
      International Symposium on Information Theory and Its Applications, 574-578
    • Place of Presentation
      Melbourne, Australia
    • Year and Date
      2014-10-09
    • Related Report
      2014 Research-status Report
  • [Presentation] Quantitative evaluation of the key information that is learned through timing attack – The contribution of bucketing technique for RSA cryptosystem -2014

    • Author(s)
      Yasuyuki Kobayashi, Yuichi Kaji, Hiroyuki Seki and Minoru Ito
    • Organizer
      電子情報通信学会情報セキュリティ研究会, ISEC2014-35, 114(115), 253-258
    • Place of Presentation
      北海道
    • Year and Date
      2014-07-04
    • Related Report
      2014 Research-status Report
  • [Presentation] Towards HMM parameter estimation with differential privacy2014

    • Author(s)
      Nut Sornchumni, Kenji Hashimoto and Hiroyuki Seki
    • Organizer
      情報処理学会第98回数理モデル化と問題解決研究会, 2014-MPS-98(25)
    • Place of Presentation
      沖縄県
    • Year and Date
      2014-06-27
    • Related Report
      2014 Research-status Report

URL: 

Published: 2014-04-04   Modified: 2019-03-29  

Information User Guide FAQ News Terms of Use Attribution of KAKENHI

Powered by NII kakenhi