A Methodology for Information Flow Experiments

作者: Michael Carl Tschantz , Amit Datta , Anupam Datta , Jeannette M. Wing

DOI: 10.1109/CSF.2015.40

关键词:

摘要: Information flow analysis has largely focused on methods that require access to the program in question or total control over an analyzed system. We consider case where analyst neither nor a white-box model of formalize such limited information analyses and study instance it: detecting usage data by websites. reduce these problems ones causal inference proving connection between non-interference causation. Leveraging this connection, we provide systematic black-box methodology based experimental science statistical analysis. Our leads practical advice for web usage, previously normalized area. illustrate concepts with series experiments collecting use

参考文章(64)
Gurvan Le Guernic, Information flow testing: the third path towards confidentiality guarantee ASIAN'07 Proceedings of the 12th Asian computing science conference on Advances in computer science: computer and network security. pp. 33- 47 ,(2007)
R. Sekar, An Efficient Black-box Technique for Defeating Web Application Attacks. network and distributed system security symposium. ,(2009)
Bilal Zaka, Hermann A. Maurer, Frank Kappe, Plagiarism - A Survey Journal of Universal Computer Science. ,vol. 12, pp. 1050- 1084 ,(2006)
Andrew S. Zieffler, Jeffrey R. Harring, Jeffrey D. Long, Comparing Groups: Randomization and Bootstrap Methods Using R ,(2011)
Rick H. Hoyle, Handbook of structural equation modeling Guilford Press. ,(2012)
Gurvan Le Guernic, Information Flow Testing Annual Asian Computing Science Conference. ,vol. 4846, pp. 33- 47 ,(2007) , 10.1007/978-3-540-76929-3_4
Ronald Fisher, The Design of Experiments ,(1935)
Brian M. Bowen, Shlomo Hershkop, Angelos D. Keromytis, Salvatore J. Stolfo, Baiting Inside Attackers Using Decoy Documents international conference on security and privacy in communication systems. ,vol. 19, pp. 51- 70 ,(2008) , 10.1007/978-3-642-05284-2_4