|
|
Relating Maxwell's demon and quantitative analysis of information leakage for practical imperative programs |
Kushal Anjaria, Arun Mishra |
Department of Computer Science & Engineering, DIAT, Pune 411025, India |
|
|
Abstract Shannon observed the relation between information entropy and Maxwell demon experiment to come up with information entropy formula. After that, Shannon's entropy formula is widely used to measure information leakage in imperative programs. But in the present work, our aim is to go in a reverse direction and try to find possible Maxwell's demon experimental setup for contemporary practical imperative programs in which variations of Shannon's entropy formula has been applied to measure the information leakage. To establish the relation between the second principle of thermodynamics and quantitative analysis of information leakage, present work models contemporary variations of imperative programs in terms of Maxwell's demon experimental setup. In the present work five contemporary variations of imperative program related to information quantification are identified. They are:(i) information leakage in imperative program, (ii) imperative multithreaded program, (iii) point to point leakage in the imperative program, (iv) imperative program with infinite observation, and (v) imperative program in the SOA-based environment. For these variations, minimal work required by an attacker to gain the secret is also calculated using historical Maxwell's demon experiment. To model the experimental setup of Maxwell's demon, non-interference security policy is used. In the present work, imperative programs with one-bit secret information have been considered to avoid the complexity. The findings of the present work from the history of physics can be utilized in many areas related to information flow of physical computing, nano-computing, quantum computing, biological computing, energy dissipation in computing, and computing power analysis.
|
Received: 28 April 2017
Revised: 20 July 2017
Accepted manuscript online:
|
PACS:
|
05.70.-a
|
(Thermodynamics)
|
|
05.70.Ce
|
(Thermodynamic functions and equations of state)
|
|
07.05.Bx
|
(Computer systems: hardware, operating systems, computer languages, and utilities)
|
|
Corresponding Authors:
Kushal Anjaria
E-mail: kushal.anjaria@gmail.com
|
Cite this article:
Kushal Anjaria, Arun Mishra Relating Maxwell's demon and quantitative analysis of information leakage for practical imperative programs 2017 Chin. Phys. B 26 100507
|
[1] |
Maruyama K, Nori F and Vedral V 2009 Rev. Mod. Phys. 81 1
|
[2] |
Lutz E and Ciliberto S 2015 Physics Today 68 (9)
|
[3] |
Boudol G and Castellani I 2002 Theor. Comput. Sci. 281 109
|
[4] |
Denning D E 1976 Commun. ACM 19 236
|
[5] |
Gray Ⅲ J W 1992 J. Comput. Secur. 1 255
|
[6] |
McLean J 1990 IEEE Proceedings in Computer Society Symposium on Research in Security and Privacy, pp. 180-187
|
[7] |
Clark D, Hunt S and Malacaria P 2007 J. Comput. Secur. 15 321
|
[8] |
Clark D, Hunt S and Malacaria P 2002 Electronic Notes in Theoretical Computer Science 59 238
|
[9] |
Chen H and Malacaria P 2007 in ACM Proceedings of the 2007 Workshop on Programming Languages and Analysis forSsecurity pp. 31——40
|
[10] |
Ngo T M and Huisman M 2013 arXiv preprint arXiv:1306.2693
|
[11] |
Boreale M 2009 Information and Computation 207 699
|
[12] |
Chothia T, Kawamoto Y, Novakovic C and Parker D 2013 in IEEE 26th Computer Security Foundations Symposium, pp. 193-205
|
[13] |
Biondi F, Legay A, Nielsen B F, Malacaria P and Wasowski A 2014 in IARCS Annual Conference on Foundations of Software Technology and Theoretical Computer Science
|
[14] |
Kaur D and Kaur P 2016 Procedia Computer Science 78 298
|
[15] |
Bennett C H 1973 in Maxwell's Demon, Entropy, Information, Computing, pp. 197-204
|
[16] |
McLean J, Millen N J and Gligor V 2001 in Proceedings of the IEEE Workshop on Computer Security Foundations pp. 237——238
|
[17] |
Landauer R 1961 IBM J. Res. Develop. (International Business Machines) 5 183 doi:10.1147/rd.53.0183
|
[18] |
Malacaria P and Smeraldi F 2013 Information and Computation 226 76
|
[19] |
Szilard L 1964 Behavioral Science 9 301
|
[20] |
Toyabe S, Sagawa T, Ueda M, Muneyuki E and Sano M 2010 Nat. Phys. 6 988
|
[21] |
Ladyman J, Presnell S and Short A J 2008 Studies in History and Philosophy of Science Part B:Studies in History and Philosophy of Modern Physics 39 315
|
[22] |
Koski J V, Maisi V F, Pekola J P and Averin D V 2014 Proc. Nat. Acad. Sci. 111 13786
|
[23] |
Bennett C H 1982 Int. J. Theor. Phys. 21 905
|
[24] |
Erl T 2005 Service-oriented architecture:concepts, technology, and design Pearson Education India
|
[25] |
Yamany H F E, Capretz M A and Allison D S 2009 In IEEE Congress on Services-I pp. 653-660
|
[26] |
Anjaria K and Mishra A 2017"Quantitative analysis of information leakage in service oriented architecture based web services", Kybernetes, 46 (3)
|
[27] |
Clausius R 1879 The mechanical theory of heat, Macmillan
|
[28] |
Lef H S and Rex A F 2003 Maxwell's Demon 2:Entropy, Classical and Quantum Information. Computing (Bristol and Philadelphia:Institute of Physics Publishing)
|
[29] |
Bérut A, Arakelyan A, Petrosyan A, Ciliberto S, Dillenschneider R and Lutz E 2012 Nature 483 187
|
[30] |
Penrose O 2005 Foundations of statistical mechanics:a deductive treatment, Courier Corporation
|
[31] |
Landauer R 1961 IBM J. Res. Develop. 5 148
|
[32] |
Parrondo J M, Horowitz J M and Sagawa T 2015 Nat. Phys. 11 131
|
[33] |
Timler J and Lent C S 2003 J. Appl. Phys. 94 1050
|
[34] |
Mandal D and Jarzynski C 2012 Proc. Nat. Acad. Sci. 109 11641
|
[35] |
Malacaria P and Smeraldi F 2012 IEEE 25th Computer Security Foundations Symposium, pp. 280-290
|
No Suggested Reading articles found! |
|
|
Viewed |
|
|
|
Full text
|
|
|
|
|
Abstract
|
|
|
|
|
Cited |
|
|
|
|
Altmetric
|
blogs
Facebook pages
Wikipedia page
Google+ users
|
Online attention
Altmetric calculates a score based on the online attention an article receives. Each coloured thread in the circle represents a different type of online attention. The number in the centre is the Altmetric score. Social media and mainstream news media are the main sources that calculate the score. Reference managers such as Mendeley are also tracked but do not contribute to the score. Older articles often score higher because they have had more time to get noticed. To account for this, Altmetric has included the context data for other articles of a similar age.
View more on Altmetrics
|
|
|