Conventional approaches to either information flow security or intrusion detection are not suited to detecting Trojans that steal information such as credit card numbers using adVanced cryptovirological and inference channel techniques. We propose a technique based on repeated deterministic replays in a virtual machine to detect the theft of private information. We prove upper bounds on the average amount of information an attacker can steal without being detected, even if they are allowed an arbitrary distribution of visible output states. Our intrusion detection approach is more practical than traditional approaches to information flow security. We show that it is possible to, for example, bound the average amount of information an attacker can steal from a 53-bit credit card number to less than a bit by sampling only 11 of the 253 possible outputs visible to the attacker, using a two-pronged approach of hypothesis testing and information theory. ©Springer-Verlag Berlin Heidelberg 2009.
CITATION STYLE
Crandall, J. R., Brevik, J., Ye, S., Wassermann, G., De Oliveira, D. A. S., Su, Z., … Chong, F. T. (2009). Putting trojans on the horns of a dilemma: Redundancy for information theft detection. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol. 5430 LNCS, pp. 244–262). https://doi.org/10.1007/978-3-642-01004-0_14
Mendeley helps you to discover research relevant for your work.