{"title":"An Approach for Constructing Indistinguishable Information Systems","authors":"M. Styugin, N. Parotkin, V. Zolotarev","doi":"10.1109/ITMQIS.2018.8525012","DOIUrl":null,"url":null,"abstract":"Complex system contains more potential vulnerabilities. This article proposes the term \"indistinguishable information system\", which is a system that does not disclose any significant information about the algorithm of its functioning or objective function through side channels of information leakage by an iterative interaction. It improves security by making the system indistinguishable and hampering the exploring process. The research methodology consists of modeling indistinguishable characteristics depending of the system location in relation to the observer. The paper proposes a formal statement of the problem of protection against exploring, which is expressed in obtaining indistinguishable information systems through the objective function and side information leakage channels. It was proven that indistinguishable obfuscation makes it possible to obtain indistinguishability through side channels of data leakage. A method of making systems indistinguishable via the objective function was also proposed. The method feasibility was proven using the examples of remote code injection attacks.","PeriodicalId":133622,"journal":{"name":"2018 IEEE International Conference \"Quality Management, Transport and Information Security, Information Technologies\" (IT&QM&IS)","volume":"24 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2018-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"1","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2018 IEEE International Conference \"Quality Management, Transport and Information Security, Information Technologies\" (IT&QM&IS)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ITMQIS.2018.8525012","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 1
Abstract
Complex system contains more potential vulnerabilities. This article proposes the term "indistinguishable information system", which is a system that does not disclose any significant information about the algorithm of its functioning or objective function through side channels of information leakage by an iterative interaction. It improves security by making the system indistinguishable and hampering the exploring process. The research methodology consists of modeling indistinguishable characteristics depending of the system location in relation to the observer. The paper proposes a formal statement of the problem of protection against exploring, which is expressed in obtaining indistinguishable information systems through the objective function and side information leakage channels. It was proven that indistinguishable obfuscation makes it possible to obtain indistinguishability through side channels of data leakage. A method of making systems indistinguishable via the objective function was also proposed. The method feasibility was proven using the examples of remote code injection attacks.