A Methodology for Information Flow Experiments

@article{Tschantz2015AMF,
  title={A Methodology for Information Flow Experiments},
  author={Michael Carl Tschantz and Amit Datta and Anupam Datta and Jeannette M. Wing},
  journal={2015 IEEE 28th Computer Security Foundations Symposium},
  year={2015},
  pages={554-568}
}
  • Michael Carl Tschantz, Amit Datta, +1 author Jeannette M. Wing
  • Published 2015
  • Computer Science
  • 2015 IEEE 28th Computer Security Foundations Symposium
  • Information flow analysis has largely focused on methods that require access to the program in question or total control over an analyzed system. [...] Key Method Leveraging this connection, we provide a systematic black-box methodology based on experimental science and statistical analysis. Our systematic study leads to practical advice for detecting web data usage, a previously normalized area. We illustrate these concepts with a series of experiments collecting data on the use of information by websites.Expand Abstract

    Citations

    Publications citing this paper.
    SHOWING 1-10 OF 31 CITATIONS

    Methods of Corporate Surveillance: a Primer on Experimental Transparency Research

    VIEW 1 EXCERPT
    CITES BACKGROUND

    FILTER CITATIONS BY YEAR

    2014
    2020

    CITATION STATISTICS

    • 4 Highly Influenced Citations

    References

    Publications referenced by this paper.
    SHOWING 1-10 OF 87 REFERENCES

    Security models and information flow

    • John McLean
    • Computer Science
    • Proceedings. 1990 IEEE Computer Society Symposium on Research in Security and Privacy
    • 1990
    VIEW 1 EXCERPT

    Language-based information-flow security

    VIEW 2 EXCERPTS

    RIFLE: An Architectural Framework for User-Centric Information-Flow Security

    VIEW 1 EXCERPT