

{"id":4,"date":"2011-12-08T11:55:34","date_gmt":"2011-12-08T11:55:34","guid":{"rendered":"http:\/\/project.inria.fr\/template1\/?page_id=4"},"modified":"2014-09-17T17:45:27","modified_gmt":"2014-09-17T15:45:27","slug":"home","status":"publish","type":"page","link":"https:\/\/project.inria.fr\/quail\/","title":{"rendered":"About"},"content":{"rendered":"<p>QUAIL is a tool to evaluate the security of systems through\u00a0a quantitative analysis of information leakage. It takes as\u00a0an input a program written in a simple imperative language with randomized primitives. It builds a Markovian model of\u00a0the program and analyzes the information leakage in the model.<\/p>\n<p>The tool consists in a preprocessor, an analyzer and a simulator.\u00a0The preprocessor compiles a program written in the QUAIL imperative\u00a0language into a lower level language.<\/p>\n<p>The analyzer performs an exhaustive depth-first search of all\u00a0program traces, and for each one computes the probability of\u00a0the trace and the posterior entropy of the secret induced<br \/>\nby the trace. This values are used to compute the expected value of the posterior entropy of the secret over all traces, and consequently the information leakage as the difference of the prior and posterior entropy of the secret.<br \/>\nTo give a meaningful result, the analyzer must explore all\u00a0execution traces of the system.<\/p>\n<p>The simulator performs a similar analysis but chooses the traces\u00a0to analyze randomly. While this means that many traces will be analyzed\u00a0more than once, it also allows to draw conclusions on the expected posterior entropy of the secret in case not all traces are explored,\u00a0allowing QUAIL to approximate the information leakage of programs\u00a0whose trace space is too large to be completely explored.<\/p>\n<p><a name=\"people\"><\/a><\/p>\n<h1><span style=\"color: #e33729;\">People<\/span><\/h1>\n<p>QUAIL is the result of a collaboration between <a href=\"http:\/\/www.inria.fr\/centre\/rennes\">INRIA<\/a> Rennes and <a href=\"http:\/\/www.itu.dk\">IT University<\/a> in Copenhagen. The people currently working on the tool are:<\/p>\n<ul>\n<li><a href=\"http:\/\/www.itu.dk\/people\/fbio\/\">Fabrizio Biondi<\/a> is a postdoc researcher at INRIA Rennes, lead developer of the project.<\/li>\n<li><a href=\"http:\/\/people.irisa.fr\/Axel.Legay\/\">Axel Legay<\/a> is a researcher at INRIA Rennes and supervisor of the project.<\/li>\n<li><a href=\"http:\/\/people.rennes.inria.fr\/Louis-Marie.Traonouez\">Louis-Marie Traonouez<\/a> is a postdoc researcher at INRIA Rennes and developer on the project.<\/li>\n<li><a href=\"http:\/\/www.itu.dk\/~wasowski\/\">Andrzej W\u0105sowski<\/a> is a professor at IT University and supervisor of the project.<\/li>\n<\/ul>\n<p><\/p>","protected":false},"excerpt":{"rendered":"<p>QUAIL is a tool to evaluate the security of systems through\u00a0a quantitative analysis of information leakage. It takes as\u00a0an input a program written in a simple imperative language with randomized primitives. It builds a Markovian model of\u00a0the program and analyzes the information leakage in the model. The tool consists in a preprocessor, an analyzer and &hellip; <\/p>\n<p><a class=\"more-link btn\" href=\"https:\/\/project.inria.fr\/quail\/\">Continue reading<\/a><\/p>\n","protected":false},"author":1,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"open","template":"","meta":{"footnotes":""},"class_list":["post-4","page","type-page","status-publish","hentry","nodate","item-wrap"],"_links":{"self":[{"href":"https:\/\/project.inria.fr\/quail\/wp-json\/wp\/v2\/pages\/4","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/project.inria.fr\/quail\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/project.inria.fr\/quail\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/project.inria.fr\/quail\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/project.inria.fr\/quail\/wp-json\/wp\/v2\/comments?post=4"}],"version-history":[{"count":26,"href":"https:\/\/project.inria.fr\/quail\/wp-json\/wp\/v2\/pages\/4\/revisions"}],"predecessor-version":[{"id":416,"href":"https:\/\/project.inria.fr\/quail\/wp-json\/wp\/v2\/pages\/4\/revisions\/416"}],"wp:attachment":[{"href":"https:\/\/project.inria.fr\/quail\/wp-json\/wp\/v2\/media?parent=4"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}