Belief in Information Flow

Total Page:16

File Type:pdf, Size:1020Kb

Belief in Information Flow Belief in Information Flow Michael R. Clarkson Andrew C. Myers Fred B. Schneider Department of Computer Science Cornell University {clarkson,andru,fbs}@cs.cornell.edu Abstract include guards, which sit at the boundary between trusted and untrusted systems, and password checkers. Information leakage traditionally has been defined to oc- Defining the quantity of information flow is more diffi- cur when uncertainty about secret data is reduced. This cult than it might seem. Consider a password checker PWC uncertainty-based approach is inadequate for measuring that sets an authentication flag a after checking a stored information flow when an attacker is making assumptions password p against a (guessed) password g supplied by the about secret inputs and these assumptions might be incor- user. rect; such attacker beliefs are an unavoidable aspect of any satisfactory definition of leakage. To reason about informa- PWC : if p = g then a := 1 else a := 0 tion flow based on beliefs, a model is developed that de- scribes how attacker beliefs change due to the attacker’s For simplicity, suppose that the password is either A, B, observation of the execution of a probabilistic (or determin- or C. Suppose also that the user is actually an attacker at- istic) program. The model leads to a new metric for quanti- tempting to discover the password, and he believes the pass- tative information flow that measures accuracy rather than word is overwhelmingly likely to be A but has a minuscule uncertainty of beliefs. and equally likely chance to be either B or C. (This need not be an arbitrary assumption on the attacker’s part; per- haps the attacker was told by a usually reliable informant that the password is A.) If the attacker experiments by ex- 1. Introduction ecuting PWC and guessing A, he expects the outcome to be that a is equal to 1. Such a confirmation of the attacker’s Qualitative security properties, such as noninterference belief does seem to convey some small amount of informa- [10], typically either prohibit any flow of information from tion. But suppose that the informant was wrong: the real a high security level to a lower level, or they allow any password is C. The outcome of this experiment has a equal amount of flow so long as it passes through some release to 0, from which the attacker infers that A is not the pass- mechanism. For a program whose correctness requires flow word. Common sense dictates that his new belief is that B from high to low, the former property is too restrictive and and C each have a 50% chance of being the password. The the latter can lead to unbounded leakage of information. attacker’s belief has greatly changed—he is surprised to dis- Quantitative flow properties, such as “at most k bits leak cover the password is not A—so this outcome of his exper- per execution of the program”, allow information flows but iment seems to convey a larger amount of information than at restricted rates. Such properties are useful when analyz- the previous outcome. Thus, the information conveyed by ing programs whose nature requires that some—but not too executing PWC depends on what the attacker believes. much—information be leaked. Examples of these programs How much information flows from p to a in each of the above experiments? Answers to this question have tradition- This work was supported by the Department of the Navy, Office of Naval Research, ONR Grant N00014-01-1-0968; Air Force Office of Scientific ally been based on change in uncertainty [5, 20, 11, 1, 16, 2, Research, Air Force Materiel Command, USAF, grant number F49620-03- 17]: information flow is measured by the reduction in uncer- 1-0156; and National Science Foundation grants 0208642, 0133302, and tainty about secret data. Observe that, in the case where the 0430161. Michael Clarkson is supported by a National Science Founda- tion Graduate Research Fellowship; Andrew Myers is supported by an Al- password is C, the attacker initially is quite certain (though fred P. Sloan Research Fellowship. Opinions, findings, conclusions, or rec- wrong) about the value of the password and after the exper- ommendations contained in this material are those of the authors and do iment is rather uncertain about the value of the password; not necessarily reflect the views of these sponsors. The U.S. Government is authorized to reproduce and distribute reprints for Governmental pur- the change from “quite certain” to “rather uncertain” is an poses notwithstanding any copyright notation thereon. increase in uncertainty. So according to a reduction in un- Proceedings of the 18th IEEE Computer Security Foundations Workshop (CSFW’05) 1063-6900/05 $20.00 © 2005 IEEE certainty metric, no information flow occurred, which flatly guage semantics [21]. Henceforth, we write “distribution” contradicts our intuition. to mean “frequency distribution”. The problem with metrics based on uncertainty is The set of all program states is State, and the set of all twofold. First, they do not take accuracy into account. Ac- distributions is Dist. The structure of State is mostly unim- curacy and uncertainty are orthogonal properties of portant; it can be instantiated according to the needs of any the attacker’s belief—being certain does not make one particular language or system. For our examples, states map correct—and as the password checking example illus- variables to values, where Var and Val are both countable trates, the amount of information flow depends on accu- sets. ∈ racy rather than on uncertainty. Second, uncertainty-based v Var ∈ → metrics are concerned with some unspecified agent’s un- σ State Var Val + certainty rather than an attacker’s. The unspecified agent δ ∈ Dist State → R is able to observe a probability distribution over secret in- We write a state as a list of mappings; e.g. (g → A, a → 0) put values but cannot observe the particular secret in- is a state in which variable g has value A and a has value 0. put used in the program execution. If the attacker were The mass in a distribution δ is the sum of frequencies: the unspecified agent, there would be no reason in gen- eral to assume the probability distribution the attacker δ σ δ(σ) uses is correct. Because the attacker’s probability distri- bution is therefore subjective, it must be treated as a be- A probability distribution has mass 1, but a frequency distri- lief. Beliefs are thus an essential—though until now bution may have any non-negative mass. A point mass is a uninvestigated—component of information flow. probability distribution that maps a single state to 1. It is de- This paper presents a new way of measuring informa- noted by placing a dot over that single state: tion flow, based on these insights. Section 2 gives basic rep- σ˙ λσ . if σ = σ then 1 else 0 resentations and notations for beliefs and programs. Sec- tion 3 describes a model of the interaction between attack- 2.2. Programs ers and systems; it also describes how attackers update be- liefs by observing execution of programs. Section 4 defines Execution of program S is described by a denotational a new quantitative flow metric, based on information the- semantics in which the meaning [[ S]] of S is a function of ory, that characterizes the amount of information flow due type State → Dist. This semantics describes the frequency to changes in the accuracy of an attacker’s belief. The model of termination in a given state: if [[ S]] σ = δ, then the fre- and metric are formulated for use with any programming quency of S, when begun in σ, terminating in σ should language (or even any state machine) that can be given a de- be δ(σ). This semantics can be lifted to a function of type notational semantics compatible with the representation of Dist → Dist by the following definition: beliefs, and Section 5 illustrates with a particular program- ming language (while-programs plus probabilistic choice). [[ S]] δ σ δ(σ) · [[ S]] σ Section 6 discusses related work, and Section 7 concludes. Thus, the meaning of S over a distribution of inputs is completely determined by the meaning of S given a state 2. Incorporating beliefs as input. By defining programs in terms of how they oper- ate on distributions we permit analysis of probabilistic pro- A belief is a statement an agent makes about the state grams. Section 5 shows how to build such a semantics. of the world, accompanied by some measure of how cer- Our examples use while-programs extended with a prob- tain the agent is about the truthfulness of the statement. We abilistic choice construct. Let metavariables S, v, E,and begin by developing mathematical structures for represent- B range over programs, variables, arithmetic expressions, ing beliefs. and Boolean expressions, respectively. Evaluation of ex- pressions is assumed side-effect free, but we do not other- 2.1. Distributions wise prescribe their syntax or semantics. The syntax of the language is: A frequency distribution is a function δ that maps a pro- S ::= skip | v := E | S; S | if B then S else S gram state to a frequency, where a frequency is a non- | while B do S | S p S negative real number. A frequency distribution is essen- tially an unnormalized probability distribution over pro- The operational semantics for the deterministic subset of gram states; frequency distributions are often better than this language is standard. Probabilistic choice S1 p S2 ex- probability distributions as the basis for a programming lan- ecutes S1 with probability p or S2 with probability 1 − p.
Recommended publications
  • Librarianship and the Philosophy of Information
    University of Nebraska - Lincoln DigitalCommons@University of Nebraska - Lincoln Library Philosophy and Practice (e-journal) Libraries at University of Nebraska-Lincoln July 2005 Librarianship and the Philosophy of Information Ken R. Herold Hamilton College Follow this and additional works at: https://digitalcommons.unl.edu/libphilprac Part of the Library and Information Science Commons Herold, Ken R., "Librarianship and the Philosophy of Information" (2005). Library Philosophy and Practice (e-journal). 27. https://digitalcommons.unl.edu/libphilprac/27 Library Philosophy and Practice Vol. 3, No. 2 (Spring 2001) (www.uidaho.edu/~mbolin/lppv3n2.htm) ISSN 1522-0222 Librarianship and the Philosophy of Information Ken R. Herold Systems Manager Burke Library Hamilton College Clinton, NY 13323 “My purpose is to tell of bodies which have been transformed into shapes of a different kind.” Ovid, Metamorphoses Part I. Library Philosophy Provocation Information seems to be ubiquitous, diaphanous, a-categorical, discrete, a- dimensional, and knowing. · Ubiquitous. Information is ever-present and pervasive in our technology and beyond in our thinking about the world, appearing to be a generic ‘thing’ arising from all of our contacts with each other and our environment, whether thought of in terms of communication or cognition. For librarians information is a universal concept, at its greatest extent total in content and comprehensive in scope, even though we may not agree that all information is library information. · Diaphanous. Due to its virtuality, the manner in which information has the capacity to make an effect, information is freedom. In many aspects it exhibits a transparent quality, a window-like clarity as between source and patron in an ideal interface or a perfect exchange without bias.
    [Show full text]
  • Religious Fundamentalism in Eight Muslim‐
    JOURNAL for the SCIENTIFIC STUDY of RELIGION Religious Fundamentalism in Eight Muslim-Majority Countries: Reconceptualization and Assessment MANSOOR MOADDEL STUART A. KARABENICK Department of Sociology Combined Program in Education and Psychology University of Maryland University of Michigan To capture the common features of diverse fundamentalist movements, overcome etymological variability, and assess predictors, religious fundamentalism is conceptualized as a set of beliefs about and attitudes toward religion, expressed in a disciplinarian deity, literalism, exclusivity, and intolerance. Evidence from representative samples of over 23,000 adults in Egypt, Iraq, Jordan, Lebanon, Pakistan, Saudi Arabia, Tunisia, and Turkey supports the conclusion that fundamentalism is stronger in countries where religious liberty is lower, religion less fractionalized, state structure less fragmented, regulation of religion greater, and the national context less globalized. Among individuals within countries, fundamentalism is linked to religiosity, confidence in religious institutions, belief in religious modernity, belief in conspiracies, xenophobia, fatalism, weaker liberal values, trust in family and friends, reliance on less diverse information sources, lower socioeconomic status, and membership in an ethnic majority or dominant religion/sect. We discuss implications of these findings for understanding fundamentalism and the need for further research. Keywords: fundamentalism, Islam, Christianity, Sunni, Shia, Muslim-majority countries. INTRODUCTION
    [Show full text]
  • Peirce, Pragmatism, and the Right Way of Thinking
    SANDIA REPORT SAND2011-5583 Unlimited Release Printed August 2011 Peirce, Pragmatism, and The Right Way of Thinking Philip L. Campbell Prepared by Sandia National Laboratories Albuquerque, New Mexico 87185 and Livermore, California 94550 Sandia National Laboratories is a multi-program laboratory managed and operated by Sandia Corporation, a wholly owned subsidiary of Lockheed Martin Corporation, for the U.S. Department of Energy’s National Nuclear Security Administration under Contract DE-AC04-94AL85000.. Approved for public release; further dissemination unlimited. Issued by Sandia National Laboratories, operated for the United States Department of Energy by Sandia Corporation. NOTICE: This report was prepared as an account of work sponsored by an agency of the United States Government. Neither the United States Government, nor any agency thereof, nor any of their employees, nor any of their contractors, subcontractors, or their employees, make any warranty, express or implied, or assume any legal liability or responsibility for the accuracy, completeness, or usefulness of any information, apparatus, product, or process disclosed, or represent that its use would not infringe privately owned rights. Reference herein to any specific commercial product, process, or service by trade name, trademark, manufacturer, or otherwise, does not necessarily con- stitute or imply its endorsement, recommendation, or favoring by the United States Government, any agency thereof, or any of their contractors or subcontractors. The views and opinions expressed herein do not necessarily state or reflect those of the United States Government, any agency thereof, or any of their contractors. Printed in the United States of America. This report has been reproduced directly from the best available copy.
    [Show full text]
  • Citizen Science: Framing the Public, Information Exchange, and Communication in Crowdsourced Science
    University of Tennessee, Knoxville TRACE: Tennessee Research and Creative Exchange Doctoral Dissertations Graduate School 8-2014 Citizen Science: Framing the Public, Information Exchange, and Communication in Crowdsourced Science Todd Ernest Suomela University of Tennessee - Knoxville, [email protected] Follow this and additional works at: https://trace.tennessee.edu/utk_graddiss Part of the Communication Commons, and the Library and Information Science Commons Recommended Citation Suomela, Todd Ernest, "Citizen Science: Framing the Public, Information Exchange, and Communication in Crowdsourced Science. " PhD diss., University of Tennessee, 2014. https://trace.tennessee.edu/utk_graddiss/2864 This Dissertation is brought to you for free and open access by the Graduate School at TRACE: Tennessee Research and Creative Exchange. It has been accepted for inclusion in Doctoral Dissertations by an authorized administrator of TRACE: Tennessee Research and Creative Exchange. For more information, please contact [email protected]. To the Graduate Council: I am submitting herewith a dissertation written by Todd Ernest Suomela entitled "Citizen Science: Framing the Public, Information Exchange, and Communication in Crowdsourced Science." I have examined the final electronic copy of this dissertation for form and content and recommend that it be accepted in partial fulfillment of the equirr ements for the degree of Doctor of Philosophy, with a major in Communication and Information. Suzie Allard, Major Professor We have read this dissertation and recommend its acceptance: Carol Tenopir, Mark Littmann, Harry Dahms Accepted for the Council: Carolyn R. Hodges Vice Provost and Dean of the Graduate School (Original signatures are on file with official studentecor r ds.) Citizen Science: Framing the Public, Information Exchange, and Communication in Crowdsourced Science ADissertationPresentedforthe Doctor of Philosophy Degree The University of Tennessee, Knoxville Todd Ernest Suomela August 2014 c by Todd Ernest Suomela, 2014 All Rights Reserved.
    [Show full text]
  • The Theory of Everything
    The Theory of Everything R. B. Laughlin* and David Pines†‡§ *Department of Physics, Stanford University, Stanford, CA 94305; †Institute for Complex Adaptive Matter, University of California Office of the President, Oakland, CA 94607; ‡Science and Technology Center for Superconductivity, University of Illinois, Urbana, IL 61801; and §Los Alamos Neutron Science Center Division, Los Alamos National Laboratory, Los Alamos, NM 87545 Contributed by David Pines, November 18, 1999 We discuss recent developments in our understanding of matter, we have learned why atoms have the size they do, why chemical broadly construed, and their implications for contemporary re- bonds have the length and strength they do, why solid matter has search in fundamental physics. the elastic properties it does, why some things are transparent while others reflect or absorb light (6). With a little more he Theory of Everything is a term for the ultimate theory of experimental input for guidance it is even possible to predict Tthe universe—a set of equations capable of describing all atomic conformations of small molecules, simple chemical re- phenomena that have been observed, or that will ever be action rates, structural phase transitions, ferromagnetism, and observed (1). It is the modern incarnation of the reductionist sometimes even superconducting transition temperatures (7). ideal of the ancient Greeks, an approach to the natural world that But the schemes for approximating are not first-principles has been fabulously successful in bettering the lot of mankind deductions but are rather art keyed to experiment, and thus tend and continues in many people’s minds to be the central paradigm to be the least reliable precisely when reliability is most needed, of physics.
    [Show full text]
  • THINKING with MENTAL MODELS 63 and Implementation
    Thinking with CHAPTER 3 mental models When we think, we generally use concepts that we it would be impossible for people to make most deci- have not invented ourselves but that reflect the shared sions in daily life. And without shared mental models, understandings of our community. We tend not to it would be impossible in many cases for people to question views when they reflect an outlook on the develop institutions, solve collective action problems, world that is shared by everyone around us. An impor- feel a sense of belonging and solidarity, or even under- tant example for development pertains to how people stand one another. Although mental models are often view the need to provide cognitive stimulation to shared and arise, in part, from human sociality (chapter children. In many societies, parents take for granted 2), they differ from social norms, which were discussed that their role is to love their children and keep them in the preceding chapter. Mental models, which need safe and healthy, but they do not view young children not be enforced by direct social pressure, often capture as needing extensive cognitive and linguistic stimu- broad ideas about how the world works and one’s place lation. This view is an example of a “mental model.”1 in it. In contrast, social norms tend to focus on particu- In some societies, there are even norms against verbal lar behaviors and to be socially enforced. There is immense variation in mental models across societies, including different perceptions of Mental models help people make sense of the way the world “works.” Individuals can adapt their mental models, updating them when they learn that the world—to interpret their environment outcomes are inconsistent with expectations.
    [Show full text]
  • A Theory of Pragmatic Information and Its Application to the Quasi-Species Model of Biological Evolution
    A Theory of Pragmatic Information and Its Application to the Quasi-species Model of Biological Evolution Edward D Weinberger Max Planck Institute for Biophysical Chemistry, Am Fassberg, D-3400, Göttingen, Federal Republic of Germany Present address: Blumenthal Associates, Inc., 370 Central Park West, Suite 110, New York, NY, USA, 10025; Email: [email protected]. Abstract "Standard" information theory says nothing about the semantic content of information. Nevertheless, applications such as evolutionary theory demand consideration of precisely this aspect of information, a need that has motivated a largely unsuccessful search for a suitable measure of an "amount of meaning". This paper represents an attempt to move beyond this impasse, based on the observation that the meaning of a message can only be understood relative to its receiver. Positing that the semantic value of information is its usefulness in making an informed decision, we define pragmatic information as the information gain in the probability distributions of the receiver's actions, both before and after receipt of a message in some pre-defined ensemble. We then prove rigorously that our definition is the only one that satisfies obvious desiderata, such as the additivity of information from logically independent messages. This definition, when applied to the information "learned" by the time evolution of a process, defies the intuitions of the few previous researchers thinking along these lines by being monotonic in the uncertainty that remains after receipt of the message, but non-monotonic in the Shannon entropy of the input ensemble. It follows that the pragmatic information of the genetic "messages" in an evolving population is a global Lyapunov function for Eigen's quasi-species model of biological evolution.
    [Show full text]
  • Mental Models Concepts for System Dynamics Research
    Report No. 6 January 7, 1998 Mental Models Concepts for System Dynamics Research James K. Doyle1 David N. Ford 2 System Dynamics Review, in press. 1 Department of Social Science and Policy Studies, 100 Institute Rd., Worcester Polytechnic Institute, Worcester, MA 01609. Email: [email protected]. 2 Department of Information Science, University of Bergen, N-5020 Bergen, Norway. E-mail: [email protected] ABSTRACT Although "mental models" are of central importance to system dynamics research and practice, the field has yet to develop an unambiguous and agreed upon definition of them. To begin to address this problem, existing definitions and descriptions of mental models in system dynamics and several literatures related to cognitive science were reviewed and compared. Available definitions were found to be overly brief, general, and vague, and different authors were found to markedly disagree on the basic characteristics of mental models. Based on this review, we concluded that in order to reduce the amount of confusion in the literature, the mental models concept should be "unbundled" and the term "mental models" should be used more narrowly. To initiate a dialogue through which the system dynamics community might achieve a shared understanding of mental models, we proposed a new definition of "mental models of dynamic systems" accompanied by an extended annotation that explains the definitional choices made and suggests terms for other cognitive structures left undefined by narrowing the mental model concept. Suggestions for future research that could improve the field's ability to further define mental models are discussed. 2 A difficulty for those who want to understand or to appraise mental models is that their proponents seem to have somewhat different views.
    [Show full text]
  • INFORMATION– CONSCIOUSNESS– REALITY How a New Understanding of the Universe Can Help Answer Age-Old Questions of Existence the FRONTIERS COLLECTION
    THE FRONTIERS COLLECTION James B. Glattfelder INFORMATION– CONSCIOUSNESS– REALITY How a New Understanding of the Universe Can Help Answer Age-Old Questions of Existence THE FRONTIERS COLLECTION Series editors Avshalom C. Elitzur, Iyar, Israel Institute of Advanced Research, Rehovot, Israel Zeeya Merali, Foundational Questions Institute, Decatur, GA, USA Thanu Padmanabhan, Inter-University Centre for Astronomy and Astrophysics (IUCAA), Pune, India Maximilian Schlosshauer, Department of Physics, University of Portland, Portland, OR, USA Mark P. Silverman, Department of Physics, Trinity College, Hartford, CT, USA Jack A. Tuszynski, Department of Physics, University of Alberta, Edmonton, AB, Canada Rüdiger Vaas, Redaktion Astronomie, Physik, bild der wissenschaft, Leinfelden-Echterdingen, Germany THE FRONTIERS COLLECTION The books in this collection are devoted to challenging and open problems at the forefront of modern science and scholarship, including related philosophical debates. In contrast to typical research monographs, however, they strive to present their topics in a manner accessible also to scientifically literate non-specialists wishing to gain insight into the deeper implications and fascinating questions involved. Taken as a whole, the series reflects the need for a fundamental and interdisciplinary approach to modern science and research. Furthermore, it is intended to encourage active academics in all fields to ponder over important and perhaps controversial issues beyond their own speciality. Extending from quantum physics and relativity to entropy, conscious- ness, language and complex systems—the Frontiers Collection will inspire readers to push back the frontiers of their own knowledge. More information about this series at http://www.springer.com/series/5342 For a full list of published titles, please see back of book or springer.com/series/5342 James B.
    [Show full text]
  • 1 HIGHLIGHTS of PRESCRIBING INFORMATION These Highlights Do
    HIGHLIGHTS OF PRESCRIBING INFORMATION TREMFYA® (guselkumab) These highlights do not include all the information needed to use TREMFYA safely and effectively. See full prescribing information for TREMFYA. ----------------------------DOSAGE FORMS AND STRENGTHS--------------------------- TREMFYA® (guselkumab) injection, for subcutaneous use Injection: 100 mg/mL in a single-dose prefilled syringe or single-dose One-Press patient-controlled injector. (3) Initial U.S. Approval: 2017 -----------------------------------CONTRAINDICATIONS----------------------------------- ---------------------------------RECENT MAJOR CHANGES-------------------------------- Serious hypersensitivity reactions to guselkumab or to any of the excipients. (4) Indications and Usage (1.2) 07/2020 Dosage and Administration (2.2) 07/2020 -------------------------------WARNINGS AND PRECAUTIONS--------------------------- Warnings and Precautions, Hypersensitivity (5.1) 06/2020 • Hypersensitivity Reactions: Serious hypersensitivity reactions, including Warnings and Precautions, Infections (5.2) 07/2020 anaphylaxis, may occur. (5.1) Warnings and Precautions, Pre-treatment Evaluation for TB (5.3) 07/2020 • Infections: TREMFYA may increase the risk of infection. Instruct patients to seek medical advice if signs or symptoms of clinically important chronic or acute ----------------------------------INDICATIONS AND USAGE------------------------------- infection occur. If a serious infection develops, discontinue TREMFYA until the TREMFYA is an interleukin-23 blocker indicated for
    [Show full text]
  • Designing Information Systems: a Pragmatic Account
    Designing Information Systems Jonas Sjöström Designing Information Systems A Pragmatic Account Dissertation presented at Uppsala University to be publicly examined in Auditorium Minus, Gustavianum, Uppsala, Monday, October 25, 2010 at 13:15 for the degree of Doctor of Phi- losophy. The examination will be conducted in English. Abstract Sjöström, J. 2010. Designing Information Systems. A pragmatic account. 268 pp. Uppsala. ISBN 978-91-506-2149-5. Information technology (IT) plays an increasingly important role for individuals, organiza- tions, markets, and society as a whole. IT systems are artefacts (human made objects) de- signed for various purposes. Given the multiple-purpose characteristics of computers, such artefacts may, for example, support workflows, perform advanced calculations, support hu- man communication and socialization, enable delivery of services and digital products, facili- tate learning, or simply entertain. The diverging application areas for IT present a challenge to designers who, as a consequence, have to address increasingly divergent design situations. There have been numerous arguments suggesting that the IT artefact has been 'taken for granted', and needs to be understood and conceptualized better within information systems (IS) research. This thesis is based on the pragmatist notion that one important value of IT resides in its potential to support human collaboration. Such a belief has implications for the development of (1) knowledge aimed for action, change and improvement; (2) knowledge about actions, activities and practices; and (3) knowledge through action, experimentation and exploration. A view of the IT artefact is outlined, showing it as part of a social and techno- logical context. IT artefact design is explained in relation to the induction of social change.
    [Show full text]
  • GILENYA®  Cardiac Arrhythmias Requiring Anti-Arrhythmic Treatment with Class Ia Or Safely and Effectively
    HIGHLIGHTS OF PRESCRIBING INFORMATION Baseline QTc interval ≥ 500 msec. (4) These highlights do not include all the information needed to use GILENYA® Cardiac arrhythmias requiring anti-arrhythmic treatment with Class Ia or safely and effectively. See full prescribing information for GILENYA. Class III anti-arrhythmic drugs. (4) GILENYA (fingolimod) capsules, for oral use Hypersensitivity to fingolimod or its excipients. (4) Initial U.S. Approval: 2010 ------------------------WARNINGS AND PRECAUTIONS-------------------- ----------------------------RECENT MAJOR CHANGES--------------------------------- Infections: GILENYA may increase the risk. Obtain a complete blood Indications and Usage (1) 8/2019 count (CBC) before initiating treatment. Monitor for infection during Dosage and Administration (2.1) 8/2019 treatment and for 2 months after discontinuation. Do not start in patients Contraindications (4) 1/2019 with active infections. (5.2) Warnings and Precautions (5.5) 8/2019 Progressive Multifocal Leukoencephalopathy (PML): Withhold Warnings and Precautions (5.2, 5.8, 5.10, 5.12) 12/2019 GILENYA at the first sign or symptom suggestive of PML. (5.3) ----------------------------INDICATIONS AND USAGE---------------------------------- Macular Edema: Examine the fundus before and 3-4 months after GILENYA is a sphingosine 1-phosphate receptor modulator indicated for the treatment start. Diabetes mellitus and uveitis increase the risk. (5.4) treatment of relapsing forms of multiple sclerosis (MS), to include clinically Liver Injury: Obtain
    [Show full text]