Measuring Information Leakage Using Generalized Gain Functions, 2012 IEEE 25th Computer Security Foundations Symposium, pp.265-279, 2012. ,
DOI : 10.1109/CSF.2012.26
URL : https://hal.archives-ouvertes.fr/hal-00734044
Preventing side-channel leaks in web traffic: A formal approach, NDSS. The Internet Society, 2013. ,
Quantifying information leakage of randomized protocols, p.2013 ,
URL : https://hal.archives-ouvertes.fr/hal-01242614
Information leakage of non-terminating processes, pp.517-529 ,
URL : https://hal.archives-ouvertes.fr/hal-01086879
QUAIL: A Quantitative Security Analyzer for Imperative Code, p.2013 ,
DOI : 10.1007/978-3-642-39799-8_49
URL : https://hal.archives-ouvertes.fr/hal-01242615
Quantifying information leakage in process calculi, Information and Computation, vol.207, issue.6, pp.699-725, 2009. ,
DOI : 10.1016/j.ic.2008.12.007
Experimenting with STA, a tool for automatic analysis of security protocols, Proceedings of the 2002 ACM symposium on Applied computing , SAC '02, pp.281-285, 2002. ,
DOI : 10.1145/508791.508847
A semiring-based trace semantics for processes with applications to information leakage analysis, Mathematical Structures in Computer Science, vol.323, issue.02, pp.259-291, 2015. ,
DOI : 10.1016/j.ic.2007.07.003
URL : https://hal.archives-ouvertes.fr/hal-01054448
Quantitative information flow under generic leakage functions and adaptive adversaries, p.2014 ,
URL : https://hal.archives-ouvertes.fr/hal-01398015
Distributed MILS Architectural Approach for Secure Smart Grids, SmartGridSec, pp.16-29, 2014. ,
DOI : 10.1007/978-3-319-10329-7_2
Computing information flow using symbolic modelchecking, pp.505-516 ,
URL : https://hal.archives-ouvertes.fr/hal-01110118
A Statistical Test for Information Leaks Using Continuous Mutual Information, 2011 IEEE 24th Computer Security Foundations Symposium, pp.177-190, 2011. ,
DOI : 10.1109/CSF.2011.19
LeakWatch: Estimating Information Leakage from Java Programs, Lecture Notes in Computer Science, vol.8713, pp.219-236, 2014. ,
DOI : 10.1007/978-3-319-11212-1_13
URL : https://hal.archives-ouvertes.fr/hal-01097603
Probabilistic Point-to-Point Information Leakage, 2013 IEEE 26th Computer Security Foundations Symposium, pp.193-205, 2013. ,
DOI : 10.1109/CSF.2013.20
A lattice model of secure information flow, Communications of the ACM, vol.19, issue.5, pp.236-243, 1976. ,
DOI : 10.1145/360051.360056
Abstraction Refinement with Craig Interpolation and Symbolic Pushdown Systems, Journal on Satisfiability Boolean Modeling and Computation, vol.22, pp.27-56, 2008. ,
DOI : 10.2307/2963593
Security Policies and Security Models, 1982 IEEE Symposium on Security and Privacy, pp.11-20, 1982. ,
DOI : 10.1109/SP.1982.10014
Toward a mathematical foundation for information flow security, IEEE Symposium on Security and Privacy, pp.21-35, 1991. ,
DTA++: dynamic taint analysis with targeted control-flow propagation, NDSS, 2011. ,
Automatic Quantification of Cache Side-Channels, CAV, pp.564-580, 2012. ,
DOI : 10.1007/978-3-642-31424-7_40
Establishing a smart grid node architecture and demonstrator in an office environment using the SOA approach, 2012 First International Workshop on Software Engineering Challenges for the Smart Grid (SE-SmartGrids), pp.8-14, 2012. ,
DOI : 10.1109/SE4SG.2012.6225710
Measuring channel capacity to distinguish undue influence, Proceedings of the ACM SIGPLAN Fourth Workshop on Programming Languages and Analysis for Security, PLAS '09, 2009. ,
DOI : 10.1145/1554339.1554349
Electoral Engineering: Voting Rules and Political Behavior. Cambridge Studies in Comparative Politics, 2004. ,
Abstract model counting, Proceedings of the 9th ACM symposium on Information, computer and communications security, ASIA CCS '14, pp.283-292, 2014. ,
DOI : 10.1145/2590296.2590328
Quantifying information leaks using reliability analysis, Proceedings of the 2014 International SPIN Symposium on Model Checking of Software, SPIN 2014, pp.105-108, 2014. ,
DOI : 10.1145/2632362.2632367
Symbolic quantitative information flow, ACM SIGSOFT Software Engineering Notes, vol.37, issue.6, pp.1-5, 2012. ,
DOI : 10.1145/2382756.2382791
A Privacy-Friendly Framework for Vehicle-to-Grid Interactions, Lecture Notes in Computer Science, vol.8448, pp.125-138, 2014. ,
DOI : 10.1007/978-3-319-10329-7_8
On the Foundations of Quantitative Information Flow, Lecture Notes in Computer Science, vol.38, issue.1, pp.288-302, 2009. ,
DOI : 10.1137/060651380