P. Malacaria, Algebraic foundations for information theoretical, probabilistic and guessability measures of information flow, p.3453, 2011.

D. Clark, S. Hunt, and P. Malacaria, A static analysis for quantifying information flow in a simple imperative language, Journal of Computer Security, vol.15, issue.3, pp.321-371, 2007.
DOI : 10.3233/JCS-2007-15302

J. Heusser and P. Malacaria, Quantifying information leaks in software, Proceedings of the 26th Annual Computer Security Applications Conference on, ACSAC '10, pp.261-269, 2010.
DOI : 10.1145/1920261.1920300

K. Chatzikokolakis, C. Palamidessi, and P. Panangaden, Anonymity protocols as noisy channels, Information and Computation, vol.206, issue.2-4, pp.378-401, 2008.
DOI : 10.1016/j.ic.2007.07.003

URL : https://hal.archives-ouvertes.fr/inria-00349225

H. Chen and P. Malacaria, Quantifying maximal loss of anonymity in protocols, Proceedings of the 4th International Symposium on Information, Computer, and Communications Security, ASIACCS '09, pp.206-217, 2009.
DOI : 10.1145/1533057.1533087

B. Köpf and G. Smith, Vulnerability Bounds and Leakage Resilience of Blinded Cryptography under Timing Attacks, 2010 23rd IEEE Computer Security Foundations Symposium, pp.44-56, 2010.
DOI : 10.1109/CSF.2010.11

B. Köpf and D. A. Basin, An information-theoretic model for adaptive side-channel attacks, Proceedings of the 14th ACM conference on Computer and communications security , CCS '07, pp.286-296, 2007.
DOI : 10.1145/1315245.1315282

J. K. Millen, Covert Channel Capacity, 1987 IEEE Symposium on Security and Privacy, pp.60-66, 1987.
DOI : 10.1109/SP.1987.10013

D. M. Goldschlag, M. G. Reed, and P. F. Syverson, Onion routing, Communications of the ACM, vol.42, issue.2, pp.39-41, 1999.
DOI : 10.1145/293411.293443

S. J. Murdoch and G. Danezis, Low-Cost Traffic Analysis of Tor, 2005 IEEE Symposium on Security and Privacy (S&P'05), pp.183-195, 2005.
DOI : 10.1109/SP.2005.12

T. G. Abbott, K. J. Lai, M. R. Lieberman, and E. C. Price, Browser-Based Attacks on Tor, Privacy Enhancing Technologies, pp.184-199, 2007.
DOI : 10.1007/978-3-540-75551-7_12

T. Cover and J. Thomas, Elements of information theory, 1991.

C. E. Shannon, A mathematical theory of communication. The Bell system technical journal, pp.379-423, 1948.

F. Biondi, A. Legay, B. F. Nielsen, and A. W?sowski, Maximizing entropy over markov processes Under review, 2012.

J. Landauer and T. Redmond, A lattice of information, [1993] Proceedings Computer Security Foundations Workshop VI, pp.65-70, 1993.
DOI : 10.1109/CSFW.1993.246638

G. Winskel, The formal semantics of programming languages -an introduction. Foundation of computing series, 1993.

P. Malacaria, Risk assessment of security threats for looping constructs*, Journal of Computer Security, vol.18, issue.2, pp.191-228, 2010.
DOI : 10.3233/JCS-2010-0360

P. Malacaria and H. Chen, Lagrange multipliers and maximum information leakage in different observational models, Proceedings of the third ACM SIGPLAN workshop on Programming languages and analysis for security , PLAS '08, pp.135-146, 2008.
DOI : 10.1145/1375696.1375713

M. S. Alvim, M. E. Andrés, and C. Palamidessi, Quantitative information flow in interactive systems, Journal of Computer Security, vol.20, issue.1, pp.3-50, 2012.
DOI : 10.3233/JCS-2011-0433

URL : https://hal.archives-ouvertes.fr/inria-00637356

H. Chen and P. Malacaria, The Optimum Leakage Principle for Analyzing Multi-threaded Programs, Lecture Notes in Computer Science, vol.5973, pp.177-193, 2009.
DOI : 10.1007/978-3-642-14496-7_15

B. Köpf, L. Mauborgne, and M. Ochoa, Automatic Quantification of Cache Side-Channels, Lecture Notes in Computer Science, vol.7358, pp.564-580, 2012.
DOI : 10.1007/978-3-642-31424-7_40

M. S. Alvim, K. Chatzikokolakis, C. Palamidessi, and G. Smith, Measuring Information Leakage Using Generalized Gain Functions, 2012 IEEE 25th Computer Security Foundations Symposium, 2012.
DOI : 10.1109/CSF.2012.26

URL : https://hal.archives-ouvertes.fr/hal-00734044

M. D. Preda and R. Giacobazzi, Semantics-based code obfuscation by abstract interpretation, Journal of Computer Security, vol.17, issue.6, pp.855-908, 2009.
DOI : 10.3233/JCS-2009-0345