Algebraic foundations for information theoretical, probabilistic and guessability measures of information flow, p.3453, 2011. ,
A static analysis for quantifying information flow in a simple imperative language, Journal of Computer Security, vol.15, issue.3, pp.321-371, 2007. ,
DOI : 10.3233/JCS-2007-15302
Quantifying information leaks in software, Proceedings of the 26th Annual Computer Security Applications Conference on, ACSAC '10, pp.261-269, 2010. ,
DOI : 10.1145/1920261.1920300
Anonymity protocols as noisy channels, Information and Computation, vol.206, issue.2-4, pp.378-401, 2008. ,
DOI : 10.1016/j.ic.2007.07.003
URL : https://hal.archives-ouvertes.fr/inria-00349225
Quantifying maximal loss of anonymity in protocols, Proceedings of the 4th International Symposium on Information, Computer, and Communications Security, ASIACCS '09, pp.206-217, 2009. ,
DOI : 10.1145/1533057.1533087
Vulnerability Bounds and Leakage Resilience of Blinded Cryptography under Timing Attacks, 2010 23rd IEEE Computer Security Foundations Symposium, pp.44-56, 2010. ,
DOI : 10.1109/CSF.2010.11
An information-theoretic model for adaptive side-channel attacks, Proceedings of the 14th ACM conference on Computer and communications security , CCS '07, pp.286-296, 2007. ,
DOI : 10.1145/1315245.1315282
Covert Channel Capacity, 1987 IEEE Symposium on Security and Privacy, pp.60-66, 1987. ,
DOI : 10.1109/SP.1987.10013
Onion routing, Communications of the ACM, vol.42, issue.2, pp.39-41, 1999. ,
DOI : 10.1145/293411.293443
Low-Cost Traffic Analysis of Tor, 2005 IEEE Symposium on Security and Privacy (S&P'05), pp.183-195, 2005. ,
DOI : 10.1109/SP.2005.12
Browser-Based Attacks on Tor, Privacy Enhancing Technologies, pp.184-199, 2007. ,
DOI : 10.1007/978-3-540-75551-7_12
Elements of information theory, 1991. ,
A mathematical theory of communication. The Bell system technical journal, pp.379-423, 1948. ,
Maximizing entropy over markov processes Under review, 2012. ,
A lattice of information, [1993] Proceedings Computer Security Foundations Workshop VI, pp.65-70, 1993. ,
DOI : 10.1109/CSFW.1993.246638
The formal semantics of programming languages -an introduction. Foundation of computing series, 1993. ,
Risk assessment of security threats for looping constructs*, Journal of Computer Security, vol.18, issue.2, pp.191-228, 2010. ,
DOI : 10.3233/JCS-2010-0360
Lagrange multipliers and maximum information leakage in different observational models, Proceedings of the third ACM SIGPLAN workshop on Programming languages and analysis for security , PLAS '08, pp.135-146, 2008. ,
DOI : 10.1145/1375696.1375713
Quantitative information flow in interactive systems, Journal of Computer Security, vol.20, issue.1, pp.3-50, 2012. ,
DOI : 10.3233/JCS-2011-0433
URL : https://hal.archives-ouvertes.fr/inria-00637356
The Optimum Leakage Principle for Analyzing Multi-threaded Programs, Lecture Notes in Computer Science, vol.5973, pp.177-193, 2009. ,
DOI : 10.1007/978-3-642-14496-7_15
Automatic Quantification of Cache Side-Channels, Lecture Notes in Computer Science, vol.7358, pp.564-580, 2012. ,
DOI : 10.1007/978-3-642-31424-7_40
Measuring Information Leakage Using Generalized Gain Functions, 2012 IEEE 25th Computer Security Foundations Symposium, 2012. ,
DOI : 10.1109/CSF.2012.26
URL : https://hal.archives-ouvertes.fr/hal-00734044
Semantics-based code obfuscation by abstract interpretation, Journal of Computer Security, vol.17, issue.6, pp.855-908, 2009. ,
DOI : 10.3233/JCS-2009-0345