Automatic Discovery and Quantification of Information Leaks, 2009 30th IEEE Symposium on Security and Privacy, 2009. ,
DOI : 10.1109/SP.2009.18
Quantifying opacity, 2010. ,
Quantifying information leakage of randomized protocols, 2013. ,
URL : https://hal.archives-ouvertes.fr/hal-01242614
Statistical Measurement of Information Leakage, TACAS, 2010. ,
DOI : 10.1007/978-3-642-12002-2_33
Anonymity protocols as noisy channels, Information and Computation, 2006. ,
URL : https://hal.archives-ouvertes.fr/inria-00349225
The dining cryptographers problem: Unconditional sender and recipient untraceability, Journal of Cryptology, vol.1, issue.1, pp.65-75, 1988. ,
DOI : 10.1007/BF00206326
A Statistical Test for Information Leaks Using Continuous Mutual Information, 2011 IEEE 24th Computer Security Foundations Symposium, pp.177-190, 2011. ,
DOI : 10.1109/CSF.2011.19
Quantitative Analysis of the Leakage of Confidential Data, Electronic Notes in Theoretical Computer Science, vol.59, issue.3, pp.238-251, 2001. ,
DOI : 10.1016/S1571-0661(04)00290-7
A static analysis for quantifying information flow in a simple imperative language, Journal of Computer Security, vol.15, issue.3, 2007. ,
DOI : 10.3233/JCS-2007-15302
APEX: An Analyzer for Open Probabilistic Programs, Proc. CAV'12, 2012. ,
DOI : 10.1007/978-3-642-31424-7_51
Precise quantitative information flow analysis using symbolic model counting, p.2012 ,
An information-theoretic model for adaptive side-channel attacks, Proceedings of the 14th ACM conference on Computer and communications security , CCS '07, 2007. ,
DOI : 10.1145/1315245.1315282
Automatic Quantification of Cache Side-Channels, p.2012 ,
DOI : 10.1007/978-3-642-31424-7_40
PRISM 4.0: Verification of Probabilistic Real-Time Systems, Proc. CAV'11, 2011. ,
DOI : 10.1007/3-540-45657-0_17
URL : https://hal.archives-ouvertes.fr/hal-00648035
Algebraic foundations for information theoretical, probabilistic and guessability measures of information flow. CoRR, abs/1101, 2011. ,
Quantitative information flow as network flow capacity, 2008. ,
A Tool: Quantitative Analyser for Programs, 2011 Eighth International Conference on Quantitative Evaluation of SysTems, 2011. ,
DOI : 10.1109/QEST.2011.25
Measuring channel capacity to distinguish undue influence, Proceedings of the ACM SIGPLAN Fourth Workshop on Programming Languages and Analysis for Security, PLAS '09, 2009. ,
DOI : 10.1145/1554339.1554349
Symbolic quantitative information flow, ACM SIGSOFT Software Engineering Notes, vol.37, issue.6, pp.1-5, 2012. ,
DOI : 10.1145/2382756.2382791
Language-based information-flow security, IEEE Journal on Selected Areas in Communications, vol.21, issue.1, pp.5-19, 2003. ,
DOI : 10.1109/JSAC.2002.806121
On the Foundations of Quantitative Information Flow, LNCS, vol.38, issue.1, pp.288-302, 2009. ,
DOI : 10.1137/060651380