M. Backes, B. Kopf, and A. Rybalchenko, Automatic Discovery and Quantification of Information Leaks, 2009 30th IEEE Symposium on Security and Privacy, pp.141-153, 2009.
DOI : 10.1109/SP.2009.18

M. Balliu, M. Dam, L. Guernic, and G. , ENCoVer: Symbolic Exploration for Information Flow Security, 2012 IEEE 25th Computer Security Foundations Symposium, pp.30-44, 2012.
DOI : 10.1109/CSF.2012.24

A. Banerjee, R. Giacobazzi, and I. Mastroeni, What You Lose is What You Leak: Information Leakage in Declassification Policies, Electronic Notes in Theoretical Computer Science, vol.173, pp.47-66, 2007.
DOI : 10.1016/j.entcs.2007.02.027

A. Banerjee and D. A. Naumann, Stack-based access control and secure information flow, Journal of Functional Programming, vol.15, issue.2, pp.131-177, 2005.
DOI : 10.1017/S0956796804005453

G. Barthe, J. M. Crespo, and C. Kunz, Relational Verification Using Product Programs, Proc. of the 17th Intl. Conf. on Formal Methods, pp.200-214, 2011.
DOI : 10.1007/978-3-540-68237-0_5

G. Barthe, P. R. D-'argenio, and T. Rezk, Secure Information Flow by Self- Composition, Proc. of the 17th IEEE Workshop on Computer Security Foundations, pp.100-114, 2004.

B. Beckert, D. Bruns, V. Klebanov, C. Scheben, P. H. Schmitt et al., Information Flow in Object-Oriented Software, Post Proc. Logic-Based Program Synthesis and Transformation, 2014.
DOI : 10.1007/978-3-319-14125-1_2

B. Beckert, R. Hähnle, and P. H. Schmitt, Verification of Object-oriented Software: The KeY Approach, 2007.
DOI : 10.1007/978-3-540-69061-0

E. S. Cohen, Information Transmission in Sequential Programs. Foundations of Secure Computation pp, pp.297-335, 1978.

A. Darvas, R. Hähnle, and D. Sands, A Theorem Proving Approach to Analysis of Secure Information Flow, Issues in the Theory of Security. IFIP WG 1.7, 2003.
DOI : 10.1007/978-3-540-32004-3_20

A. Darvas, R. Hähnle, and D. Sands, A Theorem Proving Approach to Analysis of Secure Information Flow, Proc. of the 2nd Intl. Conf. on Security in Pervasive Computing SPC'05, pp.193-209, 2005.
DOI : 10.1007/978-3-540-32004-3_20

C. Engel and R. Hähnle, Generating Unit Tests from Formal Proofs, Proc. of Tests and Proofs, 2007.
DOI : 10.1007/978-3-540-73770-4_10

J. Graf, M. Hecker, and M. Mohr, Using JOANA for Information Flow Control in Java Programs -A Practical Guide, Proc. of the 6th Working Conf. on Programming Languages, pp.123-138, 2013.

M. Hentschel, R. Hähnle, and R. Bubel, Visualizing Unbounded Symbolic Execution, Proc. of Tests and Proofs, pp.82-98, 2014.
DOI : 10.1007/978-3-319-09099-3_7

S. Hunt and D. Sands, On flow-sensitive security types, ACM SIGPLAN Notices, vol.41, issue.1, pp.79-90, 2006.
DOI : 10.1145/1111320.1111045

J. C. King, Symbolic execution and program testing, Communications of the ACM, vol.19, issue.7, pp.385-394, 1976.
DOI : 10.1145/360248.360252

D. Milushev, W. Beck, and D. Clarke, Noninterference via Symbolic Execution, Proc. of FMOODS'12, pp.152-168, 2012.
DOI : 10.1007/978-3-642-30793-5_10

A. C. Myers, JFlow, Proceedings of the 26th ACM SIGPLAN-SIGACT symposium on Principles of programming languages , POPL '99, pp.228-241, 1999.
DOI : 10.1145/292540.292561

A. Nanevski, A. Banerjee, and D. Garg, Verification of Information Flow and Access Control Policies with Dependent Types, Proc. of the 2011 IEEE Symp. on Security and Privacy, pp.165-179, 2011.

Q. S. Phan, Self-composition by Symbolic Execution, Imperial College Computing Student Workshop. OASIcs, pp.95-102, 2013.

A. Sabelfeld and A. C. Myers, A Model for Delimited Information Release, Software Security-Theories and Systems, pp.174-191, 2004.
DOI : 10.1007/978-3-540-37621-7_9

A. Sabelfeld and D. Sands, Declassification: Dimensions and principles, Journal of Computer Security, vol.17, issue.5, pp.517-548, 2009.
DOI : 10.3233/JCS-2009-0352

C. Scheben and P. H. Schmitt, Verification of Information Flow Properties of Java Programs without Approximations, LNCS, vol.7421, pp.232-249, 2012.
DOI : 10.1007/978-3-642-31762-0_15

T. Terauchi and A. Aiken, Secure Information Flow as a Safety Problem, Proc. of the 12th Intl. Conf. Static Analysis SAS'05, pp.352-367, 2005.
DOI : 10.1007/11547662_24

J. A. Vaughan and S. Chong, Inference of Expressive Declassification Policies, 2011 IEEE Symposium on Security and Privacy, pp.180-195, 2011.
DOI : 10.1109/SP.2011.20

D. Volpano, C. Irvine, and G. Smith, A sound type system for secure flow analysis, Journal of Computer Security, vol.4, issue.2-3, pp.167-187, 1996.
DOI : 10.3233/JCS-1996-42-304

N. Wasser and R. Bubel, A Theorem Prover Backed Approach to Array Abstraction, Proc. of VSL 2014 ? WING Workshop, 2014.