Information theory in molecular biology, Physics of Life Reviews, vol.1, issue.1, pp.3-22, 2004. ,
DOI : 10.1016/j.plrev.2004.01.002
Automatic Discovery and Quantification of Information Leaks, 2009 30th IEEE Symposium on Security and Privacy, pp.17-20, 2009. ,
DOI : 10.1109/SP.2009.18
Coupling and Importance Sampling for Statistical Model Checking, TACAS 2012. Proceedings. Lecture Notes in Computer Science, pp.331-346, 2012. ,
DOI : 10.1007/978-3-642-28756-5_23
URL : https://hal.archives-ouvertes.fr/hal-00776795
Information-Theoretic Bounds for Differentially Private Mechanisms, 2011 IEEE 24th Computer Security Foundations Symposium, pp.191-204, 2011. ,
DOI : 10.1109/CSF.2011.20
Quantifying information leakage of randomized protocols, Theoretical Computer Science, vol.597, pp.62-87, 2015. ,
DOI : 10.1016/j.tcs.2015.07.034
URL : https://hal.archives-ouvertes.fr/hal-01242614
QUAIL, https://project.inria ,
QUAIL: A Quantitative Security Analyzer for Imperative Code, CAV 2013. Proceedings. Lecture Notes in Computer Science, pp.702-707, 2013. ,
DOI : 10.1007/978-3-642-39799-8_49
URL : https://hal.archives-ouvertes.fr/hal-01242615
On Formally Bounding Information Leakage by Statistical Estimation, ISC 2014. Proceedings. Lecture Notes in Computer Science, pp.216-236, 2014. ,
DOI : 10.1007/978-3-319-13257-0_13
Some data analysis using mutual information, Brazilian Journal of Probability and Statistics, vol.18, issue.6, pp.163-183, 2004. ,
Computing information flow using symbolic modelchecking, FSTTCS 2014. Proceedings. LIPIcs, pp.505-516, 2014. ,
URL : https://hal.archives-ouvertes.fr/hal-01110118
On Parallel Scalable Uniform SAT Witness Generation, TACAS 2015. Proceedings. Lecture Notes in Computer Science, pp.304-319, 2015. ,
DOI : 10.1007/978-3-662-46681-0_25
A Scalable Approximate Model Counter, CP 2013. Proceedings. Lecture Notes in Computer Science, pp.200-216, 2013. ,
DOI : 10.1007/978-3-642-40627-0_18
Statistical Measurement of Information Leakage, TACAS 2010. Proceedings. Lecture Notes in Computer Science, pp.390-404, 2010. ,
DOI : 10.1007/978-3-642-12002-2_33
Anonymity protocols as noisy channels, Inf. and Comp, vol.206, pp.2-4, 2008. ,
URL : https://hal.archives-ouvertes.fr/inria-00349225
The dining cryptographers problem: Unconditional sender and recipient untraceability, Journal of Cryptology, vol.1, issue.1, pp.65-75, 1988. ,
DOI : 10.1007/BF00206326
Statistical estimation of min-entropy leakage, 2014. ,
A Tool for Estimating Information Leakage, CAV 2013. Proceedings. Lecture Notes in Computer Science, pp.690-695, 2013. ,
DOI : 10.1007/978-3-642-39799-8_47
LeakWatch: Estimating Information Leakage from Java Programs, ESORICS 2014. Proceedings, Part II, pp.219-236, 2014. ,
DOI : 10.1007/978-3-319-11212-1_13
URL : https://hal.archives-ouvertes.fr/hal-01097603
Probabilistic Point-to-Point Information Leakage, 2013 IEEE 26th Computer Security Foundations Symposium, pp.193-205, 2013. ,
DOI : 10.1109/CSF.2013.20
Quantitative Analysis of the Leakage of Confidential Data, Electronic Notes in Theoretical Computer Science, vol.59, issue.3, pp.238-251, 2001. ,
DOI : 10.1016/S1571-0661(04)00290-7
A static analysis for quantifying information flow in a simple imperative language, Journal of Computer Security, vol.15, issue.3, pp.321-371, 2007. ,
DOI : 10.3233/JCS-2007-15302
Statistical Model Checking for Cyber-Physical Systems, ATVA 2011. Proceedings. Lecture Notes in Computer Science, pp.1-12, 2011. ,
DOI : 10.1007/978-3-642-24372-1_1
Hyperproperties, Journal of Computer Security, vol.18, issue.6, pp.1157-1210, 2010. ,
DOI : 10.3233/JCS-2009-0393
Elements of information theory, 2006. ,
A lattice model of secure information flow, Communications of the ACM, vol.19, issue.5, pp.236-243, 1976. ,
DOI : 10.1145/360051.360056
Information Theory in Computer Vision and Pattern Recognition, 2009. ,
DOI : 10.1007/978-1-84882-297-9
Min-entropy as a resource, Information and Computation, vol.226, 2013. ,
DOI : 10.1016/j.ic.2013.03.005
Speeding up SMT-based quantitative program analysis, SMT 2014. Proceedings. CEUR Workshop Proceedings, pp.3-13, 2014. ,
Information Theory and Reliable Communication, 1968. ,
DOI : 10.1007/978-3-7091-2945-6
Toward a mathematical foundation for information flow security, IEEE Symposium on Security and Privacy, pp.21-35, 1991. ,
Introduction to Bayesian Networks, 1996. ,
DTA++: dynamic taint analysis with targeted control-flow propagation, NDSS 2011. Proceedings. The Internet Society, 2011. ,
Hybrid Statistical Estimation of Mutual Information for Quantifying Information Flow, Research report INRIA, vol.538, issue.1, 2016. ,
DOI : 10.1007/978-3-642-00596-1_21
URL : https://hal.archives-ouvertes.fr/hal-01241360
Compositionality Results for Quantitative Information Flow, QEST 2014. Proceedings. pp, pp.368-383, 2014. ,
DOI : 10.1007/978-3-319-10696-0_28
URL : https://hal.archives-ouvertes.fr/hal-01006381
Quantitative Information Flow for Scheduler-Dependent Systems, QAPL 2015. Proceedings, pp.48-62, 2015. ,
DOI : 10.4204/EPTCS.194.4
URL : https://hal.archives-ouvertes.fr/hal-01114778
An information-theoretic model for adaptive side-channel attacks, Proceedings of the 14th ACM conference on Computer and communications security , CCS '07, pp.286-296, 2007. ,
DOI : 10.1145/1315245.1315282
Approximation and randomization for quantitative informationflow analysis, CSF 2010. Proceedings. pp, pp.3-14, 2010. ,
Statistical Model Checking: An Overview, Runtime Verification -First International Conference Proceedings. Lecture Notes in Computer Science, pp.122-135, 2010. ,
DOI : 10.1007/978-3-642-16612-9_11
URL : https://hal.archives-ouvertes.fr/inria-00591593
Information Theory, Inference & Learning Algorithms, 2002. ,
Quantitative information flow as network flow capacity, Proceedings of the ACM SIGPLAN 2008 Conference on Programming Language Design and Implementation, pp.193-205, 2008. ,
On estimation of entropy and mutual information of continuous distributions, Signal Processing, vol.16, issue.3, pp.233-248, 1989. ,
DOI : 10.1016/0165-1684(89)90132-1
Measuring channel capacity to distinguish undue influence, Proceedings of the ACM SIGPLAN Fourth Workshop on Programming Languages and Analysis for Security, PLAS '09, pp.15-21, 2009. ,
DOI : 10.1145/1554339.1554349
Abstract model counting, Proceedings of the 9th ACM symposium on Information, computer and communications security, ASIA CCS '14, pp.283-292, 2014. ,
DOI : 10.1145/2590296.2590328
Quantifying information leaks using reliability analysis, Proceedings of the 2014 International SPIN Symposium on Model Checking of Software, SPIN 2014, pp.105-108, 2014. ,
DOI : 10.1145/2632362.2632367
On the Foundations of Quantitative Information Flow, FOS- SACS 2009. Proceedings. Lecture Notes in Computer Science, pp.288-302, 2009. ,
DOI : 10.1137/060651380
Random sampling with a reservoir, ACM Transactions on Mathematical Software, vol.11, issue.1, pp.37-573165, 1985. ,
DOI : 10.1145/3147.3165
Quantum Information Theory, 2013. ,
Quantitative information flow as safety and liveness hyperproperties, Theoretical Computer Science, vol.538, pp.167-182, 2014. ,
DOI : 10.1016/j.tcs.2013.07.031