C. Adami, Information theory in molecular biology, Physics of Life Reviews, vol.1, issue.1, pp.3-22, 2004.
DOI : 10.1016/j.plrev.2004.01.002

M. Backes, B. Köpf, and A. Rybalchenko, Automatic Discovery and Quantification of Information Leaks, 2009 30th IEEE Symposium on Security and Privacy, pp.17-20, 2009.
DOI : 10.1109/SP.2009.18

B. Barbot, S. Haddad, and C. Picaronny, Coupling and Importance Sampling for Statistical Model Checking, TACAS 2012. Proceedings. Lecture Notes in Computer Science, pp.331-346, 2012.
DOI : 10.1007/978-3-642-28756-5_23

URL : https://hal.archives-ouvertes.fr/hal-00776795

G. Barthe and B. Köpf, Information-Theoretic Bounds for Differentially Private Mechanisms, 2011 IEEE 24th Computer Security Foundations Symposium, pp.191-204, 2011.
DOI : 10.1109/CSF.2011.20

F. Biondi, A. Legay, P. Malacaria, and A. Wasowski, Quantifying information leakage of randomized protocols, Theoretical Computer Science, vol.597, pp.62-87, 2015.
DOI : 10.1016/j.tcs.2015.07.034

URL : https://hal.archives-ouvertes.fr/hal-01242614

F. Biondi, A. Legay, L. M. Traonouez, and A. Wasowski, QUAIL, https://project.inria

F. Biondi, A. Legay, L. Traonouez, and A. Wasowski, QUAIL: A Quantitative Security Analyzer for Imperative Code, CAV 2013. Proceedings. Lecture Notes in Computer Science, pp.702-707, 2013.
DOI : 10.1007/978-3-642-39799-8_49

URL : https://hal.archives-ouvertes.fr/hal-01242615

M. Boreale and M. Paolini, On Formally Bounding Information Leakage by Statistical Estimation, ISC 2014. Proceedings. Lecture Notes in Computer Science, pp.216-236, 2014.
DOI : 10.1007/978-3-319-13257-0_13

D. R. Brillinger, Some data analysis using mutual information, Brazilian Journal of Probability and Statistics, vol.18, issue.6, pp.163-183, 2004.

R. Chadha, U. Mathur, and S. Schwoon, Computing information flow using symbolic modelchecking, FSTTCS 2014. Proceedings. LIPIcs, pp.505-516, 2014.
URL : https://hal.archives-ouvertes.fr/hal-01110118

S. Chakraborty, D. J. Fremont, K. S. Meel, S. A. Seshia, and M. Y. Vardi, On Parallel Scalable Uniform SAT Witness Generation, TACAS 2015. Proceedings. Lecture Notes in Computer Science, pp.304-319, 2015.
DOI : 10.1007/978-3-662-46681-0_25

S. Chakraborty, K. S. Meel, and M. Y. Vardi, A Scalable Approximate Model Counter, CP 2013. Proceedings. Lecture Notes in Computer Science, pp.200-216, 2013.
DOI : 10.1007/978-3-642-40627-0_18

K. Chatzikokolakis, T. Chothia, and A. Guha, Statistical Measurement of Information Leakage, TACAS 2010. Proceedings. Lecture Notes in Computer Science, pp.390-404, 2010.
DOI : 10.1007/978-3-642-12002-2_33

K. Chatzikokolakis, C. Palamidessi, and P. Panangaden, Anonymity protocols as noisy channels, Inf. and Comp, vol.206, pp.2-4, 2008.
URL : https://hal.archives-ouvertes.fr/inria-00349225

D. Chaum, The dining cryptographers problem: Unconditional sender and recipient untraceability, Journal of Cryptology, vol.1, issue.1, pp.65-75, 1988.
DOI : 10.1007/BF00206326

T. Chothia and Y. Kawamoto, Statistical estimation of min-entropy leakage, 2014.

T. Chothia, Y. Kawamoto, and C. Novakovic, A Tool for Estimating Information Leakage, CAV 2013. Proceedings. Lecture Notes in Computer Science, pp.690-695, 2013.
DOI : 10.1007/978-3-642-39799-8_47

T. Chothia, Y. Kawamoto, and C. Novakovic, LeakWatch: Estimating Information Leakage from Java Programs, ESORICS 2014. Proceedings, Part II, pp.219-236, 2014.
DOI : 10.1007/978-3-319-11212-1_13

URL : https://hal.archives-ouvertes.fr/hal-01097603

T. Chothia, Y. Kawamoto, C. Novakovic, and D. Parker, Probabilistic Point-to-Point Information Leakage, 2013 IEEE 26th Computer Security Foundations Symposium, pp.193-205, 2013.
DOI : 10.1109/CSF.2013.20

D. Clark, S. Hunt, and P. Malacaria, Quantitative Analysis of the Leakage of Confidential Data, Electronic Notes in Theoretical Computer Science, vol.59, issue.3, pp.238-251, 2001.
DOI : 10.1016/S1571-0661(04)00290-7

D. Clark, S. Hunt, and P. Malacaria, A static analysis for quantifying information flow in a simple imperative language, Journal of Computer Security, vol.15, issue.3, pp.321-371, 2007.
DOI : 10.3233/JCS-2007-15302

E. M. Clarke and P. Zuliani, Statistical Model Checking for Cyber-Physical Systems, ATVA 2011. Proceedings. Lecture Notes in Computer Science, pp.1-12, 2011.
DOI : 10.1007/978-3-642-24372-1_1

M. R. Clarkson and F. B. Schneider, Hyperproperties, Journal of Computer Security, vol.18, issue.6, pp.1157-1210, 2010.
DOI : 10.3233/JCS-2009-0393

T. M. Cover and J. A. Thomas, Elements of information theory, 2006.

D. E. Denning, A lattice model of secure information flow, Communications of the ACM, vol.19, issue.5, pp.236-243, 1976.
DOI : 10.1145/360051.360056

F. Escolano, P. Suau, and B. Bonev, Information Theory in Computer Vision and Pattern Recognition, 2009.
DOI : 10.1007/978-1-84882-297-9

B. Espinoza and G. Smith, Min-entropy as a resource, Information and Computation, vol.226, 2013.
DOI : 10.1016/j.ic.2013.03.005

D. J. Fremont and S. A. Seshia, Speeding up SMT-based quantitative program analysis, SMT 2014. Proceedings. CEUR Workshop Proceedings, pp.3-13, 2014.

R. G. Gallager, Information Theory and Reliable Communication, 1968.
DOI : 10.1007/978-3-7091-2945-6

J. W. Gray, Toward a mathematical foundation for information flow security, IEEE Symposium on Security and Privacy, pp.21-35, 1991.

F. V. Jensen, Introduction to Bayesian Networks, 1996.

M. G. Kang, S. Mccamant, P. Poosankam, and D. Song, DTA++: dynamic taint analysis with targeted control-flow propagation, NDSS 2011. Proceedings. The Internet Society, 2011.

Y. Kawamoto, F. Biondi, and A. Legay, Hybrid Statistical Estimation of Mutual Information for Quantifying Information Flow, Research report INRIA, vol.538, issue.1, 2016.
DOI : 10.1007/978-3-642-00596-1_21

URL : https://hal.archives-ouvertes.fr/hal-01241360

Y. Kawamoto, K. Chatzikokolakis, and C. Palamidessi, Compositionality Results for Quantitative Information Flow, QEST 2014. Proceedings. pp, pp.368-383, 2014.
DOI : 10.1007/978-3-319-10696-0_28

URL : https://hal.archives-ouvertes.fr/hal-01006381

Y. Kawamoto and T. Given-wilson, Quantitative Information Flow for Scheduler-Dependent Systems, QAPL 2015. Proceedings, pp.48-62, 2015.
DOI : 10.4204/EPTCS.194.4

URL : https://hal.archives-ouvertes.fr/hal-01114778

B. Köpf and D. A. Basin, An information-theoretic model for adaptive side-channel attacks, Proceedings of the 14th ACM conference on Computer and communications security , CCS '07, pp.286-296, 2007.
DOI : 10.1145/1315245.1315282

B. Köpf and A. Rybalchenko, Approximation and randomization for quantitative informationflow analysis, CSF 2010. Proceedings. pp, pp.3-14, 2010.

A. Legay, B. Delahaye, S. Bensalem, H. Barringer, Y. Falcone et al., Statistical Model Checking: An Overview, Runtime Verification -First International Conference Proceedings. Lecture Notes in Computer Science, pp.122-135, 2010.
DOI : 10.1007/978-3-642-16612-9_11

URL : https://hal.archives-ouvertes.fr/inria-00591593

D. J. Mackay, Information Theory, Inference & Learning Algorithms, 2002.

S. Mccamant and M. D. Ernst, Quantitative information flow as network flow capacity, Proceedings of the ACM SIGPLAN 2008 Conference on Programming Language Design and Implementation, pp.193-205, 2008.

R. Moddemeijer, On estimation of entropy and mutual information of continuous distributions, Signal Processing, vol.16, issue.3, pp.233-248, 1989.
DOI : 10.1016/0165-1684(89)90132-1

J. Newsome, S. Mccamant, and D. Song, Measuring channel capacity to distinguish undue influence, Proceedings of the ACM SIGPLAN Fourth Workshop on Programming Languages and Analysis for Security, PLAS '09, pp.15-21, 2009.
DOI : 10.1145/1554339.1554349

Q. Phan and P. Malacaria, Abstract model counting, Proceedings of the 9th ACM symposium on Information, computer and communications security, ASIA CCS '14, pp.283-292, 2014.
DOI : 10.1145/2590296.2590328

Q. Phan, P. Malacaria, C. S. Pasareanu, and M. Amorim, Quantifying information leaks using reliability analysis, Proceedings of the 2014 International SPIN Symposium on Model Checking of Software, SPIN 2014, pp.105-108, 2014.
DOI : 10.1145/2632362.2632367

G. Smith, On the Foundations of Quantitative Information Flow, FOS- SACS 2009. Proceedings. Lecture Notes in Computer Science, pp.288-302, 2009.
DOI : 10.1137/060651380

J. S. Vitter, Random sampling with a reservoir, ACM Transactions on Mathematical Software, vol.11, issue.1, pp.37-573165, 1985.
DOI : 10.1145/3147.3165

M. M. Wilde, Quantum Information Theory, 2013.

H. Yasuoka and T. Terauchi, Quantitative information flow as safety and liveness hyperproperties, Theoretical Computer Science, vol.538, pp.167-182, 2014.
DOI : 10.1016/j.tcs.2013.07.031