M. Backes, B. Kopf, and A. Rybalchenko, Automatic Discovery and Quantification of Information Leaks, 2009 30th IEEE Symposium on Security and Privacy, pp.141-153, 2009.
DOI : 10.1109/SP.2009.18

A. Banerjee and D. A. Naumann, Stack-based access control and secure information flow, Journal of Functional Programming, vol.15, issue.2, pp.131-177, 2005.
DOI : 10.1017/S0956796804005453

A. Banerjee, D. A. Naumann, and S. Rosenberg, Towards a logical account of declassification, Proceedings of the 2007 workshop on Programming languages and analysis for security , PLAS '07, pp.61-66, 2007.
DOI : 10.1145/1255329.1255340

G. Barthe, P. R. Argenio, and T. Rezk, Secure information flow by self-composition, Proceedings of the 17th IEEE workshop on Computer Security Foundations, pp.100-114, 2004.

G. Barthe and T. Rezk, Non-interference for a JVM-like language. TLDI '05, pp.103-112, 2005.
DOI : 10.1145/1040294.1040304

C. Cadar, D. Dunbar, and D. Engler, KLEE: unassisted and automatic generation of high-coverage tests for complex systems programs. OSDI'08, pp.209-224, 2008.

E. S. Cohen, Information transmission in sequential programs Academic Press, 1978. 8. ´ Adám Darvas, Reiner Hähnle, and David Sands. A theorem proving approach to analysis of secure information flow, Foundations of Secure Computation, pp.297-335, 2004.

R. Focardi and R. Gorrieri, A Classification of Security Properties for Process Algebras1, Journal of Computer Security, vol.3, issue.1, pp.5-34, 1995.
DOI : 10.3233/JCS-1994/1995-3103

R. Giacobazzi and I. Mastroeni, Abstract non-interference: Parameterizing non-interference by abstract interpretation
DOI : 10.1145/982962.964017

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.149.9512

P. Godefroid, N. Klarlund, and K. Sen, Dart: directed automated random testing, Proceedings of the 2005 ACM SIGPLAN conference on Programming language design and implementation, PLDI '05, pp.213-223, 2005.

R. Joshi, K. Rustan, and M. Leino, A semantic approach to secure information flow, Science of Computer Programming, vol.37, issue.1-3, pp.113-138, 2000.
DOI : 10.1016/S0167-6423(99)00024-6

URL : http://doi.org/10.1016/s0167-6423(99)00024-6

J. C. King, Symbolic execution and program testing, Communications of the ACM, vol.19, issue.7, pp.385-394, 1976.
DOI : 10.1145/360248.360252

C. Andrew, A. Myers, S. Sabelfeld, and . Zdancewic, Enforcing robust declassification and qualified robustness, Journal of Computer Security, vol.14, issue.2, pp.157-196, 2006.

F. Pottier and V. Simonet, Information flow inference for ML. SIG- PLAN Not, pp.319-330, 2002.
DOI : 10.1145/565816.503302

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.157.6266

A. Sabelfeld and A. C. Myers, Language-based information-flow security, IEEE Journal on Selected Areas in Communications, vol.21, issue.1, pp.5-19, 2003.
DOI : 10.1109/JSAC.2002.806121

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.10.3979

A. Sabelfeld and A. C. Myers, A Model for Delimited Information Release, Proc. International Symp. on Software Security (ISSS03), pp.174-191, 2004.
DOI : 10.1007/978-3-540-37621-7_9

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.11.1670

A. Sabelfeld and D. Sands, Dimensions and principles of declassification, Proceedings of the 18th IEEE workshop on Computer Security Foundations, pp.255-269, 2005.
DOI : 10.1109/csfw.2005.15

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.60.3688

K. Sen, D. Marinov, and G. Agha, CUTE: a concolic unit testing engine for C. SIGSOFT Software Engineering Notes, pp.263-272, 2005.
DOI : 10.1145/1321631.1321746

T. Terauchi and A. Aiken, Secure Information Flow as a Safety Problem, Static Analysis Symposium/Workshop on Static Analysis, pp.352-367, 2005.
DOI : 10.1007/11547662_24

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.101.7731

M. Dennis, G. Volpano, and . Smith, A type-based approach to program security, TAPSOFT '97, pp.607-621, 1997.

S. Zdancewic and A. C. Myers, Observational determinism for concurrent program security, 16th IEEE Computer Security Foundations Workshop, 2003. Proceedings., pp.29-43, 2003.
DOI : 10.1109/CSFW.2003.1212703

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.15.3238

S. Zdancewic and A. C. Myers, Robust declassification, Proceedings. 14th IEEE Computer Security Foundations Workshop, 2001., pp.15-23, 2001.
DOI : 10.1109/CSFW.2001.930133

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.14.1928