F. Biondi, A. Legay, P. Malacaria, and A. Wasowski, Quantifying information leakage of randomized protocols, Proc. of VMCAI 2013, pp.68-87, 2013.
URL : https://hal.archives-ouvertes.fr/hal-01242614

F. Biondi, A. Legay, and J. Quilbeuf, Comparative Analysis of Leakage Tools on Scalable Case Studies, Proc. of SPIN 2015, pp.263-281, 2015.
DOI : 10.1007/978-3-319-23404-5_17

URL : https://hal.archives-ouvertes.fr/hal-01241352

F. Biondi, A. Legay, L. Traonouez, and A. Wasowski, QUAIL: A Quantitative Security Analyzer for Imperative Code, Proc. of CAV 2013, pp.702-707, 2013.
DOI : 10.1007/978-3-642-39799-8_49

URL : https://hal.archives-ouvertes.fr/hal-01242615

R. Chadha, U. Mathur, and S. Schwoon, Computing information flow using symbolic modelchecking, Proc. of FSTTCS 2014, pp.505-516, 2014.
URL : https://hal.archives-ouvertes.fr/hal-01110118

K. Chatzikokolakis, T. Chothia, and A. Guha, Statistical Measurement of Information Leakage, TACAS, 2010.
DOI : 10.1007/978-3-642-12002-2_33

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.172.5891

T. Chothia, Y. Kawamoto, and C. Novakovic, A Tool for Estimating Information Leakage, Proc. of CAV 2013, pp.690-695, 2013.
DOI : 10.1007/978-3-642-39799-8_47

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.359.9503

T. Chothia, Y. Kawamoto, and C. Novakovic, LeakWatch: Estimating Information Leakage from Java Programs, Proc. of ESORICS 2014, Part II, pp.219-236, 2014.
DOI : 10.1007/978-3-319-11212-1_13

URL : https://hal.archives-ouvertes.fr/hal-01097603

T. Chothia, Y. Kawamoto, C. Novakovic, and D. Parker, Probabilistic Point-to-Point Information Leakage, 2013 IEEE 26th Computer Security Foundations Symposium, pp.193-205, 2013.
DOI : 10.1109/CSF.2013.20

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.360.1891

Y. Kawamoto, F. Biondi, and A. Legay, Hybrid Statistical Estimation of Mutual Information for Quantifying Information Flow, Proc. of FM 2016, pp.406-425, 2016.
DOI : 10.1016/j.tcs.2013.07.031

URL : https://hal.archives-ouvertes.fr/hal-01241360

Y. Kawamoto, K. Chatzikokolakis, and C. Palamidessi, Compositionality Results for Quantitative Information Flow, Proc. of QEST 2014, pp.368-383, 2014.
DOI : 10.1007/978-3-319-10696-0_28

URL : https://hal.archives-ouvertes.fr/hal-01006381

B. Köpf and A. Rybalchenko, Approximation and randomization for quantitative informationflow analysis, Proc. of CSF 2010, pp.3-14, 2010.

J. Newsome, S. Mccamant, and D. Song, Measuring channel capacity to distinguish undue influence, Proceedings of the ACM SIGPLAN Fourth Workshop on Programming Languages and Analysis for Security, PLAS '09, 2009.
DOI : 10.1145/1554339.1554349

URL : http://bitblaze.cs.berkeley.edu/papers/influence_plas09.pdf

T. Parr, The Definitive ANTLR Reference: Building Domain Specific Languages, 2007.

Q. Phan and P. Malacaria, Abstract model counting, Proceedings of the 9th ACM symposium on Information, computer and communications security, ASIA CCS '14, pp.283-292, 2014.
DOI : 10.1145/2590296.2590328

Q. Phan, P. Malacaria, O. Tkachuk, and C. S. Pasareanu, Symbolic quantitative information flow, ACM SIGSOFT Software Engineering Notes, vol.37, issue.6, pp.1-5, 2012.
DOI : 10.1145/2382756.2382791

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.676.6282

Q. Phan, P. Malacaria, C. S. , and M. D. Amorim, Quantifying information leaks using reliability analysis, Proceedings of the 2014 International SPIN Symposium on Model Checking of Software, SPIN 2014, pp.105-108, 2014.
DOI : 10.1145/2632362.2632367

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.676.2232

C. G. Val, M. A. Enescu, S. Bayless, W. Aiello, and A. J. Hu, Precisely Measuring Quantitative Information Flow: 10K Lines of Code and Beyond, 2016 IEEE European Symposium on Security and Privacy (EuroS&P), pp.31-46, 2016.
DOI : 10.1109/EuroSP.2016.15