Quantifying information leakage of randomized protocols, Proc. of VMCAI 2013, pp.68-87, 2013. ,
URL : https://hal.archives-ouvertes.fr/hal-01242614
Comparative Analysis of Leakage Tools on Scalable Case Studies, Proc. of SPIN 2015, pp.263-281, 2015. ,
DOI : 10.1007/978-3-319-23404-5_17
URL : https://hal.archives-ouvertes.fr/hal-01241352
QUAIL: A Quantitative Security Analyzer for Imperative Code, Proc. of CAV 2013, pp.702-707, 2013. ,
DOI : 10.1007/978-3-642-39799-8_49
URL : https://hal.archives-ouvertes.fr/hal-01242615
Computing information flow using symbolic modelchecking, Proc. of FSTTCS 2014, pp.505-516, 2014. ,
URL : https://hal.archives-ouvertes.fr/hal-01110118
Statistical Measurement of Information Leakage, TACAS, 2010. ,
DOI : 10.1007/978-3-642-12002-2_33
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.172.5891
A Tool for Estimating Information Leakage, Proc. of CAV 2013, pp.690-695, 2013. ,
DOI : 10.1007/978-3-642-39799-8_47
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.359.9503
LeakWatch: Estimating Information Leakage from Java Programs, Proc. of ESORICS 2014, Part II, pp.219-236, 2014. ,
DOI : 10.1007/978-3-319-11212-1_13
URL : https://hal.archives-ouvertes.fr/hal-01097603
Probabilistic Point-to-Point Information Leakage, 2013 IEEE 26th Computer Security Foundations Symposium, pp.193-205, 2013. ,
DOI : 10.1109/CSF.2013.20
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.360.1891
Hybrid Statistical Estimation of Mutual Information for Quantifying Information Flow, Proc. of FM 2016, pp.406-425, 2016. ,
DOI : 10.1016/j.tcs.2013.07.031
URL : https://hal.archives-ouvertes.fr/hal-01241360
Compositionality Results for Quantitative Information Flow, Proc. of QEST 2014, pp.368-383, 2014. ,
DOI : 10.1007/978-3-319-10696-0_28
URL : https://hal.archives-ouvertes.fr/hal-01006381
Approximation and randomization for quantitative informationflow analysis, Proc. of CSF 2010, pp.3-14, 2010. ,
Measuring channel capacity to distinguish undue influence, Proceedings of the ACM SIGPLAN Fourth Workshop on Programming Languages and Analysis for Security, PLAS '09, 2009. ,
DOI : 10.1145/1554339.1554349
URL : http://bitblaze.cs.berkeley.edu/papers/influence_plas09.pdf
The Definitive ANTLR Reference: Building Domain Specific Languages, 2007. ,
Abstract model counting, Proceedings of the 9th ACM symposium on Information, computer and communications security, ASIA CCS '14, pp.283-292, 2014. ,
DOI : 10.1145/2590296.2590328
Symbolic quantitative information flow, ACM SIGSOFT Software Engineering Notes, vol.37, issue.6, pp.1-5, 2012. ,
DOI : 10.1145/2382756.2382791
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.676.6282
Quantifying information leaks using reliability analysis, Proceedings of the 2014 International SPIN Symposium on Model Checking of Software, SPIN 2014, pp.105-108, 2014. ,
DOI : 10.1145/2632362.2632367
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.676.2232
Precisely Measuring Quantitative Information Flow: 10K Lines of Code and Beyond, 2016 IEEE European Symposium on Security and Privacy (EuroS&P), pp.31-46, 2016. ,
DOI : 10.1109/EuroSP.2016.15