S. Mário, K. Alvim, Y. Chatzikokolakis, C. Kawamoto, and . Palamidessi, Information leakage games [Ada04] Christoph Adami Information theory in molecular biology Coupling and importance sampling for statistical model checking, 8th International Conference on Decision and Game Theory for Security Tools and Algorithms for the Construction and Analysis of Systems -18th International Conference, TACAS 2012, Held as Part of the European Joint Conferences on Theory and Practice of Software Proceedings, pp.3-22, 2004.

G. Barthe and B. Köpf, Information-theoretic bounds for differentially private mechanisms Cernay-la-Ville, Proceedings of the 24th IEEE Computer Security Foundations Symposium, CSF 2011, pp.191-204, 2011.
DOI : 10.1109/csf.2011.20

F. Biondi, Y. Kawamoto, A. Legay, and L. Traonouez, HyLeak: Hybrid Analysis Tool for Information Leakage, 15th International Symposium on Automated Technology for Verification and Analysis (ATVA'17), 2017.
DOI : 10.1007/978-3-319-47072-6_4

URL : https://hal.archives-ouvertes.fr/hal-01546817

M. Backes, B. Köpf, and A. Rybalchenko, Automatic Discovery and Quantification of Information Leaks, 2009 30th IEEE Symposium on Security and Privacy, pp.17-20, 2009.
DOI : 10.1109/SP.2009.18

URL : http://www7.in.tum.de/~rybal/papers/sp09-discovery-and-quantification-of-information-leaks.pdf

F. Biondi, A. Legay, P. Malacaria, and A. Wasowski, Quantifying information leakage of randomized protocols, Theoretical Computer Science, vol.597, pp.62-87, 2015.
DOI : 10.1016/j.tcs.2015.07.034

URL : https://hal.archives-ouvertes.fr/hal-01242614

F. Biondi, A. Legay, J. Biondi, and A. Legay, Comparative Analysis of Leakage Tools on Scalable Case Studies, Model Checking Software -22nd International Symposium Proceedings, volume 9232 of Lecture Notes in Computer Science, pp.263-281, 2015.
DOI : 10.1007/978-3-319-23404-5_17

URL : https://hal.archives-ouvertes.fr/hal-01241352

F. Biondi, A. Legay, L. Traonouez, and A. Wasowski, QUAIL: A Quantitative Security Analyzer for Imperative Code, Computer Aided Verification -25th International Conference, CAV 2013 Proceedings, pp.702-707, 2013.
DOI : 10.1007/978-3-642-39799-8_49

URL : https://hal.archives-ouvertes.fr/hal-01242615

M. Boreale, M. Paolini, and D. R. Brillinger, Some data analysis using mutual information Statistical measurement of information leakage, Information Security -17th International Conference Proceedings, volume 8783 of Lecture Notes in Computer ScienceCCG10] Konstantinos Chatzikokolakis, Tom Chothia, and Apratim Guha Tools and Algorithms for the Construction and Analysis of Systems, 16th International Conference, TACAS 2010, Held as Part of the Joint European Conferences on Theory and Practice of Software Proceedings, volume 6015 of Lecture Notes in Computer Science, pp.216-236163, 2004.

D. J. Chakraborty, K. S. Fremont, S. A. Meel, M. Y. Seshia, and . Vardi, On Parallel Scalable Uniform SAT Witness Generation, Tools and Algorithms for the Construction and Analysis of Systems - 21st International Conference, TACAS 2015, Held as Part of the European Joint Conferences on Theory and Practice of Software Proceedings, volume 9035 of Lecture Notes in Computer Science, pp.304-319, 2015.
DOI : 10.1007/978-3-662-46681-0_25

D. Chaum, The dining cryptographers problem: Unconditional sender and recipient untraceability, Journal of Cryptology, vol.1, issue.1, pp.65-75, 1988.
DOI : 10.1007/BF00206326

URL : http://www.cs.ucsb.edu/~ravenben/classes/595n-s07/papers/dcnet-jcrypt88.pdf

D. Clark, S. Hunt, and P. Malacaria, Quantitative Analysis of the Leakage of Confidential Data, Electronic Notes in Theoretical Computer Science, vol.59, issue.3, pp.238-251, 2001.
DOI : 10.1016/S1571-0661(04)00290-7

D. Clark, S. Hunt, and P. Malacaria, A static analysis for quantifying information flow in a simple imperative language, Journal of Computer Security, vol.15, issue.3, pp.321-371, 2007.
DOI : 10.3233/JCS-2007-15302

T. Chothia and Y. Kawamoto, Statistical estimation of min-entropy leakage, 2014.

T. Chothia, Y. Kawamoto, and C. Novakovic, A Tool for Estimating Information Leakage, Computer Aided Verification - 25th International Conference, CAV 2013 Proceedings, pp.690-695, 2013.
DOI : 10.1007/978-3-642-39799-8_47

URL : http://www.cs.bham.ac.uk/~tpc/Papers/CAV2013.pdf

T. Chothia, Y. Kawamoto, and C. Novakovic, LeakWatch: Estimating Information Leakage from Java Programs, Miroslaw Kutylowski and Jaideep Vaidya Computer Security -ESORICS 2014 -19th European Symposium on Research in Computer Security Proceedings, Part II, pp.219-236, 2014.
DOI : 10.1007/978-3-319-11212-1_13

URL : https://hal.archives-ouvertes.fr/hal-01097603

T. Chothia, Y. Kawamoto, C. Novakovic, and D. Parker, Probabilistic point-to-point information leakage Computing information flow using symbolic model-checking, 2013 IEEE 26th Computer Security Foundations Symposium 34th International Conference on Foundation of Software Technology and Theoretical Computer Science, FSTTCS 2014 Schloss Dagstuhl -Leibniz- Zentrum fuer Informatik, pp.193-205, 2013.
DOI : 10.1109/csf.2013.20

URL : http://www.cs.bham.ac.uk/~tpc/Papers/CSF2013.pdf

S. Chakraborty, K. S. Meel, and M. Y. Vardi, A Scalable Approximate Model Counter, Principles and Practice of Constraint Programming -19th International Conference ProceedingsCPP08] Konstantinos Chatzikokolakis, Catuscia Palamidessi, and Prakash Panangaden. Anonymity protocols as noisy channels, pp.200-2162, 2008.
DOI : 10.1007/978-3-642-40627-0_18

URL : http://arxiv.org/pdf/1306.5726.pdf

M. Thomas, J. A. Cover, and . Thomas, Elements of information theory A Wiley-Interscience publication, 2006.

E. M. Clarke and P. Zuliani, Statistical model checking for cyber-physical systems Automated Technology for Verification and Analysis, Tevfik Bultan and Pao-Ann Hsiung 9th International Symposium, ATVA 2011 Proceedings, pp.1-12, 2011.
DOI : 10.1007/978-3-642-24372-1_1

D. E. Denning, A lattice model of secure information flow, Communications of the ACM, vol.19, issue.5, pp.236-243, 1976.
DOI : 10.1145/360051.360056

B. Espinoza and G. Smith, Min-entropy as a resource, Pablo Suau, and Boyn Bonev. Information Theory in Computer Vision and Pattern Recognition, pp.57-75, 2009.
DOI : 10.1016/j.ic.2013.03.005

URL : https://doi.org/10.1016/j.ic.2013.03.005

J. Daniel, S. A. Fremont, and . Seshia, Speeding up smt-based quantitative program analysis, Philipp Rümmer and Christoph M

R. G. Gallager, Information Theory and Reliable Communication, 1968.
DOI : 10.1007/978-3-7091-2945-6

W. James and I. Gray, Toward a mathematical foundation for information flow security, IEEE Symposium on Security and Privacy, pp.21-35, 1991.

V. Finn and . Jensen, Introduction to Bayesian Networks, 1996.

B. Köpf and D. A. Basin, An information-theoretic model for adaptive side-channel attacks, Proceedings of the 14th ACM conference on Computer and communications security , CCS '07, pp.286-296, 2007.
DOI : 10.1145/1315245.1315282

Y. Kawamoto, F. Biondi, and A. Legay, Hybrid Statistical Estimation of Mutual Information for Quantifying Information Flow, FM 2016: Formal Methods -21st International Symposium Proceedings, volume 9995 of Lecture Notes in Computer Science, pp.406-425, 2016.
DOI : 10.1016/j.tcs.2013.07.031

URL : https://hal.archives-ouvertes.fr/hal-01378675

Y. Kawamoto, K. Chatzikokolakis, and C. Palamidessi, Compositionality Results for Quantitative Information Flow, Quantitative Evaluation of Systems -11th International Conference, QEST 2014 Proceedings, pp.368-383, 2014.
DOI : 10.1007/978-3-319-10696-0_28

URL : https://hal.archives-ouvertes.fr/hal-01006381

Y. Kawamoto, K. Chatzikokolakis, and C. Palamidessi, On the compositionality of quantitative information flow, Logical Methods in Computer Science, vol.13, issue.311, pp.1-31, 2017.
URL : https://hal.archives-ouvertes.fr/hal-01421424

Y. Kawamoto and T. Given-wilson, Quantitative Information Flow for Scheduler-Dependent Systems, Proceedings Thirteenth Workshop on Quantitative Aspects of Programming Languages and Systems, QAPL 2015, pp.11-12, 2015.
DOI : 10.1007/978-3-642-12002-2_5

URL : https://hal.archives-ouvertes.fr/hal-01114778

M. Gyung-kang, S. Mccamant, P. Poosankam, and D. Song, DTA++: dynamic taint analysis with targeted controlflow propagation, Proceedings of the Network and Distributed System Security Symposium, NDSS 2011, 2011.

B. Köpf and A. Rybalchenko, Approximation and Randomization for Quantitative Information-Flow Analysis, 2010 23rd IEEE Computer Security Foundations Symposium, pp.3-14, 2010.
DOI : 10.1109/CSF.2010.8

Z. Liu, Z. Chen, C. Fang, and Q. Shi, Hybrid test data generation, Companion Proceedings of the 36th International Conference on Software Engineering, ICSE Companion 2014, pp.630-631, 2014.
DOI : 10.1145/2591062.2591150

A. Legay, B. Delahaye, S. Barringer, Y. Falcone, B. Finkbeiner et al., Statistical Model Checking: An Overview, Runtime Verification -First International Conference Proceedings, pp.122-135, 2010.
DOI : 10.1016/j.ic.2006.05.002

URL : https://hal.archives-ouvertes.fr/inria-00591593

J. C. David and . Mackay, Information Theory, Inference & Learning Algorithms, 2002.

P. Malacaria, Assessing security threats of looping constructs, Proceedings of the 34th ACM SIGPLAN-SIGACT Symposium on Principles of Programming Languages, pp.225-235, 2007.

S. Mccamant and M. D. Ernst, Quantitative information flow as network flow capacity, Rajiv Gupta and Saman P

. Amarasinghe, [Mod89] R. Moddemeijer. On estimation of entropy and mutual information of continuous distributions, Proceedings of the ACM SIGPLAN 2008 Conference on Programming Language Design and Implementation, pp.193-205233, 1989.

R. Majumdar and K. Sen, Hybrid Concolic Testing, 29th International Conference on Software Engineering (ICSE'07), pp.416-426, 2007.
DOI : 10.1109/ICSE.2007.41

J. Newsome, S. Mccamant, and D. Song, Measuring channel capacity to distinguish undue influence, Proceedings of the ACM SIGPLAN Fourth Workshop on Programming Languages and Analysis for Security, PLAS '09, pp.15-21, 2009.
DOI : 10.1145/1554339.1554349

URL : http://bitblaze.cs.berkeley.edu/papers/influence_plas09.pdf

T. Parr, The Definitive ANTLR Reference: Building Domain Specific Languages, 2007.

S. Quoc, P. Phan, and . Malacaria, Abstract model counting: a novel approach for quantification of information leaks, 9th ACM Symposium on Information, Computer and Communications Security, ASIA CCS '14, pp.283-292, 2014.

Q. Phan, P. Malacaria, C. S. Pasareanu, and M. Amorim, Quantifying information leaks using reliability analysis, Proceedings of the 2014 International SPIN Symposium on Model Checking of Software, SPIN 2014, pp.105-108, 2012.
DOI : 10.1145/2632362.2632367

URL : http://www.eecs.qmul.ac.uk/%7Epm/spin14.pdf

G. Smith, On the Foundations of Quantitative Information Flow, Foundations of Software Science and Computational Structures, 12th International Conference Proceedings, pp.288-302, 2009.
DOI : 10.1137/060651380

C. G. Val, M. A. Enescu, S. Bayless, W. Aiello, and A. J. Hu, Precisely Measuring Quantitative Information Flow: 10K Lines of Code and Beyond, 2016 IEEE European Symposium on Security and Privacy (EuroS&P), pp.31-46, 2016.
DOI : 10.1109/EuroSP.2016.15

J. S. Vitter, Random sampling with a reservoir, ACM Transactions on Mathematical Software, vol.11, issue.1, pp.37-57, 1985.
DOI : 10.1145/3147.3165

URL : http://www.cs.umd.edu/~samir/498/vitter.pdf

A. Weigl, Efficient SAT-Based Pre-image Enumeration for Quantitative Information Flow in Programs, ProceedingsWil13] Mark M. Wilde. Quantum Information Theory, pp.51-58, 2013.
DOI : 10.1007/978-3-642-00596-1_21

H. Yasuoka and T. Terauchi, Quantitative information flow as safety and liveness hyperproperties, Theoretical Computer Science, vol.538, pp.167-182, 2014.
DOI : 10.1016/j.tcs.2013.07.031

URL : http://arxiv.org/abs/1207.0871