Information leakage games [Ada04] Christoph Adami Information theory in molecular biology Coupling and importance sampling for statistical model checking, 8th International Conference on Decision and Game Theory for Security Tools and Algorithms for the Construction and Analysis of Systems -18th International Conference, TACAS 2012, Held as Part of the European Joint Conferences on Theory and Practice of Software Proceedings, pp.3-22, 2004. ,
Information-theoretic bounds for differentially private mechanisms Cernay-la-Ville, Proceedings of the 24th IEEE Computer Security Foundations Symposium, CSF 2011, pp.191-204, 2011. ,
DOI : 10.1109/csf.2011.20
HyLeak: Hybrid Analysis Tool for Information Leakage, 15th International Symposium on Automated Technology for Verification and Analysis (ATVA'17), 2017. ,
DOI : 10.1007/978-3-319-47072-6_4
URL : https://hal.archives-ouvertes.fr/hal-01546817
Automatic Discovery and Quantification of Information Leaks, 2009 30th IEEE Symposium on Security and Privacy, pp.17-20, 2009. ,
DOI : 10.1109/SP.2009.18
URL : http://www7.in.tum.de/~rybal/papers/sp09-discovery-and-quantification-of-information-leaks.pdf
Quantifying information leakage of randomized protocols, Theoretical Computer Science, vol.597, pp.62-87, 2015. ,
DOI : 10.1016/j.tcs.2015.07.034
URL : https://hal.archives-ouvertes.fr/hal-01242614
Comparative Analysis of Leakage Tools on Scalable Case Studies, Model Checking Software -22nd International Symposium Proceedings, volume 9232 of Lecture Notes in Computer Science, pp.263-281, 2015. ,
DOI : 10.1007/978-3-319-23404-5_17
URL : https://hal.archives-ouvertes.fr/hal-01241352
QUAIL: A Quantitative Security Analyzer for Imperative Code, Computer Aided Verification -25th International Conference, CAV 2013 Proceedings, pp.702-707, 2013. ,
DOI : 10.1007/978-3-642-39799-8_49
URL : https://hal.archives-ouvertes.fr/hal-01242615
Some data analysis using mutual information Statistical measurement of information leakage, Information Security -17th International Conference Proceedings, volume 8783 of Lecture Notes in Computer ScienceCCG10] Konstantinos Chatzikokolakis, Tom Chothia, and Apratim Guha Tools and Algorithms for the Construction and Analysis of Systems, 16th International Conference, TACAS 2010, Held as Part of the Joint European Conferences on Theory and Practice of Software Proceedings, volume 6015 of Lecture Notes in Computer Science, pp.216-236163, 2004. ,
On Parallel Scalable Uniform SAT Witness Generation, Tools and Algorithms for the Construction and Analysis of Systems - 21st International Conference, TACAS 2015, Held as Part of the European Joint Conferences on Theory and Practice of Software Proceedings, volume 9035 of Lecture Notes in Computer Science, pp.304-319, 2015. ,
DOI : 10.1007/978-3-662-46681-0_25
The dining cryptographers problem: Unconditional sender and recipient untraceability, Journal of Cryptology, vol.1, issue.1, pp.65-75, 1988. ,
DOI : 10.1007/BF00206326
URL : http://www.cs.ucsb.edu/~ravenben/classes/595n-s07/papers/dcnet-jcrypt88.pdf
Quantitative Analysis of the Leakage of Confidential Data, Electronic Notes in Theoretical Computer Science, vol.59, issue.3, pp.238-251, 2001. ,
DOI : 10.1016/S1571-0661(04)00290-7
A static analysis for quantifying information flow in a simple imperative language, Journal of Computer Security, vol.15, issue.3, pp.321-371, 2007. ,
DOI : 10.3233/JCS-2007-15302
Statistical estimation of min-entropy leakage, 2014. ,
A Tool for Estimating Information Leakage, Computer Aided Verification - 25th International Conference, CAV 2013 Proceedings, pp.690-695, 2013. ,
DOI : 10.1007/978-3-642-39799-8_47
URL : http://www.cs.bham.ac.uk/~tpc/Papers/CAV2013.pdf
LeakWatch: Estimating Information Leakage from Java Programs, Miroslaw Kutylowski and Jaideep Vaidya Computer Security -ESORICS 2014 -19th European Symposium on Research in Computer Security Proceedings, Part II, pp.219-236, 2014. ,
DOI : 10.1007/978-3-319-11212-1_13
URL : https://hal.archives-ouvertes.fr/hal-01097603
Probabilistic point-to-point information leakage Computing information flow using symbolic model-checking, 2013 IEEE 26th Computer Security Foundations Symposium 34th International Conference on Foundation of Software Technology and Theoretical Computer Science, FSTTCS 2014 Schloss Dagstuhl -Leibniz- Zentrum fuer Informatik, pp.193-205, 2013. ,
DOI : 10.1109/csf.2013.20
URL : http://www.cs.bham.ac.uk/~tpc/Papers/CSF2013.pdf
A Scalable Approximate Model Counter, Principles and Practice of Constraint Programming -19th International Conference ProceedingsCPP08] Konstantinos Chatzikokolakis, Catuscia Palamidessi, and Prakash Panangaden. Anonymity protocols as noisy channels, pp.200-2162, 2008. ,
DOI : 10.1007/978-3-642-40627-0_18
URL : http://arxiv.org/pdf/1306.5726.pdf
Elements of information theory A Wiley-Interscience publication, 2006. ,
Statistical model checking for cyber-physical systems Automated Technology for Verification and Analysis, Tevfik Bultan and Pao-Ann Hsiung 9th International Symposium, ATVA 2011 Proceedings, pp.1-12, 2011. ,
DOI : 10.1007/978-3-642-24372-1_1
A lattice model of secure information flow, Communications of the ACM, vol.19, issue.5, pp.236-243, 1976. ,
DOI : 10.1145/360051.360056
Min-entropy as a resource, Pablo Suau, and Boyn Bonev. Information Theory in Computer Vision and Pattern Recognition, pp.57-75, 2009. ,
DOI : 10.1016/j.ic.2013.03.005
URL : https://doi.org/10.1016/j.ic.2013.03.005
Speeding up smt-based quantitative program analysis, Philipp Rümmer and Christoph M ,
Information Theory and Reliable Communication, 1968. ,
DOI : 10.1007/978-3-7091-2945-6
Toward a mathematical foundation for information flow security, IEEE Symposium on Security and Privacy, pp.21-35, 1991. ,
Introduction to Bayesian Networks, 1996. ,
An information-theoretic model for adaptive side-channel attacks, Proceedings of the 14th ACM conference on Computer and communications security , CCS '07, pp.286-296, 2007. ,
DOI : 10.1145/1315245.1315282
Hybrid Statistical Estimation of Mutual Information for Quantifying Information Flow, FM 2016: Formal Methods -21st International Symposium Proceedings, volume 9995 of Lecture Notes in Computer Science, pp.406-425, 2016. ,
DOI : 10.1016/j.tcs.2013.07.031
URL : https://hal.archives-ouvertes.fr/hal-01378675
Compositionality Results for Quantitative Information Flow, Quantitative Evaluation of Systems -11th International Conference, QEST 2014 Proceedings, pp.368-383, 2014. ,
DOI : 10.1007/978-3-319-10696-0_28
URL : https://hal.archives-ouvertes.fr/hal-01006381
On the compositionality of quantitative information flow, Logical Methods in Computer Science, vol.13, issue.311, pp.1-31, 2017. ,
URL : https://hal.archives-ouvertes.fr/hal-01421424
Quantitative Information Flow for Scheduler-Dependent Systems, Proceedings Thirteenth Workshop on Quantitative Aspects of Programming Languages and Systems, QAPL 2015, pp.11-12, 2015. ,
DOI : 10.1007/978-3-642-12002-2_5
URL : https://hal.archives-ouvertes.fr/hal-01114778
DTA++: dynamic taint analysis with targeted controlflow propagation, Proceedings of the Network and Distributed System Security Symposium, NDSS 2011, 2011. ,
Approximation and Randomization for Quantitative Information-Flow Analysis, 2010 23rd IEEE Computer Security Foundations Symposium, pp.3-14, 2010. ,
DOI : 10.1109/CSF.2010.8
Hybrid test data generation, Companion Proceedings of the 36th International Conference on Software Engineering, ICSE Companion 2014, pp.630-631, 2014. ,
DOI : 10.1145/2591062.2591150
Statistical Model Checking: An Overview, Runtime Verification -First International Conference Proceedings, pp.122-135, 2010. ,
DOI : 10.1016/j.ic.2006.05.002
URL : https://hal.archives-ouvertes.fr/inria-00591593
Information Theory, Inference & Learning Algorithms, 2002. ,
Assessing security threats of looping constructs, Proceedings of the 34th ACM SIGPLAN-SIGACT Symposium on Principles of Programming Languages, pp.225-235, 2007. ,
Quantitative information flow as network flow capacity, Rajiv Gupta and Saman P ,
[Mod89] R. Moddemeijer. On estimation of entropy and mutual information of continuous distributions, Proceedings of the ACM SIGPLAN 2008 Conference on Programming Language Design and Implementation, pp.193-205233, 1989. ,
Hybrid Concolic Testing, 29th International Conference on Software Engineering (ICSE'07), pp.416-426, 2007. ,
DOI : 10.1109/ICSE.2007.41
Measuring channel capacity to distinguish undue influence, Proceedings of the ACM SIGPLAN Fourth Workshop on Programming Languages and Analysis for Security, PLAS '09, pp.15-21, 2009. ,
DOI : 10.1145/1554339.1554349
URL : http://bitblaze.cs.berkeley.edu/papers/influence_plas09.pdf
The Definitive ANTLR Reference: Building Domain Specific Languages, 2007. ,
Abstract model counting: a novel approach for quantification of information leaks, 9th ACM Symposium on Information, Computer and Communications Security, ASIA CCS '14, pp.283-292, 2014. ,
Quantifying information leaks using reliability analysis, Proceedings of the 2014 International SPIN Symposium on Model Checking of Software, SPIN 2014, pp.105-108, 2012. ,
DOI : 10.1145/2632362.2632367
URL : http://www.eecs.qmul.ac.uk/%7Epm/spin14.pdf
On the Foundations of Quantitative Information Flow, Foundations of Software Science and Computational Structures, 12th International Conference Proceedings, pp.288-302, 2009. ,
DOI : 10.1137/060651380
Precisely Measuring Quantitative Information Flow: 10K Lines of Code and Beyond, 2016 IEEE European Symposium on Security and Privacy (EuroS&P), pp.31-46, 2016. ,
DOI : 10.1109/EuroSP.2016.15
Random sampling with a reservoir, ACM Transactions on Mathematical Software, vol.11, issue.1, pp.37-57, 1985. ,
DOI : 10.1145/3147.3165
URL : http://www.cs.umd.edu/~samir/498/vitter.pdf
Efficient SAT-Based Pre-image Enumeration for Quantitative Information Flow in Programs, ProceedingsWil13] Mark M. Wilde. Quantum Information Theory, pp.51-58, 2013. ,
DOI : 10.1007/978-3-642-00596-1_21
Quantitative information flow as safety and liveness hyperproperties, Theoretical Computer Science, vol.538, pp.167-182, 2014. ,
DOI : 10.1016/j.tcs.2013.07.031
URL : http://arxiv.org/abs/1207.0871