S. Mário, K. Alvim, Y. Chatzikokolakis, C. Kawamoto, and . Palamidessi, Information leakage games, 8th International Conference on Decision and Game Theory for Security, vol.10575, 2017.

S. Mário, K. Alvim, Y. Chatzikokolakis, C. Kawamoto, and . Palamidessi, A Game-Theoretic Approach to Information-Flow Control via Protocol Composition, Entropy, vol.20, pp.1-43, 2018.

C. Adami, Information theory in molecular biology, Physics of Life Reviews, vol.1, issue.1, pp.3-22, 2004.

O. Bouissou, E. Goubault, S. Putot, A. Chakarov, and S. Sankaranarayanan, Uncertainty propagation using probabilistic affine forms and concentration of measure inequalities, Tools and Algorithms for the Construction and Analysis of Systems-22nd International Conference, TACAS 2016, Held as Part of the European Joint Conferences on Theory and Practice of Software, vol.9636, pp.225-243, 2016.
URL : https://hal.archives-ouvertes.fr/cea-01834974

B. Barbot, S. Haddad, and C. Picaronny, Coupling and importance sampling for statistical model checking, Tools and Algorithms for the Construction and Analysis of Systems-18th International Conference, TACAS 2012, Held as Part of the European Joint Conferences on Theory and Practice of Software, ETAPS 2012, vol.7214, pp.331-346, 2012.
URL : https://hal.archives-ouvertes.fr/hal-00776795

G. Barthe and B. Köpf, Information-theoretic bounds for differentially private mechanisms, Proceedings of the 24th IEEE Computer Security Foundations Symposium, CSF 2011, pp.191-204, 2011.

F. Biondi and Y. Kawamoto,

F. Biondi, Y. Kawamoto, A. Legay, and L. Traonouez,

F. Biondi, Y. Kawamoto, A. Legay, and L. Traonouez, Hyleak: Hybrid analysis tool for information leakage, 15th International Symposium on Automated Technology for Verification and Analysis (ATVA'17), vol.10482, 2017.
URL : https://hal.archives-ouvertes.fr/hal-01546817

M. Backes, B. Köpf, and A. Rybalchenko, Automatic discovery and quantification of information leaks, 30th IEEE Symposium on Security and Privacy, pp.141-153, 2009.

F. Biondi, A. Legay, P. Malacaria, and A. Wasowski, Quantifying information leakage of randomized protocols, Theor. Comput. Sci, vol.597, pp.62-87, 2015.
URL : https://hal.archives-ouvertes.fr/hal-01242614

F. Biondi, A. Legay, and J. Quilbeuf, Comparative analysis of leakage tools on scalable case studies, Model Checking Software-22nd International Symposium, vol.9232, pp.263-281, 2015.
URL : https://hal.archives-ouvertes.fr/hal-01241352

F. Biondi, A. Legay, L. Traonouez, and A. Wasowski,

F. Biondi, A. Legay, L. Traonouez, and A. Wasowski, QUAIL: A quantitative security analyzer for imperative code, Computer Aided Verification-25th International Conference, CAV 2013, vol.8044, pp.702-707, 2013.
URL : https://hal.archives-ouvertes.fr/hal-01242615

M. Boreale and M. Paolini, On formally bounding information leakage by statistical estimation, Information Security-17th International Conference, vol.8783, pp.216-236, 2014.

D. R. Brillinger, Some data analysis using mutual information, Brazilian Journal of Probability and Statistics, vol.18, issue.6, pp.163-183, 2004.

K. Chatzikokolakis, T. Chothia, and A. Guha, On parallel scalable uniform SAT witness generation, Tools and Algorithms for the Construction and Analysis of Systems, 16th International Conference, TACAS 2010, Held as Part of the Joint European Conferences on Theory and Practice of Software, vol.6015, pp.304-319, 2010.

D. Chaum, The dining cryptographers problem: Unconditional sender and recipient untraceability, Journal of Cryptology, vol.1, pp.65-75, 1988.

D. Clark, S. Hunt, and P. Malacaria, Quantitative analysis of the leakage of confidential data, Electr. Notes Theor. Comput. Sci, vol.59, issue.3, pp.238-251, 2001.

D. Clark, S. Hunt, and P. Malacaria, A static analysis for quantifying information flow in a simple imperative language, Journal of Computer Security, vol.15, issue.3, pp.321-371, 2007.

T. Chothia and Y. Kawamoto, Statistical estimation of min-entropy leakage, 2014.

T. Chothia, Y. Kawamoto, and C. Novakovic,

T. Chothia, Y. Kawamoto, C. Novakovic, and . Leakwatch,

T. Chothia, Y. Kawamoto, and C. Novakovic, A tool for estimating information leakage, Computer Aided Verification-25th International Conference, CAV 2013, vol.8044, pp.690-695, 2013.

T. Chothia, Y. Kawamoto, and C. Novakovic, Leakwatch: Estimating information leakage from java programs, Computer Security-ESORICS 2014-19th European Symposium on Research in Computer Security, Wroclaw, Poland, vol.8713, pp.219-236, 2014.
URL : https://hal.archives-ouvertes.fr/hal-01097603

T. Chothia, Y. Kawamoto, C. Novakovic, and D. Parker, Probabilistic point-to-point information leakage, 2013 IEEE 26th Computer Security Foundations Symposium, pp.193-205, 2013.

R. Chadha, U. Mathur, and S. Schwoon, Computing information flow using symbolic model-checking, 34th International Conference on Foundation of Software Technology and Theoretical Computer Science, FSTTCS 2014, vol.29, pp.505-516, 2014.
URL : https://hal.archives-ouvertes.fr/hal-01110118

S. Chakraborty, K. S. Meel, and M. Y. Vardi, A scalable approximate model counter, Principles and Practice of Constraint Programming-19th International Conference, vol.8124, pp.200-216, 2013.

K. Chatzikokolakis, C. Palamidessi, and P. Panangaden, Anonymity protocols as noisy channels, Inf. Comput, vol.206, issue.2-4, pp.378-401, 2008.
URL : https://hal.archives-ouvertes.fr/inria-00201110

R. Michael, F. B. Clarkson, and . Schneider, Hyperproperties. Journal of Computer Security, vol.18, issue.6, pp.1157-1210, 2010.

M. Thomas, J. A. Cover, and . Thomas, Elements of information theory (2. ed.). A Wiley-Interscience publication, 2006.

E. M. Clarke and P. Zuliani, Statistical model checking for cyber-physical systems, Automated Technology for Verification and Analysis, 9th International Symposium, vol.6996, pp.1-12, 2011.

D. E. Denning, A lattice model of secure information flow, Commun. ACM, vol.19, issue.5, pp.236-243, 1976.

B. Espinoza and G. Smith, Min-entropy as a resource, Inf. Comput, vol.226, pp.57-75, 2013.

F. Escolano, P. Suau, and B. Bonev, Information Theory in Computer Vision and Pattern Recognition, 2009.

J. Daniel, S. A. Fremont, and . Seshia, Speeding up smt-based quantitative program analysis, Proceedings of the 12th International Workshop on Satisfiability Modulo Theories, SMT 2014, affiliated with the 26th International Conference on Computer Aided Verification (CAV 2014), the 7th International Joint Conference on Automated Reasoning (IJCAR 2014), and the 17th International Conference on Theory and Applications of Satisfiability Testing (SAT 2014), vol.1163, pp.3-13, 2014.

R. G. Gallager, Information Theory and Reliable Communication, 1968.

J. W. Gray and I. , Toward a mathematical foundation for information flow security, IEEE Symposium on Security and Privacy, pp.21-35, 1991.

V. Finn and . Jensen, Introduction to Bayesian Networks, 1996.

B. Köpf and D. A. Basin, An information-theoretic model for adaptive side-channel attacks, Proceedings of the 2007 ACM Conference on Computer and Communications Security, pp.286-296, 2007.

Y. Kawamoto, F. Biondi, and A. Legay, Hybrid statistical estimation of mutual information for quantifying information flow, FM 2016: Formal Methods-21st International Symposium, vol.9995, pp.406-425, 2016.
URL : https://hal.archives-ouvertes.fr/hal-01378675

Y. Kawamoto, K. Chatzikokolakis, and C. Palamidessi, Compositionality results for quantitative information flow, Quantitative Evaluation of Systems-11th International Conference, vol.8657, pp.368-383, 2014.
URL : https://hal.archives-ouvertes.fr/hal-01006381

Y. Kawamoto, K. Chatzikokolakis, and C. Palamidessi, On the compositionality of quantitative information flow, Logical Methods in Computer Science, vol.13, issue.11, pp.1-31, 2017.
DOI : 10.1007/978-3-319-10696-0_28

URL : https://hal.archives-ouvertes.fr/hal-01421424

Y. Kawamoto and T. Given-wilson, Quantitative information flow for scheduler-dependent systems, Proceedings Thirteenth Workshop on Quantitative Aspects of Programming Languages and Systems, vol.194, pp.48-62, 2015.
DOI : 10.4204/eptcs.194.4

URL : https://hal.archives-ouvertes.fr/hal-01114778

M. G. Kang, S. Mccamant, P. Poosankam, and D. Song, DTA++: dynamic taint analysis with targeted controlflow propagation, Proceedings of the Network and Distributed System Security Symposium, 2011.

B. Köpf and A. Rybalchenko, Approximation and randomization for quantitative information-flow analysis, Proceedings of the 23rd IEEE Computer Security Foundations Symposium, CSF 2010, pp.3-14, 2010.

Z. Liu, Z. Chen, C. Fang, and Q. Shi, Hybrid test data generation, 36th International Conference on Software Engineering, ICSE '14, Companion Proceedings, pp.630-631, 2014.
DOI : 10.1145/2591062.2591150

A. Legay, B. Delahaye, and S. Bensalem, Statistical model checking: An overview, Runtime Verification-First International Conference, RV 2010, St. Julians, Malta, vol.6418, pp.122-135, 2010.
DOI : 10.1007/978-3-642-16612-9_11

URL : https://hal.archives-ouvertes.fr/inria-00591593

J. C. David and . Mackay, Information Theory, Inference & Learning Algorithms, 2002.

P. Malacaria, Assessing security threats of looping constructs, Proceedings of the 34th ACM SIGPLAN-SIGACT Symposium on Principles of Programming Languages, pp.225-235, 2007.
DOI : 10.1145/1190215.1190251

S. Mccamant and M. D. Ernst, Quantitative information flow as network flow capacity

. Amarasinghe, Proceedings of the ACM SIGPLAN 2008 Conference on Programming Language Design and Implementation, pp.193-205, 2008.

P. Malacaria, M. H. Khouzani, C. S. Pasareanu, Q. Phan, and K. Luckow, Symbolic side-channel analysis for probabilistic programs, Proceedings of the 31st IEEE Computer Security Foundations Symposium, 2018.
DOI : 10.1109/csf.2018.00030

R. Moddemeijer, On estimation of entropy and mutual information of continuous distributions, Signal Processing, vol.16, pp.233-248, 1989.
DOI : 10.1016/0165-1684(89)90132-1

URL : https://ris.utwente.nl/ws/files/6737096/Moddemeijer89on.pdf

R. Majumdar and K. Sen, Hybrid concolic testing, 29th International Conference on Software Engineering, pp.416-426, 2007.
DOI : 10.1109/icse.2007.41

J. Newsome, S. Mccamant, and D. Song, Measuring channel capacity to distinguish undue influence, Proceedings of the 2009 Workshop on Programming Languages and Analysis for Security, pp.73-85, 2009.
DOI : 10.1145/1554339.1554349

URL : http://nma.berkeley.edu/ark:/28722/bk0004c427g

T. Parr, The Definitive ANTLR Reference: Building Domain Specific Languages, 2007.

S. Quoc, P. Phan, and . Malacaria, Abstract model counting: a novel approach for quantification of information leaks, 9th ACM Symposium on Information, Computer and Communications Security, ASIA CCS '14, pp.283-292, 2014.

Q. Phan, P. Malacaria, C. S. Pasareanu, and M. Amorim, Quantifying information leaks using reliability analysis, 2014 International Symposium on Model Checking of Software, SPIN 2014, Proceedings, pp.105-108, 2014.
DOI : 10.1145/2632362.2632367

URL : http://qmro.qmul.ac.uk/xmlui/bitstream/123456789/6119/11/PHANQuantifyingInformation2014Submitted.pdf

Q. Phan, P. Malacaria, O. Tkachuk, and C. S. Pasareanu, Symbolic quantitative information flow, ACM SIGSOFT Software Engineering Notes, vol.37, issue.6, pp.1-5, 2012.
DOI : 10.1145/2382756.2382791

URL : http://www.eecs.qmul.ac.uk/%7Eqsp30/papers/paper1.pdf

G. Smith, On the foundations of quantitative information flow, FOSSACS 2009, Held as Part of the Joint European Conferences on Theory Fabrizio Biondi, Yusuke Kawamoto, Axel Legay, Louis-Marie Traonouez and Practice of Software, vol.5504, pp.288-302, 2009.

I. Sweet, J. Manuel-calderón, C. Trilla, M. Scherrer, S. Hicks et al., What's the over/under? probabilistic bounds on information leakage, Principles of Security and Trust-7th International Conference, POST 2018, Held as Part of the European Joint Conferences on Theory and Practice of Software, vol.10804, pp.3-27, 2018.
DOI : 10.1007/978-3-319-89722-6_1

URL : https://link.springer.com/content/pdf/10.1007%2F978-3-319-89722-6_1.pdf

C. G. Val, M. A. Enescu, S. Bayless, W. Aiello, and A. J. Hu, Precisely measuring quantitative information flow: 10k lines of code and beyond, IEEE European Symposium on Security and Privacy, pp.31-46, 2016.
DOI : 10.1109/eurosp.2016.15

J. S. Vitter, Random sampling with a reservoir, ACM Trans. Math. Softw, vol.11, issue.1, pp.37-57, 1985.
DOI : 10.1145/3147.3165

URL : http://www.cs.umd.edu/~samir/498/vitter.pdf

A. Weigl, Efficient sat-based pre-image enumeration for quantitative information flow in programs, Data Privacy Management and Security Assurance-11th International Workshop, DPM 2016 and 5th International Workshop, QASA 2016, vol.9963, pp.51-58, 2016.
DOI : 10.1007/978-3-319-47072-6_4

M. Mark and . Wilde, Quantum Information Theory, 2013.

H. Yasuoka and T. Terauchi, Quantitative information flow as safety and liveness hyperproperties, Theor. Comput. Sci, vol.538, pp.167-182, 2014.
DOI : 10.4204/eptcs.85.6

URL : http://arxiv.org/pdf/1207.0871