. Transport-layer and . Security, TLS) and Datagram Transport Layer Security (DTLS) Heartbeat Extension. https://tools.ietf.org/html/rfc6520, pp.2017-2021

R. A. Aziz, G. Chu, C. J. Muise, and P. J. Stuckey, #?SAT: Projected model counting, Theory and Applications of Satisfiability Testing, SAT 2015, 18th International Conference Proceedings, pp.121-137, 2015.
DOI : 10.1007/978-3-319-24318-4_10

D. Babic, Satisfiability Suggested Format, p.15, 1993.

M. Backes, B. Köpf, and A. Rybalchenko, Automatic Discovery and Quantification of Information Leaks, 2009 30th IEEE Symposium on Security and Privacy, pp.17-20, 2009.
DOI : 10.1109/SP.2009.18

M. Bellare, O. Goldreich, and E. Petrank, Uniform generation of NP-witnesses using an NP-oracle. Information and Computation, pp.510-526, 2000.

F. Biondi, A. Legay, P. Malacaria, and A. Wasowski, Quantifying information leakage of randomized protocols, Verification, Model Checking, and Abstract Interpretation, 14th International Conference, VMCAI 2013. Proceedings, pp.68-87, 2013.
DOI : 10.1007/978-3-642-35873-9_7

URL : https://hal.archives-ouvertes.fr/hal-01242614

F. Biondi, A. Legay, and J. Quilbeuf, Comparative Analysis of Leakage Tools on Scalable Case Studies, Model Checking Software -22nd International Symposium Proceedings, pp.263-281, 2015.
DOI : 10.1007/978-3-319-23404-5_17

URL : https://hal.archives-ouvertes.fr/hal-01241352

F. Biondi, A. Legay, L. Traonouez, and A. Wasowski, QUAIL: A Quantitative Security Analyzer for Imperative Code, Computer Aided Verification -25th International Conference, CAV 2013. Proceedings, pp.702-707, 2013.
DOI : 10.1007/978-3-642-39799-8_49

URL : https://hal.archives-ouvertes.fr/hal-01242615

S. Chakraborty, K. S. Meel, and M. Y. Vardi, A Scalable Approximate Model Counter, Principles and Practice of Constraint Programming -19th International Conference Proceedings, pp.200-216, 2013.
DOI : 10.1007/978-3-642-40627-0_18

URL : http://arxiv.org/pdf/1306.5726.pdf

S. Chakraborty, K. S. Meel, and M. Y. Vardi, Algorithmic improvements in approximate counting for probabilistic inference: From linear to logarithmic SAT calls, Proceedings of the Twenty-Fifth International Joint Conference on Artificial Intelligence, pp.9-15, 2016.

D. Clark, S. Hunt, and P. Malacaria, Quantitative Analysis of the Leakage of Confidential Data, Electronic Notes in Theoretical Computer Science, vol.59, issue.3, pp.238-251, 2001.
DOI : 10.1016/S1571-0661(04)00290-7

E. M. Clarke, O. Grumberg, and D. A. , Peled. Model checking, 2001.

E. M. Clarke, D. Kroening, and F. Lerda, A Tool for Checking ANSI-C Programs, Proceedings of the 10th International Conference on Tools and Algorithms for the Construction and Analysis of Systems, pp.168-176, 2004.
DOI : 10.1007/978-3-540-24730-2_15

T. M. Cover and J. A. Thomas, Elements of Information Theory, 1991.
DOI : 10.1002/047174882x

D. E. Denning, Cryptography and Data Security, 1982.

Z. Durumeric, J. Kasten, D. Adrian, J. A. Halderman, M. Bailey et al., The Matter of Heartbleed, Proceedings of the 2014 Conference on Internet Measurement Conference, IMC '14, pp.475-488, 2014.
DOI : 10.1145/2663716.2663755

R. M. Karp, M. Luby, and N. Madras, Monte-Carlo approximation algorithms for enumeration problems, Journal of Algorithms, vol.10, issue.3, pp.429-448, 1989.
DOI : 10.1016/0196-6774(89)90038-2

V. Klebanov, N. Manthey, and C. J. Muise, SAT-Based Analysis and Quantification of Information Flow in Programs, Quantitative Evaluation of Systems -10th International Conference, QEST 2013. Proceedings, pp.177-192, 2013.
DOI : 10.1007/978-3-642-40196-1_16

V. Klebanov, A. Weigl, and J. Weisbarth, Sound Probabilistic #SAT with Projection, Proceedings 14th International Workshop Quantitative Aspects of Programming Languages and Systems, QAPL 2016, pp.15-29, 2016.
DOI : 10.1007/11499107_24

URL : http://arxiv.org/pdf/1610.08167

P. Malacaria, M. Tautchning, and D. Distefano, Information Leakage Analysis of Complex C Code and Its application to OpenSSL, Leveraging Applications of Formal Methods, Verification and Validation: Foundational Techniques -7th International Symposium Proceedings, Part I, pp.909-925, 2016.
DOI : 10.1145/2663716.2663758

S. Mccamant and M. D. Ernst, Quantitative information flow as network flow capacity, Proceedings of the ACM SIGPLAN 2008 Conference on Programming Language Design and Implementation, PLDI 2008, pp.193-205, 2008.

Z. Meng and G. Smith, Calculating bounds on information leakage using two-bit patterns, Proceedings of the ACM SIGPLAN 6th Workshop on Programming Languages and Analysis for Security, PLAS '11, p.1, 2011.
DOI : 10.1145/2166956.2166957

URL : http://users.cis.fiu.edu/~smithg/papers/plas11.pdf

J. Newsome, S. Mccamant, and D. Song, Measuring channel capacity to distinguish undue influence, Proceedings of the ACM SIGPLAN Fourth Workshop on Programming Languages and Analysis for Security, PLAS '09, pp.15-21, 2009.
DOI : 10.1145/1554339.1554349

URL : http://bitblaze.cs.berkeley.edu/papers/influence_plas09.pdf

Q. Phan and P. Malacaria, Abstract model counting, Proceedings of the 9th ACM symposium on Information, computer and communications security, ASIA CCS '14, pp.283-292, 2014.
DOI : 10.1145/2590296.2590328

J. P. Schmidt, A. Siegel, and A. Srinivasan, Chernoff???Hoeffding Bounds for Applications with Limited Independence, Proceedings of the Fourth Annual ACM/SIGACT-SIAM Symposium on Discrete Algorithms, pp.25-27, 1993.
DOI : 10.1137/S089548019223872X

M. Soos, K. Nohl, and C. Castelluccia, Extending SAT Solvers to Cryptographic Problems, Theory and Applications of Satisfiability Testing -SAT 2009, 12th International Conference, SAT 2009 Proceedings, pp.244-257, 2009.
DOI : 10.1007/s10817-007-9074-1

URL : http://www.inrialpes.fr/planete/people/ccastel/PAPERS/SAT09.pdf

C. G. Val, M. A. Enescu, S. Bayless, W. Aiello, and A. J. Hu, Precisely Measuring Quantitative Information Flow: 10K Lines of Code and Beyond, 2016 IEEE European Symposium on Security and Privacy (EuroS&P), pp.31-46, 2016.
DOI : 10.1109/EuroSP.2016.15

L. G. Valiant, The Complexity of Enumeration and Reliability Problems, SIAM Journal on Computing, vol.8, issue.3, pp.410-421, 1979.
DOI : 10.1137/0208032

J. Wang, M. Zhao, Q. Zeng, D. Wu, and P. Liu, Risk assessment of buffer "Heartbleed" over-read vulnerabilities, 45th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, pp.555-562, 2015.
DOI : 10.1109/dsn.2015.59

D. A. Wheeler, How to prevent the next Heartbleed, pp.2017-2021