M. Assaf, From Qualitative to Quantitative Program Analysis: Permissive Enforcement of Secure Information Flow, Rennes, vol.1, 2015.
URL : https://hal.archives-ouvertes.fr/tel-01184857

M. Assaf, J. Signoles, F. Tronel, and É. Totel, Program transformation for noninterference verication on programs with pointers, Security and Privacy Protection in Information Processing Systems, IFIP Advances in Information and Communication Technology, p.231244, 2013.

T. H. Austin and C. Flanagan, Ecient purely-dynamic information ow analysis, Proceedings of the ACM SIGPLAN Fourth Workshop on Programming Languages and Analysis for Security. pp. 113124. PLAS '09, 2009.
DOI : 10.1145/1667209.1667223

G. Barany, Hybrid information ow analysis for programs with arrays, Proceedings of the Fourth International Workshop on Verication and Program Transformation Electronic Proceedings in Theoretical Computer Science, p.523, 2016.
DOI : 10.4204/eptcs.216.1

URL : http://arxiv.org/pdf/1607.02225

D. J. Bernstein and T. Lange, Failures in NIST's ECC standards (2016), https

N. Bielova and T. Rezk, A taxonomy of information ow monitors, Principles of Security and Trust: 5th International Conference , POST 2016, Held as Part of the European Joint Conferences on Theory and Practice of Software Proceedings, p.4667, 2016.

S. Blazy, D. Bühler, and B. Yakobowski, Structuring Abstract Interpreters Through State and Value Abstractions, International Conference on Verication, Model Checking, and Abstract Interpretation (VMCAI'17), 2017.
DOI : 10.1007/978-3-642-31424-7_15

D. Ceara, L. Mounier, and M. L. Potet, Taint Dependency Sequences: A Characterization of Insecure Execution Paths Based on Input-Sensitive Cause Sequences, 2010 Third International Conference on Software Testing, Verification, and Validation Workshops, p.371380, 2010.
DOI : 10.1109/ICSTW.2010.28

D. E. Denning and P. J. Denning, Certication of programs for secure information ow, Commun. ACM, vol.20, issue.504513, 1977.

D. Genkin, L. Packmanov, I. Pipman, A. Shamir, and E. Tromer, Physical key extraction attacks on PCs, Communications of the ACM, vol.59, issue.6, p.7079, 2016.
DOI : 10.1007/978-3-662-43826-8_6

J. A. Goguen and J. Meseguer, Security Policies and Security Models, 1982 IEEE Symposium on Security and Privacy, 1982.
DOI : 10.1109/SP.1982.10014

D. Hedin, L. Bello, and A. Sabelfeld, Value-sensitive hybrid information ow control for a javascript-like language, Proceedings of the 2015 IEEE 28th Computer Security Foundations Symposium. pp. 351365. CSF '15, 2015.

D. Hedin, A. Birgisson, L. Bello, and A. Sabelfeld, Jsow: Tracking information ow in javascript and its apis, Proceedings of the 29th Annual ACM Symposium on Applied Computing. pp. 16631671. SAC '14, 2014.
DOI : 10.3233/jcs-160544

S. Hunt and D. Sands, On ow-sensitive security types, Conference Record of the 33rd ACM SIGPLAN-SIGACT Symposium on Principles of Programming Languages. pp. 7990. POPL '06, 2006.
DOI : 10.1145/1111320.1111045

URL : http://www.cs.chalmers.se/~dave/papers/Hunt-Sands-POPL06.pdf

C. Kerschbaumer, E. Hennigan, P. Larsen, S. Brunthaler, and M. Franz, Information ow tracking meets just-in-time compilation, ACM Trans. Archit. Code Optim, vol.10, issue.38, p.13825, 2013.
DOI : 10.1145/2541228.2555295

F. Kirchner, N. Kosmatov, V. Prevosto, J. Signoles, and B. Yakobowski, Frama-C: A software analysis perspective, Formal Aspects of Computing, vol.12, issue.1???2, pp.165-179, 2015.
DOI : 10.1007/11408901_21

N. Kosmatov and J. Signoles, A Lesson on Runtime Assertion Checking with Frama-C, International Conference on Runtime Verication, p.386399, 2013.
DOI : 10.1007/978-3-642-40787-1_29

L. Guernic, G. Banerjee, A. Jensen, T. Schmidt, and D. A. , Automata-based condentiality monitoring, Proceedings of the 11th Asian Computing Science Conference on Advances in Computer Science: Secure Software and Related Issues . ASIAN'06, 2007.

C. Percival, Cache missing for fun and prot, 2005.

A. Russo and A. Sabelfeld, Dynamic vs. static ow-sensitive security analysis, Computer Security Foundations Symposium (CSF), pp.23-186199, 2010.

Y. Smaragdakis and G. Balatsouras, Pointer Analysis, Foundations and Trends?? in Programming Languages, vol.2, issue.1, p.169, 2015.
DOI : 10.1561/2500000014

D. Volpano, C. Irvine, and G. Smith, A sound type system for secure ow analysis, J. Comput. Secur, vol.4, issue.2-3, p.167187, 1996.

K. Vorobyov, J. Signoles, and N. Kosmatov, Shadow State Encoding for Ecient Monitoring of Block-level Properties Submitted for publication

W. Xu, S. Bhatkar, and R. Sekar, Taint-enhanced policy enforcement: A practical approach to defeat a wide range of attacks, Proceedings of the 15th Conference on USENIX Security Symposium -Volume 15. USENIX-SS'06, USENIX Association, 2006.