J. Agat, Transforming out timing leaks, Proceedings of the 27th ACM SIGPLAN-SIGACT symposium on Principles of programming languages, pp.40-53, 2000.

A. Fardan, N. J. Paterson, and K. G. , Lucky thirteen: Breaking the tls and dtls record protocols, Security and Privacy (SP), 2013 IEEE Symposium on, pp.526-540, 2013.

M. R. Albrecht and K. G. Paterson, Lucky microseconds: A timing attack on amazon's s2n implementation of tls, Annual International Conference on the Theory and Applications of Cryptographic Techniques, pp.622-643, 2016.

J. B. Almeida, M. Barbosa, G. Barthe, F. Dupressoir, and M. Emmi, Verifying constant-time implementations, 25th USENIX Security Symposium (USENIX Security 16), pp.53-70, 2016.

M. Barnett, B. Y. Chang, R. Deline, B. Jacobs, and K. R. Leino, Boogie: A modular reusable verifier for object-oriented programs, In: FMCO, vol.5, pp.364-387, 2005.

G. Barthe, G. Betarte, J. Campo, C. Luna, and D. Pichardie, System-level noninterference for constant-time cryptography, Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security, pp.1267-1279, 2014.
URL : https://hal.archives-ouvertes.fr/hal-01101950

G. Barthe, P. R. D'argenio, and T. Rezk, Secure information flow by self-composition, Computer Security Foundations Workshop, pp.100-114, 2004.

G. Barthe and T. Rezk, Secure information flow for a sequential java virtual machine, TLDI'05: Types in Language Design and Implementation, 2003.

G. Barthe, T. Rezk, and A. Basu, Security types preserving compilation, Systems & Structures, vol.33, issue.2, pp.35-59, 2007.

D. Bernstein, T. Lange, and P. Schwabe, The security impact of a new cryptographic library. Progress in Cryptology-LATINCRYPT, pp.159-176, 2012.

S. Blazy, D. Pichardie, and A. Trieu, Verifying constant-time implementations by abstract interpretation, European Symposium on Research in Computer Security, pp.260-277, 2017.
URL : https://hal.archives-ouvertes.fr/hal-02025047

D. Brumley and D. Boneh, Remote timing attacks are practical, Computer Networks, vol.48, issue.5, pp.701-716, 2005.

J. D. Choi, R. Cytron, and J. Ferrante, Automatic construction of sparse data flow evaluation graphs, Proceedings of the 18th ACM SIGPLAN-SIGACT Symposium on Principles of Programming Languages, vol.91, pp.55-66, 1991.

G. Doychev, B. Köpf, L. Mauborgne, and J. Reineke, Cacheaudit: A tool for the static analysis of cache side channels, ACM Trans. Inf. Syst. Secur, vol.18, issue.1, pp.1-4, 2015.

J. Ferrante, K. Ottenstein, and J. Warren, The program dependence graph and its use in optimization, TOPLAS, vol.9, issue.3, pp.319-349, 1987.

S. Genaim and F. Spoto, Information flow analysis for java bytecode, Verification, Model Checking, and Abstract Interpretation, pp.346-362, 2005.

D. Gullasch, E. Bangerter, and S. Krenn, Cache games-bringing access-based cache attacks on aes to practice, Security and Privacy (SP), 2011 IEEE Symposium on, pp.490-505, 2011.

D. Hedin and D. Sands, Timing aware information flow security for a javacardlike bytecode, Electronic Notes in Theoretical Computer Science, vol.141, issue.1, pp.163-182, 2005.

S. Hunt and D. Sands, Binding time analysis: A new perspective, Proceedings of the ACM Symposium on Partial Evaluation and Semantics-Based Program Manipulation (PEPM'91), pp.154-164, 1991.

S. Hunt and D. Sands, On flow-sensitive security types, ACM SIGPLAN Notices, vol.41, pp.79-90, 2006.

C. Lattner and V. Adve, Llvm: A compilation framework for lifelong program analysis & transformation, Proceedings of the International Symposium on Code Generation and Optimization: Feedback-directed and Runtime Optimization. CGO '04, 2004.

P. Li and S. Zdancewic, Downgrading policies and relaxed noninterference, Proceedings of POPL, vol.40, pp.158-170, 2005.

D. Molnar, M. Piotrowski, D. Schultz, and D. Wagner, The program counter security model: Automatic detection and removal of control-flow side channel attacks, In: ICISC, vol.3935, pp.156-168, 2005.

A. C. Myers, Jflow: Practical mostly-static information flow control, Proceedings of the 26th ACM SIGPLAN-SIGACT symposium on Principles of programming languages, pp.228-241, 1999.

B. Rodrigues, F. M. Quintão-pereira, and D. F. Aranha, Sparse representation of implicit flows with applications to side-channel detection, Proceedings of the 25th International Conference on Compiler Construction, pp.110-120, 2016.

A. Sabelfeld and A. C. Myers, Language-based information-flow security, IEEE Journal on selected areas in communications, vol.21, issue.1, pp.5-19, 2003.

A. Sabelfeld and D. Sands, Declassification: Dimensions and principles, Journal of Computer Security, vol.17, issue.5, pp.517-548, 2009.

N. Swamy, J. Chen, and R. Chugh, Enforcing stateful authorization and information flow policies in fine, pp.529-549, 2010.

J. A. Vaughan and S. Zdancewic, A cryptographic decentralized label model, Security and Privacy, 2007. SP'07. IEEE Symposium on, pp.192-206, 2007.

D. Volpano, C. Irvine, and G. Smith, A sound type system for secure flow analysis, Journal of computer security, vol.4, issue.2-3, pp.167-187, 1996.