Reachability problems for Markov chains, Information Processing Letters, vol.115, issue.2, 2013. ,
DOI : 10.1016/j.ipl.2014.08.013
Information flow in interactive systems, Lecture Notes in Computer Science, vol.6269, pp.102-116, 2010. ,
Quantitative information flow in interactive systems, Journal of Computer Security, vol.20, issue.1, pp.3-50, 2012. ,
Measuring information leakage using generalized gain functions, pp.265-279, 2012. ,
Simulation-Based Computation of Information Rates for Channels With Memory, IEEE Transactions on Information Theory, vol.52, issue.8, pp.523498-3508, 2006. ,
DOI : 10.1109/TIT.2006.878110
Automatic Discovery and Quantification of Information Leaks, 2009 30th IEEE Symposium on Security and Privacy, 2009. ,
DOI : 10.1109/SP.2009.18
Mutual information rate and bounds for it, PLoS ONE, vol.7, issue.10, pp.46745-2012 ,
Secure information flow by self-composition, CSFW, pp.100-114, 2004. ,
Introduction To Probability Quantifying information leakage of randomized protocols, Athena Scientific books. Athena Scientific Lecture Notes in Computer Science, vol.7737, pp.68-87, 2002. ,
Maximizing entropy over Markov processes, 24nd Nordic Workshop on Programming Theory -NWPT, 2012. ,
URL : https://hal.archives-ouvertes.fr/hal-01242613
Maximizing Entropy over Markov Processes, LATA, pp.128-140, 2013. ,
DOI : 10.1007/978-3-642-37064-9_13
URL : https://hal.archives-ouvertes.fr/hal-01242613
Maximizing entropy over Markov processes, Journal of Logic and Algebraic Programming ,
URL : https://hal.archives-ouvertes.fr/hal-01242613
QUAIL: A Quantitative Security Analyzer for Imperative Code, Sharygina and Veith [83], pp.702-707 ,
DOI : 10.1007/978-3-642-39799-8_49
URL : https://hal.archives-ouvertes.fr/hal-01242615
Quantifying information leakage in process calculi, Information and Computation, vol.207, issue.6, pp.699-725, 2009. ,
DOI : 10.1016/j.ic.2008.12.007
Quantitative Multirun Security under Active Adversaries, 2012 Ninth International Conference on Quantitative Evaluation of Systems, pp.158-167, 2012. ,
DOI : 10.1109/QEST.2012.31
Asymptotic Information Leakage under One-Try Attacks, Lecture Notes in Computer Science, vol.6604, pp.396-410, 2011. ,
DOI : 10.1007/978-3-642-19805-2_27
Quantitative Notions of Leakage for One-try Attacks, Electronic Notes in Theoretical Computer Science, vol.249, pp.75-91, 2009. ,
DOI : 10.1016/j.entcs.2009.07.085
URL : https://hal.archives-ouvertes.fr/inria-00424852
Remote timing attacks are practical, Computer Networks, vol.48, issue.5, pp.701-716, 2005. ,
DOI : 10.1016/j.comnet.2005.01.010
Model-Checking ??-Regular Properties of Interval Markov Chains, Lecture Notes in Computer Science, vol.4962, pp.302-317 ,
DOI : 10.1007/978-3-540-78499-9_22
Statistical Measurement of Information Leakage, Lecture Notes in Computer Science, vol.6015, pp.390-404 ,
DOI : 10.1007/978-3-642-12002-2_33
Anonymity protocols as noisy channels, Information and Computation, vol.206, issue.2-4, pp.378-401, 2008. ,
DOI : 10.1016/j.ic.2007.07.003
URL : https://hal.archives-ouvertes.fr/inria-00349225
On the Bayes risk in information-hiding protocols, Journal of Computer Security, vol.16, issue.5, pp.531-571, 2008. ,
DOI : 10.3233/JCS-2008-0333
URL : https://hal.archives-ouvertes.fr/inria-00349224
The dining cryptographers problem: Unconditional sender and recipient untraceability, Journal of Cryptology, vol.1, issue.1, pp.65-75, 1988. ,
DOI : 10.1007/BF00206326
The Optimum Leakage Principle for Analyzing Multi-threaded Programs, Lecture Notes in Computer Science, vol.5973, pp.177-193, 2009. ,
DOI : 10.1007/978-3-642-14496-7_15
Quantifying maximal loss of anonymity in protocols, Proceedings of the 4th International Symposium on Information, Computer, and Communications Security, ASIACCS '09, pp.206-217, 2009. ,
DOI : 10.1145/1533057.1533087
Studying Maximum Information Leakage Using Karush-Kuhn-Tucker Conditions, Electronic Proceedings in Theoretical Computer Science, vol.7, pp.1-15, 2009. ,
DOI : 10.4204/EPTCS.7.1
A Statistical Test for Information Leaks Using Continuous Mutual Information, 2011 IEEE 24th Computer Security Foundations Symposium, pp.177-190, 2011. ,
DOI : 10.1109/CSF.2011.19
A Tool for Estimating Information Leakage, Sharygina and Veith [83], pp.690-695 ,
DOI : 10.1007/978-3-642-39799-8_47
Probabilistic Point-to-Point Information Leakage, 2013 IEEE 26th Computer Security Foundations Symposium, pp.193-205, 2013. ,
DOI : 10.1109/CSF.2013.20
Quantitative Analysis of the Leakage of Confidential Data, Electronic Notes in Theoretical Computer Science, vol.59, issue.3, pp.238-251, 2001. ,
DOI : 10.1016/S1571-0661(04)00290-7
A static analysis for quantifying information flow in a simple imperative language, Journal of Computer Security, vol.15, issue.3, pp.321-371, 2007. ,
DOI : 10.3233/JCS-2007-15302
Quantifying information flow with beliefs, Journal of Computer Security, vol.17, issue.5, pp.655-701, 2009. ,
Elements of Information Theory, 2012. ,
Mixminion: design of a type III anonymous remailer protocol, Proceedings 19th International Conference on Data Engineering (Cat. No.03CH37405), pp.2-15, 2003. ,
DOI : 10.1109/SECPRI.2003.1199323
A lattice model of secure information flow, Communications of the ACM, vol.19, issue.5, pp.236-243, 1976. ,
DOI : 10.1145/360051.360056
Cryptography and Data Security, 1982. ,
Tor: The secondgeneration onion router, USENIX Security Symposium, pp.303-320, 2004. ,
Min-entropy as a resource Skolem's problem -on the border between decidability and undecidability, Inf. Comput, vol.22642, pp.57-75, 2005. ,
The WEKA data mining software, ACM SIGKDD Explorations Newsletter, vol.11, issue.1, pp.10-18, 2009. ,
DOI : 10.1145/1656274.1656278
Probability of error, equivocation, and the chernoff bound, IEEE Transactions on Information Theory, vol.16, issue.4, pp.368-372, 1970. ,
Quantifying information leaks in software, Proceedings of the 26th Annual Computer Security Applications Conference on, ACSAC '10, pp.261-269, 2010. ,
DOI : 10.1145/1920261.1920300
Belief semantics of authorization logic. CoRR, abs, 1302. ,
Toward a mathematical foundation for information flow security, IEEE Symposium on Security and Privacy, pp.21-35, 1991. ,
Probability Theory: The Logic of Science, 2003. ,
APEX: An Analyzer for Open Probabilistic Programs, Proc. CAV'12, 2012. ,
DOI : 10.1007/978-3-642-31424-7_51
Timing attacks on implementations of diffie-hellman, rsa, dss, and other systems, Lecture Notes in Computer Science, vol.1109, pp.104-113, 1996. ,
Introduction to differential power analysis, J. Cryptographic Engineering, vol.1, issue.1, pp.5-27, 2011. ,
Automatically deriving information-theoretic bounds for adaptive side-channel attacks, Journal of Computer Security, vol.19, issue.1, pp.1-31, 2011. ,
DOI : 10.3233/JCS-2009-0397
Automatic Quantification of Cache Side-Channels, Lecture Notes in Computer Science, vol.7358, pp.564-580, 2012. ,
DOI : 10.1007/978-3-642-31424-7_40
Vulnerability Bounds and Leakage Resilience of Blinded Cryptography under Timing Attacks, 2010 23rd IEEE Computer Security Foundations Symposium, pp.44-56 ,
DOI : 10.1109/CSF.2010.11
Interval-valued finite Markov chains, Reliable Computing, vol.8, issue.2, pp.97-113, 2002. ,
DOI : 10.1023/A:1014745904458
PRISM 4.0: Verification of Probabilistic Real-Time Systems, Proc. CAV'11, 2011. ,
DOI : 10.1007/3-540-45657-0_17
URL : https://hal.archives-ouvertes.fr/hal-00648035
A lattice of information, [1993] Proceedings Computer Security Foundations Workshop VI, pp.65-70, 1993. ,
DOI : 10.1109/CSFW.1993.246638
A framework for extracting semantic guarantees from privacy. CoRR, abs, 1208. ,
Information preservation in statistical privacy and bayesian estimation of unattributed histograms, Proceedings of the 2013 international conference on Management of data, SIGMOD '13, pp.677-688, 2013. ,
DOI : 10.1145/2463676.2463721
Assessing security threats of looping constructs, POPL, pp.225-235, 2007. ,
Algebraic foundations for information theoretical, probabilistic and guessability measures of information flow. CoRR, abs/1101, 2011. ,
Lagrange multipliers and maximum information leakage in different observational models, Proceedings of the third ACM SIGPLAN workshop on Programming languages and analysis for security , PLAS '08, pp.135-146, 2008. ,
DOI : 10.1145/1375696.1375713
Information Theory and Security: Quantitative Information Flow, Lecture Notes in Computer Science, vol.37, issue.3, pp.87-134, 2010. ,
DOI : 10.1007/11547662_24
Authentication theory and hypothesis testing, IEEE Transactions on Information Theory, vol.46, issue.4, pp.1350-1356, 2000. ,
Quantitative information flow as network flow capacity, 2008. ,
Security models and information flow, Proceedings. 1990 IEEE Computer Society Symposium on Research in Security and Privacy, pp.180-189, 1990. ,
DOI : 10.1109/RISP.1990.63849
Markov Chains and Stochastic Stability. Cambridge Mathematical Library, 2009. ,
Physically Observable Cryptography, Lecture Notes in Computer Science, vol.2951, pp.278-296, 2004. ,
DOI : 10.1007/978-3-540-24638-1_16
Covert Channel Capacity, 1987 IEEE Symposium on Security and Privacy, pp.60-66, 1987. ,
DOI : 10.1109/SP.1987.10013
A Tool: Quantitative Analyser for Programs, 2011 Eighth International Conference on Quantitative Evaluation of SysTems ,
DOI : 10.1109/QEST.2011.25
Measuring channel capacity to distinguish undue influence, Proceedings of the ACM SIGPLAN Fourth Workshop on Programming Languages and Analysis for Security, PLAS '09, 2009. ,
DOI : 10.1145/1554339.1554349
Information-flow security for interactive programs, CSFW, pp.190-201, 2006. ,
Decision Problems for Linear Recurrence Sequences, Lecture Notes in Computer Science, vol.8070, p.2, 2013. ,
DOI : 10.1007/978-3-642-40164-0_2
Positivity Problems for Low-Order Linear Recurrence Sequences, pp.366-379, 2014. ,
DOI : 10.1137/1.9781611973402.27
Automated information-theoretical evaluation of different anonymity protocols on coherent topologies, 2013. ,
Symbolic quantitative information flow, ACM SIGSOFT Software Engineering Notes, vol.37, issue.6, pp.1-5, 2012. ,
DOI : 10.1145/2382756.2382791
Approximate non-interference, Journal of Computer Security, vol.12, issue.1, pp.37-82, 2004. ,
DOI : 10.3233/JCS-2004-12103
Markov Decision Processes: Discrete Stochastic Dynamic Programming, 1994. ,
Anonymous connections and onion routing, IEEE Journal on Selected Areas in Communications, vol.16, issue.4, pp.482-494, 1998. ,
Crowds: Anonymity for web transactions, ACM Trans. Inf. Syst. Secur, vol.1, issue.1, pp.66-92, 1998. ,
Analog codes on graphs. CoRR, abs/cs/0608086, 2006. ,
A mathematical theory of communication. The Bell system technical journal, pp.379-423, 1948. ,
On the Foundations of Quantitative Information Flow, Lecture Notes in Computer Science, vol.38, issue.1, pp.288-302, 2009. ,
DOI : 10.1137/060651380
Quantifying Information Flow Using Min-Entropy, 2011 Eighth International Conference on Quantitative Evaluation of SysTems, pp.159-167 ,
DOI : 10.1109/QEST.2011.31
Non-termination and secure information flow, Mathematical Structures in Computer Science, vol.14, issue.06, pp.1183-1205, 2011. ,
DOI : 10.1007/11537311_32
A sound type system for secure flow analysis, Journal of Computer Security, vol.4, issue.23, pp.167-188, 1996. ,
Quantitative Information Flow - Verification Hardness and Possibilities, 2010 23rd IEEE Computer Security Foundations Symposium, pp.15-27 ,
DOI : 10.1109/CSF.2010.9
On bounding problems of quantitative information flow, Journal of Computer Security, vol.19, issue.6, pp.1029-1082, 2011. ,
DOI : 10.3233/JCS-2011-0437
Formal Verification of Probabilistic Systems, 1997. ,
Temporal logics for the specification of performance and reliability, STACS, pp.165-176, 1997. ,
DOI : 10.1007/BFb0023457
Measuring Information Leakage Using Generalized Gain Functions, 2012 IEEE 25th Computer Security Foundations Symposium, pp.265-279, 2012. ,
DOI : 10.1109/CSF.2012.26
URL : https://hal.archives-ouvertes.fr/hal-00734044
Probabilistic Anonymity, CONCUR, pp.171-185, 2005. ,
DOI : 10.1007/11539452_16
URL : https://hal.archives-ouvertes.fr/inria-00201101
Quantifying Information Leakage of Randomized Protocols, VMCAI, pp.68-87, 2013. ,
DOI : 10.1007/978-3-642-35873-9_7
URL : https://hal.archives-ouvertes.fr/hal-01242614
Henzinger, Model-checking ?-regular properties of interval markov chains ,
Anonymity protocols as noisy channels, in: Information and Computation, 2006. ,
Quantifying maximal loss of anonymity in protocols, Proceedings of the 4th International Symposium on Information, Computer, and Communications Security, ASIACCS '09, 2009. ,
DOI : 10.1145/1533057.1533087
A static analysis for quantifying information flow in a simple imperative language, Journal of Computer Security, vol.15, issue.3, 2007. ,
DOI : 10.3233/JCS-2007-15302
Elements of information theory, 1991. ,
Quantitative information flow, relations and polymorphic types, Journal of Logic and Computation, Special Issue on Lambda-calculus, type theory and natural language, pp.18-181, 2005. ,
Abstract non-interference: parameterizing noninterference by abstract interpretation, pp.186-197, 2004. ,
Entropy Maximization for Markov and Semi-Markov Processes, Methodology and Computing in Applied Probability, vol.6, issue.1, pp.109-127, 2004. ,
DOI : 10.1023/B:MCAP.0000012418.88825.18
Security Policies and Security Models, 1982 IEEE Symposium on Security and Privacy, pp.11-20 ,
DOI : 10.1109/SP.1982.10014
Information Theory and Statistical Mechanics, Physical Review, vol.106, issue.4, 1957. ,
DOI : 10.1103/PhysRev.106.620
Specification and refinement of probabilistic processes, [1991] Proceedings Sixth Annual IEEE Symposium on Logic in Computer Science, pp.266-277, 1991. ,
DOI : 10.1109/LICS.1991.151651
An information-theoretic model for adaptive side-channel attacks, Proceedings of the 14th ACM conference on Computer and communications security , CCS '07, pp.286-296, 2007. ,
DOI : 10.1145/1315245.1315282
Automatic quantification of cache sidechannels, CAV, pp.2012-564 ,
Interval-valued finite markov chains, Reliable Computing, vol.8, issue.2, pp.97-113, 2002. ,
DOI : 10.1023/A:1014745904458
A lattice of information, [1993] Proceedings Computer Security Foundations Workshop VI, pp.65-70 ,
DOI : 10.1109/CSFW.1993.246638
Assessing security threats of looping constructs, Proceedings of the 34th annual ACM SIGPLAN-SIGACT symposium on Principles of programming languages, POPL '07, pp.225-235, 2007. ,
Algebraic foundations for information theoretical, probabilistic and guessability measures of information flow, p.3453, 2011. ,
Lagrange multipliers and maximum information leakage in different observational models, PLAS '08, pp.135-146, 2008. ,
An abstract interpretation-based model for safety semantics, International Journal of Computer Mathematics, vol.116, issue.4, pp.665-694, 2011. ,
DOI : 10.1007/BF01211865
Covert Channel Capacity, 1987 IEEE Symposium on Security and Privacy, pp.60-66 ,
DOI : 10.1109/SP.1987.10013
Non-interference, who needs it?, Proceedings. 14th IEEE Computer Security Foundations Workshop, 2001., pp.237-238, 2001. ,
DOI : 10.1109/CSFW.2001.930149
A mathematical theory of communication, The Bell system technical journal, pp.379-423, 1948. ,
On the Foundations of Quantitative Information Flow, FOSSACS, pp.288-302, 2009. ,
DOI : 10.1137/060651380
Introduction to Numerical Analysis, Texts in Applied Mathematics, 2010. ,
Depth-First Search and Linear Graph Algorithms, SIAM Journal on Computing, vol.1, issue.2, pp.146-160, 1972. ,
DOI : 10.1137/0201010
Quantitative Information Flow - Verification Hardness and Possibilities, 2010 23rd IEEE Computer Security Foundations Symposium, pp.15-27, 2010. ,
DOI : 10.1109/CSF.2010.9
u > 0} be the set of successors of t 6. If Pt,t = 1: (a) For each state s ? Pred(t) set P s,? = Ps,t (b) Remove t from S and T and go back to step 3 ,
A static analysis for quantifying information flow in a simple imperative language, Journal of Computer Security, vol.15, issue.3, pp.321-371, 2007. ,
DOI : 10.3233/JCS-2007-15302
Quantifying information leaks in software, Proceedings of the 26th Annual Computer Security Applications Conference on, ACSAC '10, pp.261-269, 2010. ,
DOI : 10.1145/1920261.1920300
Anonymity protocols as noisy channels, Information and Computation, vol.206, issue.2-4, pp.378-401, 2008. ,
DOI : 10.1016/j.ic.2007.07.003
URL : https://hal.archives-ouvertes.fr/inria-00349225
Quantifying maximal loss of anonymity in protocols, Proceedings of the 4th International Symposium on Information, Computer, and Communications Security, ASIACCS '09, pp.206-217, 2009. ,
DOI : 10.1145/1533057.1533087
Vulnerability Bounds and Leakage Resilience of Blinded Cryptography under Timing Attacks, 2010 23rd IEEE Computer Security Foundations Symposium, pp.44-56, 2010. ,
DOI : 10.1109/CSF.2010.11
An information-theoretic model for adaptive side-channel attacks, Proceedings of the 14th ACM conference on Computer and communications security , CCS '07, pp.286-296, 2007. ,
DOI : 10.1145/1315245.1315282
Covert Channel Capacity, 1987 IEEE Symposium on Security and Privacy, pp.60-66, 1987. ,
DOI : 10.1109/SP.1987.10013
Onion routing, Communications of the ACM, vol.42, issue.2, pp.39-41, 1999. ,
DOI : 10.1145/293411.293443
Low-Cost Traffic Analysis of Tor, 2005 IEEE Symposium on Security and Privacy (S&P'05), pp.183-195, 2005. ,
DOI : 10.1109/SP.2005.12
Browser-Based Attacks on Tor, Privacy Enhancing Technologies, pp.184-199, 2007. ,
DOI : 10.1007/978-3-540-75551-7_12
Elements of information theory, 1991. ,
A mathematical theory of communication. The Bell system technical journal, pp.379-423, 1948. ,
Maximizing entropy over markov processes Under review, 2012. ,
A lattice of information, [1993] Proceedings Computer Security Foundations Workshop VI, pp.65-70, 1993. ,
DOI : 10.1109/CSFW.1993.246638
The formal semantics of programming languages -an introduction. Foundation of computing series, 1993. ,
Risk assessment of security threats for looping constructs*, Journal of Computer Security, vol.18, issue.2, pp.191-228, 2010. ,
DOI : 10.3233/JCS-2010-0360
Lagrange multipliers and maximum information leakage in different observational models, Proceedings of the third ACM SIGPLAN workshop on Programming languages and analysis for security , PLAS '08, pp.135-146, 2008. ,
DOI : 10.1145/1375696.1375713
Quantitative information flow in interactive systems, Journal of Computer Security, vol.20, issue.1, pp.3-50, 2012. ,
DOI : 10.3233/JCS-2011-0433
URL : https://hal.archives-ouvertes.fr/inria-00637356
The Optimum Leakage Principle for Analyzing Multi-threaded Programs, Lecture Notes in Computer Science, vol.5973, pp.177-193, 2009. ,
DOI : 10.1007/978-3-642-14496-7_15
Automatic Quantification of Cache Side-Channels, Lecture Notes in Computer Science, vol.7358, pp.564-580, 2012. ,
DOI : 10.1007/978-3-642-31424-7_40
Measuring Information Leakage Using Generalized Gain Functions, 2012 IEEE 25th Computer Security Foundations Symposium, 2012. ,
DOI : 10.1109/CSF.2012.26
URL : https://hal.archives-ouvertes.fr/hal-00734044
Semantics-based code obfuscation by abstract interpretation, Journal of Computer Security, vol.17, issue.6, pp.855-908, 2009. ,
DOI : 10.3233/JCS-2009-0345
Quantifying opacity, 2010. ,
Quantifying information leakage of randomized protocols, 2013. ,
URL : https://hal.archives-ouvertes.fr/hal-01242614
Statistical Measurement of Information Leakage, TACAS, 2010. ,
DOI : 10.1007/978-3-642-12002-2_33
Anonymity protocols as noisy channels, Information and Computation, 2006. ,
URL : https://hal.archives-ouvertes.fr/inria-00349225
The dining cryptographers problem: Unconditional sender and recipient untraceability, Journal of Cryptology, vol.1, issue.1, pp.65-75, 1988. ,
DOI : 10.1007/BF00206326
A Statistical Test for Information Leaks Using Continuous Mutual Information, 2011 IEEE 24th Computer Security Foundations Symposium, pp.177-190, 2011. ,
DOI : 10.1109/CSF.2011.19
Quantitative Analysis of the Leakage of Confidential Data, Electronic Notes in Theoretical Computer Science, vol.59, issue.3, pp.238-251, 2001. ,
DOI : 10.1016/S1571-0661(04)00290-7
A static analysis for quantifying information flow in a simple imperative language, Journal of Computer Security, vol.15, issue.3, 2007. ,
DOI : 10.3233/JCS-2007-15302
APEX: An Analyzer for Open Probabilistic Programs, Proc. CAV'12, 2012. ,
DOI : 10.1007/978-3-642-31424-7_51
Precise quantitative information flow analysis using symbolic model counting, p.2012 ,
An information-theoretic model for adaptive side-channel attacks, Proceedings of the 14th ACM conference on Computer and communications security , CCS '07, 2007. ,
DOI : 10.1145/1315245.1315282
Automatic Quantification of Cache Side-Channels, p.2012 ,
DOI : 10.1007/978-3-642-31424-7_40
PRISM 4.0: Verification of Probabilistic Real-Time Systems, Proc. CAV'11, 2011. ,
DOI : 10.1007/3-540-45657-0_17
URL : https://hal.archives-ouvertes.fr/hal-00648035
Algebraic foundations for information theoretical, probabilistic and guessability measures of information flow. CoRR, abs/1101, 2011. ,
Quantitative information flow as network flow capacity, 2008. ,
A Tool: Quantitative Analyser for Programs, 2011 Eighth International Conference on Quantitative Evaluation of SysTems, 2011. ,
DOI : 10.1109/QEST.2011.25
Measuring channel capacity to distinguish undue influence, Proceedings of the ACM SIGPLAN Fourth Workshop on Programming Languages and Analysis for Security, PLAS '09, 2009. ,
DOI : 10.1145/1554339.1554349
Symbolic quantitative information flow, ACM SIGSOFT Software Engineering Notes, vol.37, issue.6, pp.1-5, 2012. ,
DOI : 10.1145/2382756.2382791
Language-based information-flow security, IEEE Journal on Selected Areas in Communications, vol.21, issue.1, pp.5-19, 2003. ,
DOI : 10.1109/JSAC.2002.806121
On the Foundations of Quantitative Information Flow, LNCS, vol.38, issue.1, pp.288-302, 2009. ,
DOI : 10.1137/060651380