{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,6,20]],"date-time":"2024-06-20T08:36:11Z","timestamp":1718872571812},"reference-count":67,"publisher":"Association for Computing Machinery (ACM)","issue":"2","license":[{"start":{"date-parts":[[2019,4,1]],"date-time":"2019-04-01T00:00:00Z","timestamp":1554076800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2019,4,1]],"date-time":"2019-04-01T00:00:00Z","timestamp":1554076800000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"funder":[{"DOI":"10.13039\/501100001691","name":"Japan Society for the Promotion of Science","doi-asserted-by":"publisher","award":["KAKENHI JP17K12667"],"id":[{"id":"10.13039\/501100001691","id-type":"DOI","asserted-by":"publisher"}]},{"name":"JSPS & Inria","award":["Japan-France AYAME Program LOGIS"]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Form. Asp. Comput."],"published-print":{"date-parts":[[2019,4]]},"abstract":"Abstract<\/jats:title>Analysis of a probabilistic system often requires to learn the joint probability distribution of its random variables. The computation of the exact distribution is usually an exhaustiveprecise analysis<\/jats:italic>on all executions of the system. To avoid the high computational cost of such an exhaustive search,statistical analysis<\/jats:italic>has been studied to efficiently obtain approximate estimates by analyzing only a small but representative subset of the system\u2019s behavior. In this paper we propose ahybrid statistical estimation method<\/jats:italic>that combines precise and statistical analyses to estimate mutual information, Shannon entropy, and conditional entropy, together with their confidence intervals. We show how to combine the analyses on different components of a discrete system with different accuracy to obtain an estimate for the whole system. The new method performs weighted statistical analysis with different sample sizes over different components and dynamically finds their optimal sample sizes. Moreover, it can reduce sample sizes by using prior knowledge about systems and a newabstraction-then-sampling<\/jats:italic>technique based on qualitative analysis. To apply the method to the source code of a system, we show how to decompose the code into components and to determine the analysis method for each component by overviewing the implementation of those techniques in the HyLeak tool. We demonstrate with case studies that the new method outperforms the state of the art in quantifying information leakage.<\/jats:p>","DOI":"10.1007\/s00165-018-0469-z","type":"journal-article","created":{"date-parts":[[2018,10,8]],"date-time":"2018-10-08T07:18:12Z","timestamp":1538983092000},"page":"165-206","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":6,"title":["Hybrid statistical estimation of mutual information and its application to information flow"],"prefix":"10.1145","volume":"31","author":[{"given":"Fabrizio","family":"Biondi","sequence":"first","affiliation":[{"name":"CentraleSup\u00e9lec Rennes, Rennes, France"}]},{"ORCID":"http:\/\/orcid.org\/0000-0002-2151-9560","authenticated-orcid":false,"given":"Yusuke","family":"Kawamoto","sequence":"additional","affiliation":[{"name":"AIST, Tsukuba, Japan"}]},{"given":"Axel","family":"Legay","sequence":"additional","affiliation":[{"name":"Inria, Rennes, France"}]},{"given":"Louis-Marie","family":"Traonouez","sequence":"additional","affiliation":[{"name":"Inria, Rennes, France"}]}],"member":"320","reference":[{"key":"e_1_2_1_2_1_2","doi-asserted-by":"crossref","unstructured":"Alvim MS Chatzikokolakis K Kawamoto Y Palamidessi C (2017) Information leakage games. In: 8th international conference on decision and game theory for security (GameSec 2017) volume 10575 of Lecture notes in computer science. Springer","DOI":"10.1007\/978-3-319-68711-7_23"},{"key":"e_1_2_1_2_2_2","doi-asserted-by":"crossref","unstructured":"Alvim MS Chatzikokolakis K Kawamoto Y Palamidessi C (2018) A game-theoretic approach to information-flow control via protocol composition. Entropy 20(5): 382\u2013143","DOI":"10.3390\/e20050382"},{"key":"e_1_2_1_2_3_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.plrev.2004.01.002"},{"key":"e_1_2_1_2_4_2","doi-asserted-by":"crossref","unstructured":"Bouissou O Goubault E Putot S Chakarov A Sankaranarayanan S (2016) Uncertainty propagation using probabilistic affine forms and concentration of measure inequalities. In: Chechik M Raskin J-F (eds) Tools and algorithms for the construction and analysis of systems\u201422nd international conference TACAS 2016 Held as Part of the European joint conferences on theory and practice of software ETAPS 2016 Eindhoven The Netherlands April 2\u20138 2016 Proceedings volume 9636 of Lecture notes in computer science. Springer pp 225\u2013243","DOI":"10.1007\/978-3-662-49674-9_13"},{"key":"e_1_2_1_2_5_2","unstructured":"Barbot B Haddad S Picaronny C (2012) Coupling and importance sampling for statistical model checking. In: Flanagan C K\u00f6nig B (eds) Tools and algorithms for the construction and analysis of systems\u201418th international conference TACAS 2012 Held as Part of the European joint conferences on theory and practice of software ETAPS 2012 Tallinn Estonia March 24\u2013April 1 2012. Proceedings volume 7214 of Lecture notes in computer science. Springer pp 331\u2013346"},{"key":"e_1_2_1_2_6_2","doi-asserted-by":"crossref","unstructured":"Barthe G K\u00f6pf B (2011) Information-theoretic bounds for differentially private mechanisms. In: Proceedings of the 24th IEEE computer security foundations symposium CSF 2011 Cernay-la-Ville France 27\u201329 June 2011. IEEE Computer Society pp 191\u2013204","DOI":"10.1109\/CSF.2011.20"},{"key":"e_1_2_1_2_7_2","unstructured":"Biondi F Kawamoto Y Legay A Traonouez L-M. HyLeak. https:\/\/project.inria.fr\/hyleak\/"},{"key":"e_1_2_1_2_8_2","doi-asserted-by":"crossref","unstructured":"Biondi F Kawamoto Y Legay A Traonouez L-M (2017) Hyleak: hybrid analysis tool for information leakage. In 15th international symposium on automated technology for verification and analysis (ATVA\u201917) volume 10482 of Lecture notes in computer science. Springer","DOI":"10.1007\/978-3-319-68167-2_11"},{"key":"e_1_2_1_2_9_2","doi-asserted-by":"crossref","unstructured":"Backes M K\u00f6pf B Rybalchenko A (2009) Automatic discovery and quantification of information leaks. In: 30th IEEE symposium on security and privacy (S&P 2009) 17\u201320 May 2009 Oakland California USA. IEEE Computer Society pp 141\u2013153","DOI":"10.1109\/SP.2009.18"},{"key":"e_1_2_1_2_10_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.tcs.2015.07.034"},{"key":"e_1_2_1_2_11_2","doi-asserted-by":"crossref","unstructured":"Biondi F Legay A Quilbeuf J (2015) Comparative analysis of leakage tools on scalable case studies. In: Bernd F Jaco G (eds) Model checking software\u201422nd international symposium SPIN 2015 Stellenbosch South Africa August 24\u201326 2015 Proceedings volume 9232 of Lecture notes in computer science. Springer pp 263\u2013281","DOI":"10.1007\/978-3-319-23404-5_17"},{"key":"e_1_2_1_2_12_2","unstructured":"Biondi F Legay A Traonouez L-M Wasowski A. QUAIL. https:\/\/project.inria.fr\/quail\/"},{"key":"e_1_2_1_2_13_2","doi-asserted-by":"crossref","unstructured":"Biondi F Legay A Traonouez L-M Wasowski A (2013) QUAIL: a quantitative security analyzer for imperative code. In: Sharygina N Veith H (eds) Computer aided verification\u201425th international conference CAV 2013 Saint Petersburg Russia July 13\u201319 2013. Proceedings volume 8044 of Lecture notes in computer science. Springer pp 702\u2013707","DOI":"10.1007\/978-3-642-39799-8_49"},{"key":"e_1_2_1_2_14_2","doi-asserted-by":"crossref","unstructured":"Boreale M Paolini M (2014) On formally bounding information leakage by statistical estimation. In: Chow SSM Camenisch J Chi Kwong HL Yiu S-M (eds) Information security\u201417th international conference ISC 2014 Hong Kong China October 12\u201314 2014. Proceedings volume 8783 of Lecture notes in computer science. Springer pp 216\u2013236","DOI":"10.1007\/978-3-319-13257-0_13"},{"issue":"6","key":"e_1_2_1_2_15_2","first-page":"163","article-title":"Some data analysis using mutual information.","volume":"18","author":"Brillinger DR","year":"2004","journal-title":"Braz J Probab Stat"},{"key":"e_1_2_1_2_16_2","doi-asserted-by":"crossref","unstructured":"Chatzikokolakis K Chothia T Guha A (2010) Statistical measurement of information leakage. In: Esparza J Majumdar R (eds) Tools and algorithms for the construction and analysis of systems 16th international conference TACAS 2010 Held as part of the joint European conferences on theory and practice of software ETAPS 2010 Paphos Cyprus March 20\u201328 2010. Proceedings volume 6015 of Lecture notes in computer science. Springer pp 390\u2013404","DOI":"10.1007\/978-3-642-12002-2_33"},{"key":"e_1_2_1_2_17_2","doi-asserted-by":"crossref","unstructured":"Chakraborty S Fremont DJ Meel KS Seshia SA Vardi MY (2015) On parallel scalable uniform SAT witness generation. In: Baier C Tinelli C (eds) Tools and algorithms for the construction and analysis of systems\u201421st international conference TACAS 2015 held as part of the European joint conferences on theory and practice of software ETAPS 2015 London UK April 11\u201318 2015. Proceedings volume 9035 of Lecture notes in computer science. Springer pp 304\u2013319","DOI":"10.1007\/978-3-662-46681-0_25"},{"key":"e_1_2_1_2_18_2","doi-asserted-by":"crossref","first-page":"65","DOI":"10.1007\/BF00206326","article-title":"The dining cryptographers problem: unconditional sender and recipient untraceability","volume":"1","author":"Chaum D","year":"1998","journal-title":"J Cryptol"},{"key":"e_1_2_1_2_19_2","doi-asserted-by":"publisher","DOI":"10.1016\/S1571-0661(04)00290-7"},{"issue":"3","key":"e_1_2_1_2_20_2","doi-asserted-by":"crossref","first-page":"321","DOI":"10.3233\/JCS-2007-15302","article-title":"A static analysis for quantifying information flow in a simple imperative language.","volume":"15","author":"Clark D","year":"2007","journal-title":"J Comput Secur"},{"key":"e_1_2_1_2_21_2","unstructured":"Chothia T Kawamoto Y (2014) Statistical estimation of min-entropy leakage Manuscript"},{"key":"e_1_2_1_2_22_2","unstructured":"Chothia T Kawamoto Y Novakovic C. leakiEst. http:\/\/www.cs.bham.ac.uk\/research\/projects\/infotools\/leakiest\/"},{"key":"e_1_2_1_2_23_2","unstructured":"Chothia T Kawamoto Y Novakovic C. LeakWatch. http:\/\/www.cs.bham.ac.uk\/research\/projects\/infotools\/leakwatch\/"},{"key":"e_1_2_1_2_24_2","doi-asserted-by":"crossref","unstructured":"Chothia T Kawamoto Y Novakovic C (2013) A tool for estimating information leakage. In: Sharygina N Veith H (eds) Computer aided verification\u201425th international conference CAV 2013 Saint Petersburg Russia July 13\u201319 2013. Proceedings volume 8044 of Lecture notes in computer science. Springer pp 690\u2013695","DOI":"10.1007\/978-3-642-39799-8_47"},{"key":"e_1_2_1_2_25_2","doi-asserted-by":"crossref","unstructured":"Chothia T Kawamoto Y Novakovic C (2014) Leakwatch: estimating information leakage from java programs. In: Kutylowski M Vaidya J (eds) Computer security\u2014ESORICS 2014\u201419th European symposium on research in computer security Wroclaw Poland September 7\u201311 2014. Proceedings part II volume 8713 of Lecture notes in computer science. Springer pp 219\u2013236","DOI":"10.1007\/978-3-319-11212-1_13"},{"key":"e_1_2_1_2_26_2","doi-asserted-by":"crossref","unstructured":"Chothia T Kawamoto Y Novakovic C Parker D (2013) Probabilistic point-to-point information leakage. In: 2013 IEEE 26th computer security foundations symposium New Orleans LA USA June 26\u201328 2013. IEEE Computer Society pp 193\u2013205","DOI":"10.1109\/CSF.2013.20"},{"key":"e_1_2_1_2_27_2","unstructured":"Chadha R Mathur U Schwoon S (2014) Computing information flow using symbolic model-checking. In: Raman V Suresh SP (eds) 34th international conference on foundation of software technology and theoretical computer science FSTTCS 2014 December 15\u201317 2014 New Delhi India volume 29 of LIPIcs. Schloss Dagstuhl\u2014Leibniz-Zentrum fuer Informatik pp 505\u2013516"},{"key":"e_1_2_1_2_28_2","doi-asserted-by":"crossref","unstructured":"Chakraborty S Meel KS Vardi MY (2013) A scalable approximate model counter. In: Schulte C (ed.) Principles and practice of constraint programming\u201419th international conference CP 2013 Uppsala Sweden September 16\u201320 2013. Proceedings volume 8124 of Lecture notes in computer science. Springer pp 200\u2013216","DOI":"10.1007\/978-3-642-40627-0_18"},{"key":"e_1_2_1_2_29_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.ic.2007.07.003"},{"issue":"6","key":"e_1_2_1_2_30_2","doi-asserted-by":"crossref","first-page":"1157","DOI":"10.3233\/JCS-2009-0393","article-title":"Hyperproperties.","volume":"18","author":"Clarkson MR","year":"2010","journal-title":"J Comput Secur"},{"key":"e_1_2_1_2_31_2","unstructured":"Cover TM Thomas JA (2006) Elements of information theory (2nd edn). A Wiley-Interscience publication. Wiley"},{"key":"e_1_2_1_2_32_2","unstructured":"Clarke EM Zuliani P (2011) Statistical model checking for cyber-physical systems. In: Bultan T Hsiung P-A (eds) Automated technology for verification and analysis 9th international symposium ATVA 2011 Taipei Taiwan October 11\u201314 2011. Proceedings volume 6996 of Lecture notes in computer science. Springer pp 1\u201312"},{"key":"e_1_2_1_2_33_2","doi-asserted-by":"publisher","DOI":"10.1145\/360051.360056"},{"key":"e_1_2_1_2_34_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.ic.2013.03.005"},{"key":"e_1_2_1_2_35_2","doi-asserted-by":"crossref","unstructured":"Escolano F Suau P Bonev B (2009) Information theory in computer vision and pattern recognition 1st edn. Springer Publishing Company Incorporated","DOI":"10.1007\/978-1-84882-297-9"},{"key":"e_1_2_1_2_36_2","unstructured":"Fremont DJ Seshia SA (2014) Speeding up smt-based quantitative program analysis. In: R\u00fcmmer P Wintersteiger CM (eds) Proceedings of the 12th international workshop on satisfiability modulo theories SMT 2014 affiliated with the 26th international conference on computer aided verification (CAV 2014) the 7th international joint conference on automated reasoning (IJCAR 2014) and the 17th international conference on theory and applications of Satisfiability Testing (SAT 2014) Vienna Austria July 17\u201318 2014. volume 1163 of CEUR workshop proceedings. CEUR-WS.org 2014 pp 3\u201313"},{"key":"e_1_2_1_2_37_2","doi-asserted-by":"publisher","DOI":"10.5555\/578869"},{"key":"e_1_2_1_2_38_2","unstructured":"Gray JW (1991) III. Toward a mathematical foundation for information flow security. In: IEEE symposium on security and privacy pp 21\u201335"},{"key":"e_1_2_1_2_39_2","unstructured":"Jensen FV (1996) Introduction to Bayesian networks 1st edn. Springer-Verlag New York Inc. Secaucus"},{"key":"e_1_2_1_2_40_2","unstructured":"K\u00f6pf B Basin DA (2007) An information-theoretic model for adaptive side-channel attacks. In: Ning P De Capitani di Vimercati S Syverson PF (eds) Proceedings of the 2007 ACM conference on computer and communications security CCS 2007 Alexandria Virginia USA October 28\u201331 2007. ACM pp 286\u2013296"},{"key":"e_1_2_1_2_41_2","doi-asserted-by":"crossref","unstructured":"Kawamoto Y Biondi F Legay A(2016) Hybrid statistical estimation of mutual information for quantifying information flow. In: Fitzgerald JS Heitmeyer CL Gnesi S Philippou A(eds) FM 2016: Formal methods\u201421st international symposium Limassol Cyprus November 9\u201311 2016 Proceedings volume 9995 of Lecture notes in computer science pp 406\u2013425","DOI":"10.1007\/978-3-319-48989-6_25"},{"key":"e_1_2_1_2_42_2","doi-asserted-by":"crossref","unstructured":"Kawamoto Y Chatzikokolakis K Palamidessi C (2014) Compositionality results for quantitative information flow. In: Norman G Sanders WH (eds) Quantitative evaluation of systems\u201411th international conference QEST 2014 Florence Italy September 8\u201310 2014. Proceedings volume 8657 of Lecture notes in computer science. Springer pp 368\u2013383","DOI":"10.1007\/978-3-319-10696-0_28"},{"issue":"3","key":"e_1_2_1_2_43_2","first-page":"1","article-title":"On the compositionality of quantitative information flow.","volume":"13","author":"Kawamoto Y","year":"2017","journal-title":"Log Methods Comput Sci"},{"key":"e_1_2_1_2_44_2","doi-asserted-by":"crossref","unstructured":"Kawamoto Y Given-Wilson T (2015) Quantitative information flow for scheduler-dependent systems. In: Bertrand N Tribastone M (eds) Proceedings thirteenth workshop on quantitative aspects of programming languages and systems QAPL 2015 London UK 11th\u201312th April 2015. volume 194 of EPTCS pp 48\u201362","DOI":"10.4204\/EPTCS.194.4"},{"key":"e_1_2_1_2_45_2","unstructured":"Kang MG McCamant S Poosankam P Song D (2011) DTA++: dynamic taint analysis with targeted control-flow propagation. In: Proceedings of the network and distributed system security symposium NDSS 2011 San Diego California USA 6th February\u20139th February 2011. The Internet Society"},{"key":"e_1_2_1_2_46_2","doi-asserted-by":"crossref","unstructured":"K\u00f6pf B Rybalchenko A(2010) Approximation and randomization for quantitative information-flow analysis. In: Proceedings of the 23rd IEEE computer security foundations symposium CSF 2010 Edinburgh United Kingdom July 17\u201319 2010. IEEE Computer Society pp 3\u201314","DOI":"10.1109\/CSF.2010.8"},{"key":"e_1_2_1_2_47_2","doi-asserted-by":"crossref","unstructured":"Liu Z Chen Z Fang C Shi Q (2014) Hybrid test data generation. In: Jalote P Briand LC van der Hoek A (eds) 36th international conference on software engineering ICSE \u201914 Companion proceedings Hyderabad India May 31\u2013June 07 2014. ACM pp 630\u2013631","DOI":"10.1145\/2591062.2591150"},{"key":"e_1_2_1_2_48_2","unstructured":"Legay A Delahaye B Bensalem S (2010) Statistical model checking: an overview. In: Barringer H Falcone Y Finkbeiner B Havelund K Lee I Pace GJ Rosu G Sokolsky O Tillmann N (eds) Runtime verification\u2014first international conference RV 2010 St. Julians Malta November 1\u20134 2010. Proceedings volume 6418 of Lecture notes in computer science. Springer pp 122\u2013135"},{"key":"e_1_2_1_2_49_2","doi-asserted-by":"publisher","DOI":"10.5555\/971143"},{"key":"e_1_2_1_2_50_2","doi-asserted-by":"crossref","unstructured":"Malacaria P (2007) Assessing security threats of looping constructs. In: Hofmann M Felleisen M (eds) Proceedings of the 34th ACM SIGPLAN-SIGACT symposium on principles of programming languages POPL 2007 Nice France January 17\u201319 2007. ACM pp 225\u2013235","DOI":"10.1145\/1190215.1190251"},{"key":"e_1_2_1_2_51_2","doi-asserted-by":"crossref","unstructured":"McCamant S Ernst MD (2008) Quantitative information flow as network flow capacity. In: Gupta R Amarasinghe SP (eds) Proceedings of the ACM SIGPLAN 2008 conference on programming language design and implementation Tucson AZ USA June 7\u201313 2008. ACM pp 193\u2013205","DOI":"10.1145\/1379022.1375606"},{"key":"e_1_2_1_2_52_2","doi-asserted-by":"crossref","unstructured":"Malacaria P Khouzani MHR Pasareanu CS Phan Q-S Luckow K S (2018) Symbolic side-channel analysis for probabilistic programs. In Proceedings of the 31st IEEE computer security foundations symposium CSF 2018. To appear","DOI":"10.1109\/CSF.2018.00030"},{"key":"e_1_2_1_2_53_2","doi-asserted-by":"publisher","DOI":"10.1016\/0165-1684(89)90132-1"},{"key":"e_1_2_1_2_54_2","doi-asserted-by":"crossref","unstructured":"Majumdar R Sen K (2007) Hybrid concolic testing. In: 29th international conference on software engineering (ICSE 2007) Minneapolis MN USA May 20\u201326 2007. IEEE Computer Society pp 416\u2013426","DOI":"10.1109\/ICSE.2007.41"},{"key":"e_1_2_1_2_55_2","unstructured":"Newsome J McCamant S Song D (2009) Measuring channel capacity to distinguish undue influence. In: Chong S Naumann DA (eds) Proceedings of the 2009 workshop on programming languages and analysis for security PLAS 2009 Dublin Ireland 15\u201321 June 2009. ACM pp 73\u201385"},{"key":"e_1_2_1_2_56_2","unstructured":"Parr T (2007) The definitive ANTLR reference: building domain specific languages"},{"key":"e_1_2_1_2_57_2","doi-asserted-by":"crossref","unstructured":"Phan Q-S Malacaria P (2014) Abstract model counting: a novel approach for quantification of information leaks. In: Moriai S Jaeger T Sakurai K (eds) 9th ACM symposium on information computer and communications security ASIA CCS \u201914 Kyoto Japan\u2014June 03\u201306 2014. ACM pp 283\u2013292","DOI":"10.1145\/2590296.2590328"},{"key":"e_1_2_1_2_58_2","doi-asserted-by":"crossref","unstructured":"Phan Q-S Malacaria P Pasareanu CS d\u2019Amorim M (2014) Quantifying information leaks using reliability analysis. In: Rungta N Tkachuk O (eds) 2014 International symposium on model checking of software SPIN 2014 Proceedings San Jose CA USA July 21\u201323 2014. ACM pp 105\u2013108","DOI":"10.1145\/2632362.2632367"},{"key":"e_1_2_1_2_59_2","doi-asserted-by":"publisher","DOI":"10.1145\/2382756.2382791"},{"key":"#cr-split#-e_1_2_1_2_60_2.1","doi-asserted-by":"crossref","unstructured":"Smith G (2009) On the foundations of quantitative information flow. In: de Alfaro L","DOI":"10.1007\/978-3-642-00596-1_21"},{"key":"#cr-split#-e_1_2_1_2_60_2.2","unstructured":"(ed) Foundations of software science and computational structures 12th international conference FOSSACS 2009 held as part of the joint European conferences on theory and practice of software ETAPS 2009 York UK March 22-29 2009. Proceedings volume 5504 of Lecture notes in computer science. Springer pp 288-302"},{"key":"e_1_2_1_2_61_2","doi-asserted-by":"crossref","unstructured":"Sweet I Trilla JMC Scherrer C Hicks M Magill S (2018) What\u2019s the over\/under? Probabilistic bounds on information leakage. In Lujo B Ralf K (eds) Principles of security and trust - 7th international conference POST 2018 Held as part of the European joint conferences on theory and practice of software ETAPS 2018 Thessaloniki Greece April 14\u201320 2018 Proceedings volume 10804 of Lecture notes in computer science. Springer pp 3\u201327","DOI":"10.1007\/978-3-319-89722-6_1"},{"key":"e_1_2_1_2_62_2","doi-asserted-by":"crossref","unstructured":"Val CG Enescu MA Bayless S Aiello W Hu AJ (2016) Precisely measuring quantitative information flow: 10k lines of code and beyond. In: IEEE European symposium on security and privacy EuroS&P 2016 Saarbr\u00fccken Germany March 21\u201324 2016. IEEE pp 31\u201346","DOI":"10.1109\/EuroSP.2016.15"},{"key":"e_1_2_1_2_63_2","doi-asserted-by":"publisher","DOI":"10.1145\/3147.3165"},{"key":"e_1_2_1_2_64_2","doi-asserted-by":"crossref","unstructured":"Weigl A (2016) Efficient sat-based pre-image enumeration for quantitative information flow in programs. In: Livraga G Torra V Aldini A Martinelli F Suri N (eds) Data privacy management and security assurance\u201411th international workshop DPM 2016 and 5th international workshop QASA 2016 Heraklion Crete Greece September 26\u201327 2016 Proceedings volume 9963 of Lecture notes in computer science. Springer pp 51\u201358","DOI":"10.1007\/978-3-319-47072-6_4"},{"key":"e_1_2_1_2_65_2","doi-asserted-by":"crossref","unstructured":"Wilde MM (2013) Quantum information theory 1st edn. Cambridge University Press New York","DOI":"10.1017\/CBO9781139525343"},{"key":"e_1_2_1_2_66_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.tcs.2013.07.031"}],"container-title":["Formal Aspects of Computing"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s00165-018-0469-z.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s00165-018-0469-z\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s00165-018-0469-z.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1007\/s00165-018-0469-z","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,9,3]],"date-time":"2022-09-03T15:14:15Z","timestamp":1662218055000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1007\/s00165-018-0469-z"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,4]]},"references-count":67,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2019,4]]}},"alternative-id":["10.1007\/s00165-018-0469-z"],"URL":"https:\/\/doi.org\/10.1007\/s00165-018-0469-z","relation":{},"ISSN":["0934-5043","1433-299X"],"issn-type":[{"value":"0934-5043","type":"print"},{"value":"1433-299X","type":"electronic"}],"subject":[],"published":{"date-parts":[[2019,4]]},"assertion":[{"value":"1 October 2017","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"31 August 2018","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"8 October 2018","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}