{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,26]],"date-time":"2025-03-26T20:57:54Z","timestamp":1743022674685,"version":"3.40.3"},"publisher-location":"Cham","reference-count":45,"publisher":"Springer Nature Switzerland","isbn-type":[{"type":"print","value":"9783031757822"},{"type":"electronic","value":"9783031757839"}],"license":[{"start":{"date-parts":[[2024,11,13]],"date-time":"2024-11-13T00:00:00Z","timestamp":1731456000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2024,11,13]],"date-time":"2024-11-13T00:00:00Z","timestamp":1731456000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2025]]},"DOI":"10.1007\/978-3-031-75783-9_6","type":"book-chapter","created":{"date-parts":[[2024,11,12]],"date-time":"2024-11-12T06:26:50Z","timestamp":1731392810000},"page":"128-154","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Symbolic Quantitative Information Flow for\u00a0Probabilistic Programs"],"prefix":"10.1007","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-4329-530X","authenticated-orcid":false,"given":"Philipp","family":"Schr\u00f6er","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0009-0002-3489-9600","authenticated-orcid":false,"given":"Francesca","family":"Randone","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-0003-7295","authenticated-orcid":false,"given":"Ra\u00fal","family":"Pardo","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-0532-2685","authenticated-orcid":false,"given":"Andrzej","family":"Wa\u0327sowski","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2024,11,13]]},"reference":[{"key":"6_CR1","doi-asserted-by":"publisher","unstructured":"Alvim, M., Chatzikokolakis, K., McIver, A., Morgan, C., Palamidessi, C., Smith, G.: The Science of Quantitative Information Flow. Springer, Cham (2020). https:\/\/doi.org\/10.1007\/978-3-319-96131-6","DOI":"10.1007\/978-3-319-96131-6"},{"key":"6_CR2","doi-asserted-by":"publisher","unstructured":"Alvim, M.S., Fernandes, N., McIver, A., Morgan, C., Nunes, G.H.: Flexible and scalable privacy assessment for very large datasets, with an application to official governmental microdata. Proc. Priv. Enhancing Technol. 2022(4), 378\u2013399 (2022). https:\/\/doi.org\/10.56553\/POPETS-2022-0114","DOI":"10.56553\/POPETS-2022-0114"},{"key":"6_CR3","doi-asserted-by":"publisher","unstructured":"Alvim, M.S., Fernandes, N., McIver, A., Nunes, G.H.: A quantitative information flow analysis of the topics API. In: Proceedings of the 22nd Workshop on Privacy in the Electronic Society, WPES 2023, Copenhagen, Denmark, 26 November 2023, pp. 123\u2013127. ACM (2023). https:\/\/doi.org\/10.1145\/3603216.3624959","DOI":"10.1145\/3603216.3624959"},{"key":"6_CR4","doi-asserted-by":"publisher","unstructured":"Backes, M., Boris, K., Rybalchenko, A.: Automatic discovery and quantification of information leaks. In: 30th IEEE Symposium on Security and Privacy (SP 2009), 17-20 May 2009, Oakland, California, USA, pp. 141\u2013153. IEEE Computer Society, 2009. ISBN 978-0-7695-3633-0. https:\/\/doi.org\/10.1109\/SP.2009.18","DOI":"10.1109\/SP.2009.18"},{"key":"6_CR5","doi-asserted-by":"publisher","unstructured":"Bang, L., Rosner, N., Bultan, T.: Online synthesis of adaptive side-channel attacks based on noisy observations. In: 2018 IEEE European Symposium on Security and Privacy, EuroS &P 2018, London, United Kingdom, April 24-26, 2018, pp. 307\u2013322. IEEE, 2018. ISBN 978-1-5386-4228-3. https:\/\/doi.org\/10.1109\/EUROSP.2018.00029","DOI":"10.1109\/EUROSP.2018.00029"},{"key":"6_CR6","doi-asserted-by":"crossref","unstructured":"Batz, K., Kaminski, B.L., Katoen, J.P., Matheja, C., Noll, T.: Quantitative separation logic: a logic for reasoning about probabilistic pointer programs. Proc. ACM Program. Lang. 3(POPL), 34:1\u201334:29 (2019)","DOI":"10.1145\/3290347"},{"issue":"2","key":"6_CR7","doi-asserted-by":"publisher","first-page":"165","DOI":"10.1007\/s00165-018-0469-z","volume":"31","author":"F Biondi","year":"2019","unstructured":"Biondi, F., Kawamoto, Y., Legay, A., Traonouez, L.-M.: Hybrid statistical estimation of mutual information and its application to information flow. Formal Aspects Comput. 31(2), 165\u2013206 (2019)","journal-title":"Formal Aspects Comput."},{"key":"6_CR8","doi-asserted-by":"publisher","unstructured":"Biondi, F., Legay, A., Traonouez, L.M., Wasowski, A.: QUAIL: a quantitative security analyzer for imperative code. In: CAV\u201913, pp. 702\u2013707. Springer Berlin Heidelberg, 2013. ISBN 978-3-642-39799-8. https:\/\/doi.org\/10.1007\/978-3-642-39799-8_49","DOI":"10.1007\/978-3-642-39799-8_49"},{"key":"6_CR9","unstructured":"Bishop, C.M., Nasrabadi, N.M.: Pattern Recognition and Machine Learning, volume\u00a04. Springer (2006)"},{"key":"6_CR10","doi-asserted-by":"publisher","unstructured":"Chen, M., Katoen, J.P., Klinkenberg, L., Winkler, T.: Does a program yield the right distribution? - verifying probabilistic programs via generating functions. In: Shoham, S., Vizel, Y.(eds.) Computer Aided Verification - 34th International Conference, CAV 2022, Haifa, Israel, August 7-10, 2022, Proceedings, Part I, vol. 13371, Lecture Notes in Computer Science, pp. 79\u2013101. Springer (2022). https:\/\/doi.org\/10.1007\/978-3-031-13185-1_5","DOI":"10.1007\/978-3-031-13185-1_5"},{"key":"6_CR11","doi-asserted-by":"publisher","unstructured":"Cherubin, G., Chatzikokolakis, K., Palamidessi, C.: F-BLEAU: fast black-box leakage estimation. In: 2019 IEEE Symposium on Security and Privacy, SP 2019, San Francisco, CA, USA, May 19-23, 2019, pp. 835\u2013852. IEEE (2019). ISBN 978-1-5386-6660-9. https:\/\/doi.org\/10.1109\/SP.2019.00073","DOI":"10.1109\/SP.2019.00073"},{"key":"6_CR12","doi-asserted-by":"publisher","unstructured":"Chothia, T., Guha, A.: A statistical test for information leaks using continuous mutual information. In: Proceedings of the 24th IEEE Computer Security Foundations Symposium, CSF 2011, Cernay-la-Ville, France, 27-29 June, 2011, pp. 177\u2013190. IEEE Computer Society (2011). ISBN 978-1-61284-644-6. https:\/\/doi.org\/10.1109\/CSF.2011.19","DOI":"10.1109\/CSF.2011.19"},{"key":"6_CR13","doi-asserted-by":"publisher","unstructured":"Chothia, T., Kawamoto, Y., Novakovic, C.: A tool for estimating information leakage. In: Computer Aided Verification - 25th International Conference, CAV 2013, Saint Petersburg, Russia, July 13-19, 2013. Proceedings, vol. 8044, Lecture Notes in Computer Science, pp.690\u2013695. Springer (2013). ISBN 978-3-642-39798-1. https:\/\/doi.org\/10.1007\/978-3-642-39799-8_47","DOI":"10.1007\/978-3-642-39799-8_47"},{"key":"6_CR14","doi-asserted-by":"publisher","unstructured":"Chothia,T., Kawamoto, Y., Novakovic, C.: Leakwatch: estimating information leakage from java programs. In: Computer Security - ESORICS 2014 - 19th European Symposium on Research in Computer Security, Wroclaw, Poland, September 7-11, 2014. Proceedings, Part II, vol. 8713, Lecture Notes in Computer Science, pp. 219\u2013236. Springer (2014). https:\/\/doi.org\/10.1007\/978-3-319-11212-1_13","DOI":"10.1007\/978-3-319-11212-1_13"},{"key":"6_CR15","doi-asserted-by":"crossref","unstructured":"Clarkson, M.R., Myers, A.C., Schneider, F.B.: Belief in information flow. In: 18th IEEE Computer Security Foundations Workshop, (CSFW-18 2005), 20-22 June 2005, Aix-en-Provence, France. IEEE Computer Society, 2005, pp. 31\u201345 (2005)","DOI":"10.1109\/CSFW.2005.10"},{"key":"6_CR16","doi-asserted-by":"publisher","unstructured":"Clarkson, M.R., Schneider, F.B.: Quantification of integrity. Math. Struct. Comput. Sci. 25(2), 207\u2013258 (2015). https:\/\/doi.org\/10.1017\/S0960129513000595","DOI":"10.1017\/S0960129513000595"},{"key":"6_CR17","unstructured":"Cybersecurity Law of the People\u2019s Republic of China (2016). URL http:\/\/www.lawinfochina.com\/Display.aspx?LookType=3&Lib=law &Id=22826 &SearchKeyword= &SearchCKeyword= &paycode="},{"key":"6_CR18","doi-asserted-by":"publisher","unstructured":"Dwork, C., Roth, A.: The algorithmic foundations of differential privacy. Found. Trends Theor. Comput. Sci. 9(3\u20134), 211\u2013407 (2014). https:\/\/doi.org\/10.1561\/0400000042","DOI":"10.1561\/0400000042"},{"key":"6_CR19","unstructured":"European Parliament and Council of the European Union. Regulation (EU) 2016\/679 of the European Parliament and of the Council. URL https:\/\/data.europa.eu\/eli\/reg\/2016\/679\/oj"},{"key":"6_CR20","doi-asserted-by":"crossref","unstructured":"Gehr, T., Misailovic, S., Vechev, M.T.: PSI: exact symbolic inference for probabilistic programs. In: CAV\u201916, vol. 9779, LNCS, pp. 62\u201383 (2016)","DOI":"10.1007\/978-3-319-41528-4_4"},{"key":"6_CR21","doi-asserted-by":"crossref","unstructured":"Gehr, T., Steffen, S., Vechev, M.: $$\\lambda $$PSI: exact inference for higher-order probabilistic programs. In: PLDI\u201920, pp. 883\u2013897. ACM (2020). ISBN 978-1-4503-7613-6","DOI":"10.1145\/3385412.3386006"},{"key":"6_CR22","doi-asserted-by":"publisher","unstructured":"Del Grosso, G., Pichler, G., Palamidessi, C., Piantanida, P.: Bounding information leakage in machine learning. Neurocomputing 534, 1\u201317 (2023). https:\/\/doi.org\/10.1016\/J.NEUCOM.2023.02.058","DOI":"10.1016\/J.NEUCOM.2023.02.058"},{"key":"6_CR23","doi-asserted-by":"crossref","unstructured":"Hershey, J.R., Olsen, P.A.: Approximating the kullback leibler divergence between gaussian mixture models. In: 2007 IEEE International Conference on Acoustics, Speech and Signal Processing-ICASSP\u201907, vol. 4, pp. IV\u2013317. IEEE (2007)","DOI":"10.1109\/ICASSP.2007.366913"},{"key":"6_CR24","doi-asserted-by":"crossref","unstructured":"Huber, M.F., Bailey, T., Durrant-Whyte, H., Hanebeck, U.D.: On entropy approximation for gaussian mixture random vectors. In: 2008 IEEE International Conference on Multisensor Fusion and Integration for Intelligent Systems, pp. 181\u2013188. IEEE (2008)","DOI":"10.1109\/MFI.2008.4648062"},{"key":"6_CR25","doi-asserted-by":"crossref","unstructured":"Jansen, N., Kaminski, B.L., Katoen, J.P., Olmedo, F., Gretz, F., McIver, A.: Conditioning in probabilistic programming. In: MFPS, vol. 319, Electronic Notes in Theoretical Computer Science, pp. 199\u2013216. Elsevier (2015)","DOI":"10.1016\/j.entcs.2015.12.013"},{"key":"6_CR26","unstructured":"Kaminski, B.L.: Advanced weakest precondition calculi for probabilistic programs. PhD thesis, RWTH Aachen University, Germany (2019). http:\/\/publications.rwth-aachen.de\/record\/755408"},{"key":"6_CR27","doi-asserted-by":"crossref","unstructured":"Kozen, D.: Semantics of probabilistic programs. In: 20th Annual Symposium on Foundations of Computer Science (sfcs 1979), pp. 101\u2013114. IEEE (1979)","DOI":"10.1109\/SFCS.1979.38"},{"key":"6_CR28","doi-asserted-by":"crossref","unstructured":"Kucera, M., Tsankov, P., Gehr, T., Guarnieri, M., Vechev, M.T.: Synthesis of probabilistic privacy enforcement. In: CCS\u201917, pp. 391\u2013408. ACM (2017)","DOI":"10.1145\/3133956.3134079"},{"key":"6_CR29","doi-asserted-by":"publisher","unstructured":"Li, N., Li, T., Venkatasubramanian, S.: t-closeness: privacy beyond k-anonymity and l-diversity. In: Proceedings of the 23rd International Conference on Data Engineering, ICDE 2007, The Marmara Hotel, Istanbul, Turkey, April 15-20, 2007, pp. 106\u2013115. IEEE Computer Society (2007). https:\/\/doi.org\/10.1109\/ICDE.2007.367856","DOI":"10.1109\/ICDE.2007.367856"},{"key":"6_CR30","doi-asserted-by":"publisher","unstructured":"Mardziel, P., Alvim, M.S., Hicks, M.W., Clarkson, M.R.: Quantifying information flow for dynamic secrets. In: 2014 IEEE Symposium on Security and Privacy, SP 2014, Berkeley, CA, USA, May 18-21, 2014, pp. 540\u2013555. IEEE Computer Society (2014). ISBN 978-1-4799-4686-0. https:\/\/doi.org\/10.1109\/SP.2014.41","DOI":"10.1109\/SP.2014.41"},{"key":"6_CR31","doi-asserted-by":"publisher","unstructured":"McIver, A., Morgan, C.: Abstraction, Refinement and Proof for Probabilistic Systems. Monographs in Computer Science. Springer (2005). ISBN 978-0-387-40115-7. https:\/\/doi.org\/10.1007\/B138392","DOI":"10.1007\/B138392"},{"key":"6_CR32","doi-asserted-by":"crossref","unstructured":"Pardo, R., Rafnsson, W., Probst, C.W., Wasowski, A.: Privug: using probabilistic programming for quantifying leakage in privacy risk analysis. In: ESORICS\u201921, vol. 12973, LNCS. Springer (2021)","DOI":"10.1007\/978-3-030-88428-4_21"},{"key":"6_CR33","doi-asserted-by":"crossref","unstructured":"Randone, F., Bortolussi, L., Incerto, E., Tribastone, M.: Inference of probabilistic programs with moment-matching gaussian mixtures. Proc. ACM Program. Lang. 8(POPL), 1882\u20131912 (2024)","DOI":"10.1145\/3632905"},{"key":"6_CR34","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4757-4145-2","volume-title":"Robert and George Casella","author":"P Christian","year":"2004","unstructured":"Christian, P.: Robert and George Casella. Springer, Monte Carlo Statistical Methods (2004). https:\/\/doi.org\/10.1007\/978-1-4757-4145-2"},{"key":"6_CR35","doi-asserted-by":"crossref","unstructured":"Romanelli, M., Chatzikokolakis, K., Palamidessi, C., Piantanida, P.: Estimating g-leakage via machine learning. In: CCS\u201920. ACM (2020)","DOI":"10.1145\/3372297.3423363"},{"key":"6_CR36","doi-asserted-by":"publisher","unstructured":"Romanelli, M., Chatzikokolakis, K., Palamidessi, C., Piantanida, P.: Estimating g-leakage via machine learning. In: CCS \u201920: 2020 ACM SIGSAC Conference on Computer and Communications Security, Virtual Event, USA, November 9-13, 2020, pp. 697\u2013716. ACM, 2020. ISBN 978-1-4503-7089-9. https:\/\/doi.org\/10.1145\/3372297.3423363","DOI":"10.1145\/3372297.3423363"},{"key":"6_CR37","doi-asserted-by":"publisher","unstructured":"R\u00f8nneberg, R.C., Pardo, R., W\u0105sowski, A.: Exact and efficient bayesian inference for privacy risk quantification. In: Proceedings of 21st International Conference on Software Engineering and Formal Methods, SEFM 2023, vol. 14323, Lecture Notes in Computer Science, pp. 263\u2013281. Springer (2023). https:\/\/doi.org\/10.1007\/978-3-031-47115-5_15","DOI":"10.1007\/978-3-031-47115-5_15"},{"key":"6_CR38","unstructured":"R\u00f8nneberg, R.C., Randone, F., Pardo, R., W\u0105sowski, A.: Quantifying privacy risk with gaussian mixtures (2024). Under submission"},{"key":"6_CR39","doi-asserted-by":"publisher","unstructured":"Schr\u00f6er, P., Batz, K., Kaminski, B.L., Katoen, J.P., Matheja, C.: A deductive verification infrastructure for probabilistic programs. Proc. ACM Program. Lang. 7(OOPSLA2), oct 2023. https:\/\/doi.org\/10.1145\/3622870","DOI":"10.1145\/3622870"},{"key":"6_CR40","unstructured":"Claude, E.: Shannon and Warren Weaver. The Mathematical Theory of Communication. University of Illinois Press, Urbana, IL (1949)978-0-252-72548-7"},{"key":"6_CR41","doi-asserted-by":"publisher","unstructured":"Smith, G.: On the Foundations of Quantitative Information Flow. In: Foundations of Software Science and Computational Structures, 12th International Conference, FOSSACS 2009, Held as Part of the Joint European Conferences on Theory and Practice of Software, ETAPS 2009, York, UK, March 22-29, 2009. Proceedings. Vol. 5504. Lecture Notes in Computer Science. Springer, 2009, pp. 288\u2013302. https:\/\/doi.org\/10.1007\/978-3-642-00596-1_21","DOI":"10.1007\/978-3-642-00596-1_21"},{"key":"6_CR42","doi-asserted-by":"crossref","unstructured":"Sweeney, L.: k-anonymity: A model for protecting privacy. Internat. J. Uncertain. Fuzziness Knowl. Based Syst. 10(05), 557\u2013570 (2002)","DOI":"10.1142\/S0218488502001648"},{"key":"6_CR43","doi-asserted-by":"publisher","unstructured":"Tizpaz-Niari, S., Cern\u00fd, P., Trivedi, A.: Quantitative mitigation of timing side channels. In: Computer Aided Verification - 31st International Conference, CAV 2019, New York City, NY, USA, July 15-18, 2019, Proceedings, Part I, vol. 11561, Lecture Notes in Computer Science, pp. 140\u2013160. Springer, 2019. ISBN 978-3-030-25539-8. https:\/\/doi.org\/10.1007\/978-3-030-25540-4_8","DOI":"10.1007\/978-3-030-25540-4_8"},{"key":"6_CR44","unstructured":"U.S. Congress. Health Insurance Portability and Accountability Act of 1996. Public Law 104-191 (1996)"},{"key":"6_CR45","unstructured":"Weisstein, E.W.: Normal product distribution. From MathWorld\u2014A Wolfram Web Resource. URL https:\/\/mathworld.wolfram.com\/NormalProductDistribution.html"}],"container-title":["Lecture Notes in Computer Science","Principles of Verification: Cycling the Probabilistic Landscape"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-75783-9_6","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,11,12]],"date-time":"2024-11-12T07:02:38Z","timestamp":1731394958000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-75783-9_6"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,11,13]]},"ISBN":["9783031757822","9783031757839"],"references-count":45,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-75783-9_6","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2024,11,13]]},"assertion":[{"value":"13 November 2024","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}