{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,18]],"date-time":"2025-11-18T12:13:39Z","timestamp":1763468019282,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":19,"publisher":"ACM","license":[{"start":{"date-parts":[[2010,12,6]],"date-time":"2010-12-06T00:00:00Z","timestamp":1291593600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/501100000266","name":"Engineering and Physical Sciences Research Council","doi-asserted-by":"publisher","award":["EP\/F023766\/1"],"award-info":[{"award-number":["EP\/F023766\/1"]}],"id":[{"id":"10.13039\/501100000266","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2010,12,6]]},"DOI":"10.1145\/1920261.1920300","type":"proceedings-article","created":{"date-parts":[[2010,12,20]],"date-time":"2010-12-20T16:13:47Z","timestamp":1292861627000},"page":"261-269","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":74,"title":["Quantifying information leaks in software"],"prefix":"10.1145","author":[{"given":"Jonathan","family":"Heusser","sequence":"first","affiliation":[{"name":"Queen Mary University of London"}]},{"given":"Pasquale","family":"Malacaria","sequence":"additional","affiliation":[{"name":"Queen Mary University of London"}]}],"member":"320","published-online":{"date-parts":[[2010,12,6]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2009.18"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.5555\/1009380.1009669"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.5555\/1370628.1370629"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1093\/logcom\/exi009"},{"volume-title":"A Tool for Checking ANSI-C Programs. Tools and Algorithms for the Construction and Analysis of Systems (TACAS","year":"2004","key":"e_1_3_2_1_5_1","unstructured":"Clarke, Edmund, and Kroening, Daniel, and Lerda, Flavio : A Tool for Checking ANSI-C Programs. Tools and Algorithms for the Construction and Analysis of Systems (TACAS 2004 ). Springer , 168--176, Volume 2988 Clarke, Edmund, and Kroening, Daniel, and Lerda, Flavio: A Tool for Checking ANSI-C Programs. Tools and Algorithms for the Construction and Analysis of Systems (TACAS 2004). Springer, 168--176, Volume 2988"},{"key":"e_1_3_2_1_6_1","unstructured":"http:\/\/www.cprover.org\/cbmc\/applications.shtml -- Checked 17 June 2010.  http:\/\/www.cprover.org\/cbmc\/applications.shtml -- Checked 17 June 2010."},{"volume-title":"Jose Meseguer: Security Policies and Security Models. IEEE Symposium on Security and Privacy 1982: 11--20","author":"Goguen Joseph A.","key":"e_1_3_2_1_7_1","unstructured":"Joseph A. Goguen , Jose Meseguer: Security Policies and Security Models. IEEE Symposium on Security and Privacy 1982: 11--20 Joseph A. Goguen, Jose Meseguer: Security Policies and Security Models. IEEE Symposium on Security and Privacy 1982: 11--20"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-12459-4_8"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1109\/CSF.2010.8"},{"volume-title":"Proc. of the IEEE Computer Security Foundations Workshop. IEEE Computer Society Press","year":"1993","key":"e_1_3_2_1_10_1","unstructured":"Landauer, J., and Redmond, T .: A Lattice of Information . In Proc. of the IEEE Computer Security Foundations Workshop. IEEE Computer Society Press , 1993 . Landauer, J., and Redmond, T.: A Lattice of Information. In Proc. of the IEEE Computer Security Foundations Workshop. IEEE Computer Society Press, 1993."},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1145\/1190216.1190251"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1145\/1375696.1375713"},{"key":"e_1_3_2_1_13_1","volume-title":"Formal Methods for Quantitative Aspects of Programming Languages, LNCS","author":"Malacaria Pasquale","year":"2010","unstructured":"Pasquale Malacaria and Jonathan Heusser : Information Theory and Security: Quantitative Information Flow . In Formal Methods for Quantitative Aspects of Programming Languages, LNCS , Springer Verlag , 2010 Pasquale Malacaria and Jonathan Heusser: Information Theory and Security: Quantitative Information Flow. In Formal Methods for Quantitative Aspects of Programming Languages, LNCS, Springer Verlag, 2010"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1145\/1375581.1375606"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1145\/1554339.1554349"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1109\/CSAC.2005.39"},{"key":"e_1_3_2_1_17_1","volume-title":"Proceedings of the 5th and 6th International SPIN Workshops on Theoretical and Practical Aspects of SPIN Model Checking","author":"Dwyer Corina","year":"1999","unstructured":"Pasareanu, Corina S. and Dwyer , Matthew B. and Huth , Michael: Assume-Guarantee Model Checking of Software: A Comparative Case Study . Proceedings of the 5th and 6th International SPIN Workshops on Theoretical and Practical Aspects of SPIN Model Checking , 1999 Pasareanu, Corina S. and Dwyer, Matthew B. and Huth, Michael: Assume-Guarantee Model Checking of Software: A Comparative Case Study. Proceedings of the 5th and 6th International SPIN Workshops on Theoretical and Practical Aspects of SPIN Model Checking, 1999"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1007\/11547662_24"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1109\/CSF.2010.9"}],"event":{"name":"ACSAC '10: 2010 Annual Computer Security Applications Conference","sponsor":["ACSA Applied Computing Security Assoc"],"location":"Austin Texas USA","acronym":"ACSAC '10"},"container-title":["Proceedings of the 26th Annual Computer Security Applications Conference"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1920261.1920300","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/1920261.1920300","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T10:59:43Z","timestamp":1750244383000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1920261.1920300"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2010,12,6]]},"references-count":19,"alternative-id":["10.1145\/1920261.1920300","10.1145\/1920261"],"URL":"https:\/\/doi.org\/10.1145\/1920261.1920300","relation":{},"subject":[],"published":{"date-parts":[[2010,12,6]]},"assertion":[{"value":"2010-12-06","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}