“…Probabilistic noninterference [ 28 , 29 , 30 ] and observational determinism [ 10 , 31 , 32 , 33 , 34 , 35 ] have been used as information flow properties to characterize the security of concurrent programs. For verifying these security properties, type systems [ 28 , 29 , 31 , 32 ], algorithmic verification [ 10 , 30 , 33 , 34 ], program analysis [ 35 ], and logics [ 36 , 37 , 38 ] have been utilized. In qualitative information flow, the security property gets rejected when there is a leakage, even a minor one.…”