“…Although some verification tools have been developed for this application [6,7,10,13,14,20,26,27,47], they are either fast but inaccurate (e.g., type-inference techniques) or accurate but slow (e.g., model-counting techniques). For example, Bayrak et al [10] developed a leak detector that checks if a computation result is logically dependent of the secret and, at the same time, logically independent of any random variable.…”