Proving only over source code that programs do not leak sensitive data leaves a gap between reasoning and reality can be filled by accounting for the behaviour of compiler. Furthermore, software does always have luxury limiting itself to single-threaded computation with resources statically dedicated each user ensure confidentiality their data. This results in mixed-sensitivity concurrent progr...