Reliably determining data leakage in the presence of strong attackers