Techniques for Security Checking: Non Interference vs Control Flow Analysis