Security Analysis with Deviational Techniques