Practical End-to-End Analysis of Information Flow Security Policies