YoVDO

Are We There Yet? Timing and Floating-Point Attacks on Differential Privacy Systems

Offered By: IEEE via YouTube

Tags

Differential Privacy Courses Data Analysis Courses Cybersecurity Courses Data Privacy Courses Threat Models Courses

Course Description

Overview

Explore timing and floating-point attacks on differential privacy systems in this IEEE conference talk. Delve into data analysis privacy leakage, differential privacy concepts, and additive noise techniques. Examine threat models, floating-point implementations, and attacks on Gaussian mechanisms. Investigate discrete distributions, timing side-channels, and positive correlations in timing attacks. Learn about mitigation strategies for both floating-point and timing attacks, gaining insights into the vulnerabilities and defenses of privacy-preserving systems.

Syllabus

Intro
Contributions
Data Analysis: Privacy Leakage
Data Analysis: Differential Privacy
DP: Additive Noise
DP: Deployments and Libraries
Threat model
FP Attack: FP Implementation
FP Attack: Impossible Outputs
FP Attack: Gaussian Implementation
FP Attack: IsFeasible(s)
FP Attack: Attack Results
FP Attack: DP-SGD
Discrete Distributions: Implementation
Discrete Distributions: Timing Side-Channel
Timing Attack: Positive Correlation
Timing Attack: Attack Results
Mitigation: FP attack
Mitigation: Timing attack


Taught by

IEEE Symposium on Security and Privacy

Tags

Related Courses

Introduction to Data Analytics for Business
University of Colorado Boulder via Coursera
Digital and the Everyday: from codes to cloud
NPTEL via Swayam
Systems and Application Security
(ISC)² via Coursera
Protecting Health Data in the Modern Age: Getting to Grips with the GDPR
University of Groningen via FutureLearn
Teaching Impacts of Technology: Data Collection, Use, and Privacy
University of California, San Diego via Coursera