YoVDO

How to Break, Then Fix, Differential Privacy on Finite Computers

Offered By: USENIX via YouTube

Tags

Differential Privacy Courses Cryptography Courses Security Assessment Courses Privacy Engineering Courses

Course Description

Overview

Save Big on Coursera Plus. 7,000+ courses at $160 off. Limited Time Only!
Explore the challenges and vulnerabilities in implementing differential privacy in this 16-minute conference talk from PEPR '23. Discover the similarities between differential privacy and cryptography, focusing on the complexities of implementation despite conceptually simple building blocks. Learn about precision-based attacks, a new class of vulnerabilities affecting open-source libraries, and understand how to assess the severity of such vulnerabilities in differential privacy software. Gain insights into a novel technique for addressing floating-point behavior-based vulnerabilities and other potential attack vectors. Enhance your understanding of the practical aspects of differential privacy implementation and security.

Syllabus

PEPR '23 - How to Break, Then Fix, Differential Privacy on Finite Computers


Taught by

USENIX

Related Courses

Statistical Machine Learning
Carnegie Mellon University via Independent
Secure and Private AI
Facebook via Udacity
Data Privacy and Anonymization in R
DataCamp
Build and operate machine learning solutions with Azure Machine Learning
Microsoft via Microsoft Learn
Data Privacy and Anonymization in Python
DataCamp