How to Break, Then Fix, Differential Privacy on Finite Computers
Offered By: USENIX via YouTube
Course Description
Overview
Explore the challenges and vulnerabilities in implementing differential privacy in this 16-minute conference talk from PEPR '23. Discover the similarities between differential privacy and cryptography, focusing on the complexities of implementation despite conceptually simple building blocks. Learn about precision-based attacks, a new class of vulnerabilities affecting open-source libraries, and understand how to assess the severity of such vulnerabilities in differential privacy software. Gain insights into a novel technique for addressing floating-point behavior-based vulnerabilities and other potential attack vectors. Enhance your understanding of the practical aspects of differential privacy implementation and security.
Syllabus
PEPR '23 - How to Break, Then Fix, Differential Privacy on Finite Computers
Taught by
USENIX
Related Courses
Applied CryptographyUniversity of Virginia via Udacity Cryptography II
Stanford University via Coursera Coding the Matrix: Linear Algebra through Computer Science Applications
Brown University via Coursera Cryptography I
Stanford University via Coursera Unpredictable? Randomness, Chance and Free Will
National University of Singapore via Coursera