YoVDO

How to Break, Then Fix, Differential Privacy on Finite Computers

Offered By: USENIX via YouTube

Tags

Differential Privacy Courses Cryptography Courses Security Assessment Courses Privacy Engineering Courses

Course Description

Overview

Save Big on Coursera Plus. 7,000+ courses at $160 off. Limited Time Only!
Explore the challenges and vulnerabilities in implementing differential privacy in this 16-minute conference talk from PEPR '23. Discover the similarities between differential privacy and cryptography, focusing on the complexities of implementation despite conceptually simple building blocks. Learn about precision-based attacks, a new class of vulnerabilities affecting open-source libraries, and understand how to assess the severity of such vulnerabilities in differential privacy software. Gain insights into a novel technique for addressing floating-point behavior-based vulnerabilities and other potential attack vectors. Enhance your understanding of the practical aspects of differential privacy implementation and security.

Syllabus

PEPR '23 - How to Break, Then Fix, Differential Privacy on Finite Computers


Taught by

USENIX

Related Courses

Understanding and Prioritizing Data Privacy
LinkedIn Learning
Understanding and Prioritizing Data Privacy
LinkedIn Learning
Data Ethics and Privacy Engineering in Cybersecurity
RSA Conference via YouTube
From Privacy by Design to Data Protection by Design - The Challenges of Turning Good Practice into a Legal Obligation
USENIX via YouTube
All Our APIs Are Belong to Us
OWASP Foundation via YouTube