YoVDO

How to Break, Then Fix, Differential Privacy on Finite Computers

Offered By: USENIX via YouTube

Tags

Differential Privacy Courses Cryptography Courses Security Assessment Courses Privacy Engineering Courses

Course Description

Overview

Save Big on Coursera Plus. 7,000+ courses at $160 off. Limited Time Only!
Explore the challenges and vulnerabilities in implementing differential privacy in this 16-minute conference talk from PEPR '23. Discover the similarities between differential privacy and cryptography, focusing on the complexities of implementation despite conceptually simple building blocks. Learn about precision-based attacks, a new class of vulnerabilities affecting open-source libraries, and understand how to assess the severity of such vulnerabilities in differential privacy software. Gain insights into a novel technique for addressing floating-point behavior-based vulnerabilities and other potential attack vectors. Enhance your understanding of the practical aspects of differential privacy implementation and security.

Syllabus

PEPR '23 - How to Break, Then Fix, Differential Privacy on Finite Computers


Taught by

USENIX

Related Courses

Identifying, Monitoring, and Analyzing Risk and Incident Response and Recovery
(ISC)² via Coursera
Temel Seviye Etik Hacker Eğitimi
Udemy
Managing Microsoft Azure Security
Pluralsight
Security Control Assessment
Pluralsight
Security Assessment and Testing for CISSP®

Pluralsight