How to Break, Then Fix, Differential Privacy on Finite Computers
Offered By: USENIX via YouTube
Course Description
Overview
Explore the challenges and vulnerabilities in implementing differential privacy in this 16-minute conference talk from PEPR '23. Discover the similarities between differential privacy and cryptography, focusing on the complexities of implementation despite conceptually simple building blocks. Learn about precision-based attacks, a new class of vulnerabilities affecting open-source libraries, and understand how to assess the severity of such vulnerabilities in differential privacy software. Gain insights into a novel technique for addressing floating-point behavior-based vulnerabilities and other potential attack vectors. Enhance your understanding of the practical aspects of differential privacy implementation and security.
Syllabus
PEPR '23 - How to Break, Then Fix, Differential Privacy on Finite Computers
Taught by
USENIX
Related Courses
Understanding and Prioritizing Data PrivacyLinkedIn Learning Understanding and Prioritizing Data Privacy
LinkedIn Learning Data Ethics and Privacy Engineering in Cybersecurity
RSA Conference via YouTube From Privacy by Design to Data Protection by Design - The Challenges of Turning Good Practice into a Legal Obligation
USENIX via YouTube All Our APIs Are Belong to Us
OWASP Foundation via YouTube