Learn Generative AI, Prompt Engineering, and LLMs for Free
Learn AI, Data Science & Business — Earn Certificates That Get You Hired
Overview
Google, IBM & Meta Certificates — All 10,000+ Courses at 40% Off
One annual plan covers every course and certificate on Coursera. 40% off for a limited time.
Get Full Access
Explore timing and floating-point attacks on differential privacy systems in this IEEE conference talk. Delve into data analysis privacy leakage, differential privacy concepts, and additive noise techniques. Examine threat models, floating-point implementations, and attacks on Gaussian mechanisms. Investigate discrete distributions, timing side-channels, and positive correlations in timing attacks. Learn about mitigation strategies for both floating-point and timing attacks, gaining insights into the vulnerabilities and defenses of privacy-preserving systems.
Syllabus
Intro
Contributions
Data Analysis: Privacy Leakage
Data Analysis: Differential Privacy
DP: Additive Noise
DP: Deployments and Libraries
Threat model
FP Attack: FP Implementation
FP Attack: Impossible Outputs
FP Attack: Gaussian Implementation
FP Attack: IsFeasible(s)
FP Attack: Attack Results
FP Attack: DP-SGD
Discrete Distributions: Implementation
Discrete Distributions: Timing Side-Channel
Timing Attack: Positive Correlation
Timing Attack: Attack Results
Mitigation: FP attack
Mitigation: Timing attack
Taught by
IEEE Symposium on Security and Privacy