Are We There Yet? Timing and Floating-Point Attacks on Differential Privacy Systems

Are We There Yet? Timing and Floating-Point Attacks on Differential Privacy Systems

IEEE Symposium on Security and Privacy via YouTube Direct link

FP Attack: IsFeasible(s)

11 of 19

11 of 19

FP Attack: IsFeasible(s)

Class Central Classrooms beta

YouTube videos curated by Class Central.

Classroom Contents

Are We There Yet? Timing and Floating-Point Attacks on Differential Privacy Systems

Automatically move to the next video in the Classroom when playback concludes

  1. 1 Intro
  2. 2 Contributions
  3. 3 Data Analysis: Privacy Leakage
  4. 4 Data Analysis: Differential Privacy
  5. 5 DP: Additive Noise
  6. 6 DP: Deployments and Libraries
  7. 7 Threat model
  8. 8 FP Attack: FP Implementation
  9. 9 FP Attack: Impossible Outputs
  10. 10 FP Attack: Gaussian Implementation
  11. 11 FP Attack: IsFeasible(s)
  12. 12 FP Attack: Attack Results
  13. 13 FP Attack: DP-SGD
  14. 14 Discrete Distributions: Implementation
  15. 15 Discrete Distributions: Timing Side-Channel
  16. 16 Timing Attack: Positive Correlation
  17. 17 Timing Attack: Attack Results
  18. 18 Mitigation: FP attack
  19. 19 Mitigation: Timing attack

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.