Class Central is learner-supported. When you buy through links on our site, we may earn an affiliate commission.

YouTube

How to Break, Then Fix, Differential Privacy on Finite Computers

USENIX via YouTube

Overview

Explore the challenges and vulnerabilities in implementing differential privacy in this 16-minute conference talk from PEPR '23. Discover the similarities between differential privacy and cryptography, focusing on the complexities of implementation despite conceptually simple building blocks. Learn about precision-based attacks, a new class of vulnerabilities affecting open-source libraries, and understand how to assess the severity of such vulnerabilities in differential privacy software. Gain insights into a novel technique for addressing floating-point behavior-based vulnerabilities and other potential attack vectors. Enhance your understanding of the practical aspects of differential privacy implementation and security.

Syllabus

PEPR '23 - How to Break, Then Fix, Differential Privacy on Finite Computers

Taught by

USENIX

Reviews

Start your review of How to Break, Then Fix, Differential Privacy on Finite Computers

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.