Главная
Study mode:
on
1
Intro
2
Contributions
3
Data Analysis: Privacy Leakage
4
Data Analysis: Differential Privacy
5
DP: Additive Noise
6
DP: Deployments and Libraries
7
Threat model
8
FP Attack: FP Implementation
9
FP Attack: Impossible Outputs
10
FP Attack: Gaussian Implementation
11
FP Attack: IsFeasible(s)
12
FP Attack: Attack Results
13
FP Attack: DP-SGD
14
Discrete Distributions: Implementation
15
Discrete Distributions: Timing Side-Channel
16
Timing Attack: Positive Correlation
17
Timing Attack: Attack Results
18
Mitigation: FP attack
19
Mitigation: Timing attack
Description:
Explore timing and floating-point attacks on differential privacy systems in this IEEE conference talk. Delve into data analysis privacy leakage, differential privacy concepts, and additive noise techniques. Examine threat models, floating-point implementations, and attacks on Gaussian mechanisms. Investigate discrete distributions, timing side-channels, and positive correlations in timing attacks. Learn about mitigation strategies for both floating-point and timing attacks, gaining insights into the vulnerabilities and defenses of privacy-preserving systems.

Are We There Yet? Timing and Floating-Point Attacks on Differential Privacy Systems

IEEE
Add to list
0:00 / 0:00