Detecting violations of differential privacy

Z Ding, Y Wang, G Wang, D Zhang, D Kifer - Proceedings of the 2018 …, 2018 - dl.acm.org
The widespread acceptance of differential privacy has led to the publication of many
sophisticated algorithms for protecting privacy. However, due to the subtle nature of this …

Reproducibility in learning

R Impagliazzo, R Lei, T Pitassi, J Sorrell - Proceedings of the 54th annual …, 2022 - dl.acm.org
We introduce the notion of a reproducible algorithm in the context of learning. A reproducible
learning algorithm is resilient to variations in its samples—with high probability, it returns the …

Dp-sniper: Black-box discovery of differential privacy violations using classifiers

B Bichsel, S Steffen, I Bogunovic… - 2021 IEEE Symposium …, 2021 - ieeexplore.ieee.org
We present DP-Sniper, a practical black-box method that automatically finds violations of
differential privacy. DP-Sniper is based on two key ideas:(i) training a classifier to predict if …

Group and attack: Auditing differential privacy

J Lokna, A Paradis, DI Dimitrov, M Vechev - Proceedings of the 2023 …, 2023 - dl.acm.org
(ε, δ) differential privacy has seen increased adoption recently, especially in private machine
learning applications. While this privacy definition allows provably limiting the amount of …

Orchard: Differentially private analytics at scale

E Roth, H Zhang, A Haeberlen, BC Pierce - 14th USENIX Symposium on …, 2020 - usenix.org
This paper presents Orchard, a system that can answer queries about sensitive data that is
held by millions of user devices, with strong differential privacy guarantees. Orchard …

Dp-finder: Finding differential privacy violations by sampling and optimization

B Bichsel, T Gehr, D Drachsler-Cohen… - Proceedings of the …, 2018 - dl.acm.org
We present DP-Finder, a novel approach and system that automatically derives lower
bounds on the differential privacy enforced by algorithms. Lower bounds are practically …

Mycelium: Large-scale distributed graph queries with differential privacy

E Roth, K Newatia, Y Ma, K Zhong, S Angel… - Proceedings of the …, 2021 - dl.acm.org
This paper introduces Mycelium, the first system to process differentially private queries over
large graphs that are distributed across millions of user devices. Such graphs occur, for …

Checkdp: An automated and integrated approach for proving differential privacy or finding precise counterexamples

Y Wang, Z Ding, D Kifer, D Zhang - Proceedings of the 2020 ACM …, 2020 - dl.acm.org
We propose CheckDP, an automated and integrated approach for proving or disproving
claims that a mechanism is differentially private. CheckDP can find counterexamples for …

Guidelines for implementing and auditing differentially private systems

D Kifer, S Messing, A Roth, A Thakurta… - arXiv preprint arXiv …, 2020 - arxiv.org
Differential privacy is an information theoretic constraint on algorithms and code. It provides
quantification of privacy leakage and formal privacy guarantees that are currently …

Symbolic execution for randomized programs

Z Susag, S Lahiri, J Hsu, S Roy - Proceedings of the ACM on …, 2022 - dl.acm.org
We propose a symbolic execution method for programs that can draw random samples. In
contrast to existing work, our method can verify randomized programs with unknown inputs …