Synthetic Data--what, why and how?

J Jordon, L Szpruch, F Houssiau, M Bottarelli… - arXiv preprint arXiv …, 2022 - arxiv.org
This explainer document aims to provide an overview of the current state of the rapidly
expanding work on synthetic data technologies, with a particular focus on privacy. The …

An operational approach to information leakage

I Issa, AB Wagner, S Kamath - IEEE Transactions on …, 2019 - ieeexplore.ieee.org
Given two random variables X and Y, an operational approach is undertaken to quantify the
“leakage” of information from X to Y. The resulting measure L (X→ Y) is called maximal …

Privacy games: Optimal user-centric data obfuscation

R Shokri - arXiv preprint arXiv:1402.3426, 2014 - arxiv.org
In this paper, we design user-centric obfuscation mechanisms that impose the minimum
utility loss for guaranteeing user's privacy. We optimize utility subject to a joint guarantee of …

Decomposition instead of self-composition for proving the absence of timing channels

T Antonopoulos, P Gazzillo, M Hicks, E Koskinen… - ACM SIGPLAN …, 2017 - dl.acm.org
We present a novel approach to proving the absence of timing channels. The idea is to
partition the program's execution traces in such a way that each partition component is …

An operational measure of information leakage

I Issa, S Kamath, AB Wagner - 2016 Annual Conference on …, 2016 - ieeexplore.ieee.org
Given two discrete random variables X and Y, an operational approach is undertaken to
quantify the “leakage” of information from X to Y. The resulting measure ℒ (X→ Y) is called …

Pointwise maximal leakage

S Saeidian, G Cervia, TJ Oechtering… - IEEE Transactions on …, 2023 - ieeexplore.ieee.org
We introduce a privacy measure called pointwise maximal leakage, generalizing the pre-
existing notion of maximal leakage, which quantifies the amount of information leaking about …

Additive and multiplicative notions of leakage, and their capacities

MS Alvim, K Chatzikokolakis, A McIver… - 2014 IEEE 27th …, 2014 - ieeexplore.ieee.org
Protecting sensitive information from improper disclosure is a fundamental security goal. It is
complicated, and difficult to achieve, often because of unavoidable or even unpredictable …

Hypothesis testing under maximal leakage privacy constraints

J Liao, L Sankar, FP Calmon… - 2017 IEEE International …, 2017 - ieeexplore.ieee.org
The problem of publishing privacy-guaranteed data for hypothesis testing is studied using
the maximal leakage (ML) as a metric for privacy and the type-II error exponent as the utility …

Qif-verilog: Quantitative information-flow based hardware description languages for pre-silicon security assessment

X Guo, RG Dutta, J He… - … on Hardware Oriented …, 2019 - ieeexplore.ieee.org
Hardware vulnerabilities are often due to design mistakes because the designer does not
sufficiently consider potential security vulnerabilities at the design stage. As a result, various …

Recent developments in quantitative information flow (invited tutorial)

G Smith - 2015 30th Annual ACM/IEEE Symposium on Logic in …, 2015 - ieeexplore.ieee.org
In computer security, it is frequently necessary in practice to accept some leakage of
confidential information. This motivates the development of theories of Quantitative …