Synthetic Data--what, why and how?
This explainer document aims to provide an overview of the current state of the rapidly
expanding work on synthetic data technologies, with a particular focus on privacy. The …
expanding work on synthetic data technologies, with a particular focus on privacy. The …
An operational approach to information leakage
Given two random variables X and Y, an operational approach is undertaken to quantify the
“leakage” of information from X to Y. The resulting measure L (X→ Y) is called maximal …
“leakage” of information from X to Y. The resulting measure L (X→ Y) is called maximal …
Privacy games: Optimal user-centric data obfuscation
R Shokri - arXiv preprint arXiv:1402.3426, 2014 - arxiv.org
In this paper, we design user-centric obfuscation mechanisms that impose the minimum
utility loss for guaranteeing user's privacy. We optimize utility subject to a joint guarantee of …
utility loss for guaranteeing user's privacy. We optimize utility subject to a joint guarantee of …
Decomposition instead of self-composition for proving the absence of timing channels
We present a novel approach to proving the absence of timing channels. The idea is to
partition the program's execution traces in such a way that each partition component is …
partition the program's execution traces in such a way that each partition component is …
An operational measure of information leakage
Given two discrete random variables X and Y, an operational approach is undertaken to
quantify the “leakage” of information from X to Y. The resulting measure ℒ (X→ Y) is called …
quantify the “leakage” of information from X to Y. The resulting measure ℒ (X→ Y) is called …
Pointwise maximal leakage
We introduce a privacy measure called pointwise maximal leakage, generalizing the pre-
existing notion of maximal leakage, which quantifies the amount of information leaking about …
existing notion of maximal leakage, which quantifies the amount of information leaking about …
Additive and multiplicative notions of leakage, and their capacities
Protecting sensitive information from improper disclosure is a fundamental security goal. It is
complicated, and difficult to achieve, often because of unavoidable or even unpredictable …
complicated, and difficult to achieve, often because of unavoidable or even unpredictable …
Hypothesis testing under maximal leakage privacy constraints
The problem of publishing privacy-guaranteed data for hypothesis testing is studied using
the maximal leakage (ML) as a metric for privacy and the type-II error exponent as the utility …
the maximal leakage (ML) as a metric for privacy and the type-II error exponent as the utility …
Qif-verilog: Quantitative information-flow based hardware description languages for pre-silicon security assessment
Hardware vulnerabilities are often due to design mistakes because the designer does not
sufficiently consider potential security vulnerabilities at the design stage. As a result, various …
sufficiently consider potential security vulnerabilities at the design stage. As a result, various …
Recent developments in quantitative information flow (invited tutorial)
G Smith - 2015 30th Annual ACM/IEEE Symposium on Logic in …, 2015 - ieeexplore.ieee.org
In computer security, it is frequently necessary in practice to accept some leakage of
confidential information. This motivates the development of theories of Quantitative …
confidential information. This motivates the development of theories of Quantitative …