all InfoSec news
Precision-based attacks and interval refining: how to break, then fix, differential privacy on finite computers. (arXiv:2207.13793v1 [cs.CR])
July 29, 2022, 1:20 a.m. | Samuel Haney, Damien Desfontaines, Luke Hartman, Ruchit Shrestha, Michael Hay
cs.CR updates on arXiv.org arxiv.org
Despite being raised as a problem over ten years ago, the imprecision of
floating point arithmetic continues to cause privacy failures in the
implementations of differentially private noise mechanisms. In this paper, we
highlight a new class of vulnerabilities, which we call \emph{precision-based
attacks}, and which affect several open source libraries. To address this
vulnerability and implement differentially private mechanisms on floating-point
space in a safe way, we propose a novel technique, called \emph{interval
refining}. This technique has minimal error, …
More from arxiv.org / cs.CR updates on arXiv.org
Jobs in InfoSec / Cybersecurity
SOC 2 Manager, Audit and Certification
@ Deloitte | US and CA Multiple Locations
Cyber Systems Administration
@ Peraton | Washington, DC, United States
Android Security Engineer, Public Sector
@ Google | Reston, VA, USA
Lead Electronic Security Engineer, CPP - Federal Facilities - Hybrid
@ Black & Veatch | Denver, CO, US
Profissional Sênior de Compliance & Validação em TI - Montes Claros (MG)
@ Novo Nordisk | Montes Claros, Minas Gerais, BR
Principal Engineer, Product Security Engineering
@ Google | Sunnyvale, CA, USA