July 29, 2022, 1:20 a.m. | Samuel Haney, Damien Desfontaines, Luke Hartman, Ruchit Shrestha, Michael Hay

cs.CR updates on arXiv.org arxiv.org

Despite being raised as a problem over ten years ago, the imprecision of
floating point arithmetic continues to cause privacy failures in the
implementations of differentially private noise mechanisms. In this paper, we
highlight a new class of vulnerabilities, which we call \emph{precision-based
attacks}, and which affect several open source libraries. To address this
vulnerability and implement differentially private mechanisms on floating-point
space in a safe way, we propose a novel technique, called \emph{interval
refining}. This technique has minimal error, …

attacks computers differential privacy fix privacy

SOC 2 Manager, Audit and Certification

@ Deloitte | US and CA Multiple Locations

Cyber Systems Administration

@ Peraton | Washington, DC, United States

Android Security Engineer, Public Sector

@ Google | Reston, VA, USA

Lead Electronic Security Engineer, CPP - Federal Facilities - Hybrid

@ Black & Veatch | Denver, CO, US

Profissional Sênior de Compliance & Validação em TI - Montes Claros (MG)

@ Novo Nordisk | Montes Claros, Minas Gerais, BR

Principal Engineer, Product Security Engineering

@ Google | Sunnyvale, CA, USA