Proving differential privacy with shadow execution
暂无分享,去创建一个
Danfeng Zhang | Daniel Kifer | Yuxin Wang | Zeyu Ding | Guanhong Wang | Daniel Kifer | Danfeng Zhang | Zeyu Ding | Yuxin Wang | Guanhong Wang
[1] George Danezis,et al. Verified Computational Differential Privacy with Applications to Smart Metering , 2013, 2013 IEEE 26th Computer Security Foundations Symposium.
[2] Úlfar Erlingsson,et al. RAPPOR: Randomized Aggregatable Privacy-Preserving Ordinal Response , 2014, CCS.
[3] Dawn Xiaodong Song,et al. Towards Practical Differential Privacy for SQL Queries , 2017, Proc. VLDB Endow..
[4] Elaine Shi,et al. Private and Continual Release of Statistics , 2010, TSEC.
[5] Dilsun Kirli Kaynar,et al. Formal Verification of Differential Privacy for Interactive Systems , 2011, ArXiv.
[6] Nikolaj Bjørner,et al. Z3: An Efficient SMT Solver , 2008, TACAS.
[7] Andrew C. Myers,et al. Language-based information-flow security , 2003, IEEE J. Sel. Areas Commun..
[8] Moni Naor,et al. Differential privacy under continual observation , 2010, STOC '10.
[9] Kunal Talwar,et al. Mechanism Design via Differential Privacy , 2007, 48th Annual IEEE Symposium on Foundations of Computer Science (FOCS'07).
[10] Thomas Steinke,et al. Differential Privacy: A Primer for a Non-Technical Audience , 2018 .
[11] Moni Naor,et al. Our Data, Ourselves: Privacy Via Distributed Noise Generation , 2006, EUROCRYPT.
[12] Timon Gehr,et al. DP-Finder: Finding Differential Privacy Violations by Sampling and Optimization , 2018, CCS.
[13] Gilles Barthe,et al. Probabilistic Relational Reasoning for Differential Privacy , 2012, TOPL.
[14] Aws Albarghouthi,et al. Synthesizing coupling proofs of differential privacy , 2017, Proc. ACM Program. Lang..
[15] Katrina Ligett,et al. A Simple and Practical Algorithm for Differentially Private Data Release , 2010, NIPS.
[16] Gilles Barthe,et al. Beyond Differential Privacy: Composition Theorems and Relational Logic for f-divergences between Probabilistic Programs , 2013, ICALP.
[17] Jochen Hoenicke,et al. SMTInterpol: An Interpolating SMT Solver , 2012, SPIN.
[18] John M. Abowd,et al. The U.S. Census Bureau Adopts Differential Privacy , 2018, KDD.
[19] Benjamin Grégoire,et al. Proving Differential Privacy via Probabilistic Couplings , 2016, 2016 31st Annual ACM/IEEE Symposium on Logic in Computer Science (LICS).
[20] David Sands,et al. On flow-sensitive security types , 2006, POPL '06.
[21] Alexander Aiken,et al. Secure Information Flow as a Safety Problem , 2005, SAS.
[22] Elaine Shi,et al. GUPT: privacy preserving data analysis made easy , 2012, SIGMOD Conference.
[23] Danfeng Zhang,et al. Detecting Violations of Differential Privacy , 2018, CCS.
[24] Danfeng Zhang,et al. LightDP: towards automating differential privacy proofs , 2016, POPL.
[25] Anna C. Gilbert,et al. Property Testing For Differential Privacy , 2018, 2018 56th Annual Allerton Conference on Communication, Control, and Computing (Allerton).
[26] Vitaly Shmatikov,et al. Airavat: Security and Privacy for MapReduce , 2010, NSDI.
[27] Ninghui Li,et al. Understanding the Sparse Vector Technique for Differential Privacy , 2016, Proc. VLDB Endow..
[28] Dexter Kozen,et al. Semantics of probabilistic programs , 1979, 20th Annual Symposium on Foundations of Computer Science (sfcs 1979).
[29] Ashwin Machanavajjhala,et al. EKTELO: A Framework for Defining Differentially-Private Computations , 2018, SIGMOD Conference.
[30] David Sands,et al. Differential Privacy , 2015, POPL.
[31] Marco Gaboardi,et al. Relational Symbolic Execution , 2017, PPDP.
[32] Dirk Beyer,et al. CPAchecker: A Tool for Configurable Software Verification , 2009, CAV.
[33] Ilya Mironov,et al. Rényi Differential Privacy , 2017, 2017 IEEE 30th Computer Security Foundations Symposium (CSF).
[34] Gilles Barthe,et al. Proving Differential Privacy in Hoare Logic , 2014, 2014 IEEE 27th Computer Security Foundations Symposium.
[35] Aaron Roth,et al. The Algorithmic Foundations of Differential Privacy , 2014, Found. Trends Theor. Comput. Sci..
[36] Gilles Barthe,et al. Higher-Order Approximate Relational Refinement Types for Mechanism Design and Differential Privacy , 2014, POPL.
[37] Pedro R. D'Argenio,et al. Secure information flow by self-composition , 2004, Proceedings. 17th IEEE Computer Security Foundations Workshop, 2004..
[38] Huimin Lin,et al. Metrics for Differential Privacy in Concurrent Systems , 2014, FORTE.
[39] Alberto Griggio,et al. The MathSAT5 SMT Solver , 2013, TACAS.
[40] Frank McSherry,et al. Privacy integrated queries: an extensible platform for privacy-preserving data analysis , 2009, SIGMOD Conference.
[41] Thomas Steinke,et al. Concentrated Differential Privacy: Simplifications, Extensions, and Lower Bounds , 2016, TCC.
[42] Pierre-Yves Strub,et al. Advanced Probabilistic Couplings for Differential Privacy , 2016, CCS.
[43] Cynthia Dwork,et al. Calibrating Noise to Sensitivity in Private Data Analysis , 2006, TCC.