2021
DOI: 10.1007/978-3-030-72019-3_8
|View full text |Cite
|
Sign up to set email alerts
|

Coupled Relational Symbolic Execution for Differential Privacy

Abstract: Differential privacy is a de facto standard in data privacy with applications in the private and public sectors. Most of the techniques that achieve differential privacy are based on a judicious use of randomness. However, reasoning about randomized programs is difficult and error prone. For this reason, several techniques have been recently proposed to support designer in proving programs differentially private or in finding violations to it.In this work we propose a technique based on symbolic execution for … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
6
0

Year Published

2021
2021
2022
2022

Publication Types

Select...
5
1
1

Relationship

0
7

Authors

Journals

citations
Cited by 7 publications
(6 citation statements)
references
References 26 publications
0
6
0
Order By: Relevance
“…There are also many domain-specific automated analyses for specific probabilistic properties, such as termination and resource analysis [Chatterjee et al 2016;Moosbrugger et al 2021;Wang et al 2021], accuracy Smith et al 2019], reliability [Carbin et al 2012], differential privacy [Albarghouthi and Hsu 2018b;Barthe et al 2021] and other relational properties [Albarghouthi and Hsu 2018a;Farina et al 2021], and long-run properties of probabilistic loops [Bartocci et al 2019[Bartocci et al , 2020. Our approach aims to create a general-purpose analysis.…”
Section: Related Workmentioning
confidence: 99%
“…There are also many domain-specific automated analyses for specific probabilistic properties, such as termination and resource analysis [Chatterjee et al 2016;Moosbrugger et al 2021;Wang et al 2021], accuracy Smith et al 2019], reliability [Carbin et al 2012], differential privacy [Albarghouthi and Hsu 2018b;Barthe et al 2021] and other relational properties [Albarghouthi and Hsu 2018a;Farina et al 2021], and long-run properties of probabilistic loops [Bartocci et al 2019[Bartocci et al , 2020. Our approach aims to create a general-purpose analysis.…”
Section: Related Workmentioning
confidence: 99%
“…We presented the first compositional, incremental method for detecting memory-safety and information leakage vulnerabilities, free of false alarms. Existing techniques for the automatic discovery of these types of vulnerabilities include relational symbolic execution [Daniel et al 2020[Daniel et al , 2021Farina et al 2019Farina et al , 2021 and differential fuzzing [Nilizadeh et al 2019], which generalise the traditional vulnerability discovery techniques of symbolic execution and fuzzing respectively to allow them to compare program executions. Recent work also explores hybrid approaches that combine these techniques [Noller et al 2020].…”
Section: Related Work and Conclusionmentioning
confidence: 99%
“…Recent work [4,26,47] targets both proving and disproving differential privacy. CheckDP [47] also relies on the Randomness Alignment technique.…”
Section: Related Workmentioning
confidence: 99%
“…However, these programs only allow a bounded number of samples from the Laplace distribution, and their inputs and outputs are from a finite domain. Farina [26] builds a relational symbolic execution framework, which when combined with probabilistic couplings, is able to prove differential privacy for SVT or generate failing traces for its two incorrect variants.…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation