Proceedings of the 40th ACM SIGPLAN Conference on Programming Language Design and Implementation 2019
DOI: 10.1145/3314221.3314619
|View full text |Cite
|
Sign up to set email alerts
|

Proving differential privacy with shadow execution

Abstract: Recent work on formal verification of differential privacy shows a trend toward usability and expressiveness -generating a correctness proof of sophisticated algorithm while minimizing the annotation burden on programmers. Sometimes, combining those two requires substantial changes to program logics: one recent paper is able to verify Report Noisy Max automatically, but it involves a complex verification system using customized program logics and verifiers.In this paper, we propose a new proof technique, calle… Show more

Help me understand this report
View preprint versions

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

3
61
0

Year Published

2019
2019
2022
2022

Publication Types

Select...
4
3
2

Relationship

0
9

Authors

Journals

citations
Cited by 49 publications
(64 citation statements)
references
References 49 publications
(136 reference statements)
3
61
0
Order By: Relevance
“…Related work sensitivity-and its derivatives DFuzz [21], Adaptive Fuzz [58], Fuzzi [62], and Duet [44]. Hoare2 [4], a programming language which enforces (pure or approximate) di erential privacy using program veri cation, together with its extension PrivInfer [5] supporting di erentially private Bayesian programming; and other systems using similar ideas [7,1,61,57].…”
Section: Formal Calculi For Dpmentioning
confidence: 99%
“…Related work sensitivity-and its derivatives DFuzz [21], Adaptive Fuzz [58], Fuzzi [62], and Duet [44]. Hoare2 [4], a programming language which enforces (pure or approximate) di erential privacy using program veri cation, together with its extension PrivInfer [5] supporting di erentially private Bayesian programming; and other systems using similar ideas [7,1,61,57].…”
Section: Formal Calculi For Dpmentioning
confidence: 99%
“…A DP mechanism can be so complicated (e.g., the sparse vector technique described in the following section) that the wrong proofs appear [25]. Then, many verification tools using a proof syntax [2,32,34] are proposed to verify the correctness of proof for DP. The idea of the proof syntax is called randomness alignment.…”
Section: Compositionmentioning
confidence: 99%
“…Within this group are Fuzz [4]-a programming language which enforces (pure) differential privacy of computations using a linear type system which keeps track of program sensitivity-and its derivatives DFuzz [6], Adaptive Fuzz [10], Fuzzi [13], and Duet [50]. Hoare2 [7], a programming language which enforces (pure or approximate) differential privacy using program verification, together with its extension PrivInfer [8] supporting differentially private Bayesian programming; and other systems using similar ideas [43,51,9,52].…”
Section: Related Workmentioning
confidence: 99%