Coupled Relational Symbolic Execution for Differential Privacy

07/25/2020
by   Gian Pietro Farina, et al.
0

Differential privacy is a de facto standard in data privacy with applications in the private and public sectors. Most of the techniques that achieve differential privacy are based on a judicious use of randomness. However, reasoning about randomized programs is difficult and error prone. For this reason, several techniques have been recently proposed to support designer in proving programs differentially private or in finding violations to it. In this work we propose a technique based on symbolic execution for reasoning about differential privacy. Symbolic execution is a classic technique used for testing, counterexample generation and to prove absence of bugs. Here we use symbolic execution to support these tasks specifically for differential privacy. To achieve this goal, we leverage two ideas that have been already proven useful in formal reasoning about differential privacy: relational reasoning and probabilistic coupling. Our technique integrates these two ideas and shows how such a combination can be used to both verify and find violations to differential privacy.

READ FULL TEXT

page 1

page 2

page 3

page 4

research
10/24/2017

Reasoning about Divergences for Relaxations of Differential Privacy

We develop a semantics framework for verifying recent relaxations of dif...
research
01/04/2021

Learning Differentially Private Mechanisms

Differential privacy is a formal, mathematical definition of data privac...
research
09/23/2018

Towards Differential Privacy for Symbolic Systems

In this paper, we develop a privacy implementation for symbolic control ...
research
09/10/2019

A Programming Framework for Differential Privacy with Accuracy Concentration Bounds

Differential privacy offers a formal framework for reasoning about priva...
research
02/07/2022

Differential Privacy for Symbolic Systems with Application to Markov Chains

Data-driven systems are gathering increasing amounts of data from users,...
research
06/01/2022

Defensive Design of Saturating Counters Based on Differential Privacy

The saturating counter is the basic module of the dynamic branch predict...
research
11/08/2019

The Complexity of Verifying Loop-free Programs as Differentially Private

We study the problem of verifying differential privacy for loop-free pro...

Please sign up or login with your details

Forgot password? Click here to reset