Synthetic Data--what, why and how?

J Jordon, L Szpruch, F Houssiau, M Bottarelli… - arxiv preprint arxiv …, 2022 - arxiv.org
This explainer document aims to provide an overview of the current state of the rapidly
expanding work on synthetic data technologies, with a particular focus on privacy. The …

An operational approach to information leakage

I Issa, AB Wagner, S Kamath - IEEE Transactions on …, 2019 - ieeexplore.ieee.org
Given two random variables X and Y, an operational approach is undertaken to quantify the
“leakage” of information from X to Y. The resulting measure L (X→ Y) is called maximal …

Privacy games: Optimal user-centric data obfuscation

R Shokri - arxiv preprint arxiv:1402.3426, 2014 - arxiv.org
In this paper, we design user-centric obfuscation mechanisms that impose the minimum
utility loss for guaranteeing user's privacy. We optimize utility subject to a joint guarantee of …

Decomposition instead of self-composition for proving the absence of timing channels

T Antonopoulos, P Gazzillo, M Hicks, E Koskinen… - ACM SIGPLAN …, 2017 - dl.acm.org
We present a novel approach to proving the absence of timing channels. The idea is to
partition the program's execution traces in such a way that each partition component is …

An operational measure of information leakage

I Issa, S Kamath, AB Wagner - 2016 Annual Conference on …, 2016 - ieeexplore.ieee.org
Given two discrete random variables X and Y, an operational approach is undertaken to
quantify the “leakage” of information from X to Y. The resulting measure ℒ (X→ Y) is called …

Additive and multiplicative notions of leakage, and their capacities

MS Alvim, K Chatzikokolakis, A McIver… - 2014 IEEE 27th …, 2014 - ieeexplore.ieee.org
Protecting sensitive information from improper disclosure is a fundamental security goal. It is
complicated, and difficult to achieve, often because of unavoidable or even unpredictable …

Pointwise maximal leakage

S Saeidian, G Cervia, TJ Oechtering… - IEEE Transactions on …, 2023 - ieeexplore.ieee.org
We introduce a privacy measure called pointwise maximal leakage, generalizing the pre-
existing notion of maximal leakage, which quantifies the amount of information leaking about …

Qif-verilog: Quantitative information-flow based hardware description languages for pre-silicon security assessment

X Guo, RG Dutta, J He… - … on Hardware Oriented …, 2019 - ieeexplore.ieee.org
Hardware vulnerabilities are often due to design mistakes because the designer does not
sufficiently consider potential security vulnerabilities at the design stage. As a result, various …

An operational approach to information leakage via generalized gain functions

GR Kurri, L Sankar, O Kosut - IEEE Transactions on Information …, 2023 - ieeexplore.ieee.org
We introduce a gain function viewpoint of information leakage by proposing maximal-
leakage, a rich class of operationally meaningful leakage measures that subsumes recently …

Hypothesis testing under maximal leakage privacy constraints

J Liao, L Sankar, FP Calmon… - 2017 IEEE International …, 2017 - ieeexplore.ieee.org
The problem of publishing privacy-guaranteed data for hypothesis testing is studied using
the maximal leakage (ML) as a metric for privacy and the type-II error exponent as the utility …