Linear Program Reconstruction in Practice
We briefly report on a successful linear program reconstruction attack performed on a production statistical queries system and using a real dataset. The attack was deployed in test environment in the course of the Aircloak Challenge bug bounty program and is based on the reconstruction algorithm o...
Main Authors: | Aloni Cohen, Kobbi Nissim |
---|---|
Format: | Article |
Language: | English |
Published: |
Labor Dynamics Institute
2020-01-01
|
Series: | The Journal of Privacy and Confidentiality |
Subjects: | |
Online Access: | https://journalprivacyconfidentiality.org/index.php/jpc/article/view/711 |
Similar Items
-
Genome Reconstruction Attacks Against Genomic Data-Sharing Beacons
by: Ayoz Kerem, et al.
Published: (2021-07-01) -
Calibrating Noise to Sensitivity in Private Data Analysis
by: Cynthia Dwork, et al.
Published: (2017-05-01) -
Averaging Attacks on Bounded Noise-based Disclosure Control Algorithms
by: Asghar Hassan Jameel, et al.
Published: (2020-04-01) -
Concentration Bounds for High Sensitivity Functions Through Differential Privacy
by: Uri Stemmer, et al.
Published: (2019-03-01) -
First Issue Editorial
by: John M. Abowd, et al.
Published: (2009-04-01)