The security and privacy research attempts to expose potential risks of adversaries and to prevent them. This thesis focuses on their evaluation. Our goal is to describe tools than can formally bound the risk that an adversary breaks the security or the privacy of a system. For this purpose, we leverage a methodology established in the field of side-channel analysis against embedded systems and apply it to other fields. Namely, we focus on security and privacy breaches that can occur when using localization, preference or brain-computer interface data in an open data setting. As previous works, we observe that most publicly available data reveals private information even if it is simplified or reduced before publication. Preventing attacks ...
<p>Many organizations collect data that would be useful to public researchers, but cannot be shared ...
There has been increasing interest in the problem of building accurate data mining models over aggre...
A wide variety of privacy metrics have been proposed in the literature to evaluate the level of prot...
In this paper we study the relationship between privacy and accuracy in the context of correlated da...
Inspired by the literature on side-channel attacks against cryptographic implementations, we describ...
Accepted to Third AAAI Workshop on Privacy-Preserving Artificial Intelligence (PPAI-22)International...
Dynamical systems have found applications in many domains including control and optimization, which ...
Abstract—We propose a general statistical inference framework to capture the privacy threat incurred...
International audienceIn a variety of contexts, randomization is regarded as an effective technique ...
In a variety of contexts, randomization is regarded as an effective technique to conceal sensitive i...
International audienceThis paper studies the statistical characterization of detecting an adversary ...
Leakage certification aims at guaranteeing that the statistical models used in side-channel security...
Despite the variety of tools and techniques deployed in order to protect sensitive data, ranging fro...
Thesis (M.S.)--Wichita State University, College of Engineering, Dept. of Electrical Engineering and...
Over the last decade there have been great strides made in developing techniques to compute function...
<p>Many organizations collect data that would be useful to public researchers, but cannot be shared ...
There has been increasing interest in the problem of building accurate data mining models over aggre...
A wide variety of privacy metrics have been proposed in the literature to evaluate the level of prot...
In this paper we study the relationship between privacy and accuracy in the context of correlated da...
Inspired by the literature on side-channel attacks against cryptographic implementations, we describ...
Accepted to Third AAAI Workshop on Privacy-Preserving Artificial Intelligence (PPAI-22)International...
Dynamical systems have found applications in many domains including control and optimization, which ...
Abstract—We propose a general statistical inference framework to capture the privacy threat incurred...
International audienceIn a variety of contexts, randomization is regarded as an effective technique ...
In a variety of contexts, randomization is regarded as an effective technique to conceal sensitive i...
International audienceThis paper studies the statistical characterization of detecting an adversary ...
Leakage certification aims at guaranteeing that the statistical models used in side-channel security...
Despite the variety of tools and techniques deployed in order to protect sensitive data, ranging fro...
Thesis (M.S.)--Wichita State University, College of Engineering, Dept. of Electrical Engineering and...
Over the last decade there have been great strides made in developing techniques to compute function...
<p>Many organizations collect data that would be useful to public researchers, but cannot be shared ...
There has been increasing interest in the problem of building accurate data mining models over aggre...
A wide variety of privacy metrics have been proposed in the literature to evaluate the level of prot...