We consider the problem of privacy enforcement for dynamic systems using the technique of obfuscation. Our approach captures the trade-off between privacy and utility, in a formal reactive framework. Specifically, we model a dynamic system as an automaton or labeled transition system with predefined secret behaviors. The system generates event strings for some useful computation (utility). At the same time, it must hide its secret behaviors from any outside observer of its behavior (privacy). We formally capture both privacy and utility specifications within the model of the system. We propose as obfuscation mechanism for privacy enforcement the use of edit functions that suitably alter the output behavior of the system by inserting, deleti...
Preprint version of a paper that appeared on the Proceedings of the IEEE 33rd Computer Security Foun...
Abstract. We study the existence and the characterization of function transform-ers that minimally o...
Software, over the years, has evolved from free code given along with the hardware for free to a val...
We consider the problem of synthesizing an obfuscation policy that enforces privacy while preserving...
Informally, an obfuscator O is an efficient, probabilistic “compiler ” that transforms a program P i...
In event processing systems, detected event patterns can revealprivacy-sensitive information. In thi...
Differential privacy is a promising approach to privacy preserving data analysis with a well-develop...
Loosely speaking, an obfuscation O of a function f should satisfy two requirements: firstly, using O...
We study the existence and the characterization of function transformers that minimally or maximally...
AbstractDifferential privacy is a promising approach to privacy preserving data analysis with a well...
A program obfuscator is a compiling algorithm that takes a program/circuit as input and generates a ...
Consider users who share their data (e.g., location) with an untrusted service provider to obtain a ...
This article develops a novel compositional and abstraction-based approach to synthesize edit functi...
In this thesis we consider the problem of information hiding in the scenarios of interactive systems...
In this thesis, we investigate the problems of verifying and enforcing confidentiality on critical s...
Preprint version of a paper that appeared on the Proceedings of the IEEE 33rd Computer Security Foun...
Abstract. We study the existence and the characterization of function transform-ers that minimally o...
Software, over the years, has evolved from free code given along with the hardware for free to a val...
We consider the problem of synthesizing an obfuscation policy that enforces privacy while preserving...
Informally, an obfuscator O is an efficient, probabilistic “compiler ” that transforms a program P i...
In event processing systems, detected event patterns can revealprivacy-sensitive information. In thi...
Differential privacy is a promising approach to privacy preserving data analysis with a well-develop...
Loosely speaking, an obfuscation O of a function f should satisfy two requirements: firstly, using O...
We study the existence and the characterization of function transformers that minimally or maximally...
AbstractDifferential privacy is a promising approach to privacy preserving data analysis with a well...
A program obfuscator is a compiling algorithm that takes a program/circuit as input and generates a ...
Consider users who share their data (e.g., location) with an untrusted service provider to obtain a ...
This article develops a novel compositional and abstraction-based approach to synthesize edit functi...
In this thesis we consider the problem of information hiding in the scenarios of interactive systems...
In this thesis, we investigate the problems of verifying and enforcing confidentiality on critical s...
Preprint version of a paper that appeared on the Proceedings of the IEEE 33rd Computer Security Foun...
Abstract. We study the existence and the characterization of function transform-ers that minimally o...
Software, over the years, has evolved from free code given along with the hardware for free to a val...