{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,21]],"date-time":"2026-04-21T15:32:36Z","timestamp":1776785556873,"version":"3.51.2"},"reference-count":55,"publisher":"IEEE","license":[{"start":{"date-parts":[[2022,5,1]],"date-time":"2022-05-01T00:00:00Z","timestamp":1651363200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-009"},{"start":{"date-parts":[[2022,5,1]],"date-time":"2022-05-01T00:00:00Z","timestamp":1651363200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-001"}],"funder":[{"DOI":"10.13039\/501100001782","name":"University of Melbourne","doi-asserted-by":"publisher","id":[{"id":"10.13039\/501100001782","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2022,5]]},"DOI":"10.1109\/sp46214.2022.9833672","type":"proceedings-article","created":{"date-parts":[[2022,7,27]],"date-time":"2022-07-27T19:28:05Z","timestamp":1658950085000},"page":"473-488","source":"Crossref","is-referenced-by-count":29,"title":["Are We There Yet? Timing and Floating-Point Attacks on Differential Privacy Systems"],"prefix":"10.1109","author":[{"given":"Jiankai","family":"Jin","sequence":"first","affiliation":[{"name":"The University of Melbourne,School of Computing and Information Systems"}]},{"given":"Eleanor","family":"McMurtry","sequence":"additional","affiliation":[{"name":"ETH Zurich,Department of Computer Science"}]},{"given":"Benjamin I. P.","family":"Rubinstein","sequence":"additional","affiliation":[{"name":"The University of Melbourne,School of Computing and Information Systems"}]},{"given":"Olga","family":"Ohrimenko","sequence":"additional","affiliation":[{"name":"The University of Melbourne,School of Computing and Information Systems"}]}],"member":"263","reference":[{"key":"ref13","year":"2020","journal-title":"Secure noise generation"},{"key":"ref12","article-title":"The discrete Gaussian for differential privacy","author":"canonne","year":"2020","journal-title":"NeurIPS"},{"key":"ref15","first-page":"265","article-title":"Calibrating noise to sensitivity in private data analysis","author":"dwork","year":"2006","journal-title":"Proceedings of Theoretical Cryptography Conference (TCC)"},{"key":"ref14","year":"2020","journal-title":"The Discrete Gaussian for Differential Privacy"},{"key":"ref53","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-63715-0_16"},{"key":"ref52","doi-asserted-by":"publisher","DOI":"10.1109\/TC.2016.2642962"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1145\/2976749.2978318"},{"key":"ref55","doi-asserted-by":"publisher","DOI":"10.1109\/TC.2006.81"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1145\/3188745.3188946"},{"key":"ref54","doi-asserted-by":"publisher","DOI":"10.1109\/TC.2018.2814587"},{"key":"ref17","article-title":"Concentrated differential privacy","volume":"abs 1603 1887","author":"dwork","year":"2016","journal-title":"CoRR"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1561\/0400000042"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/FOCS.2014.56"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/CSF.2017.11"},{"key":"ref51","doi-asserted-by":"crossref","first-page":"323","DOI":"10.1007\/978-3-662-53140-2_16","article-title":"Flush, gauss, and reload &#x2013; a cache attack on the bliss lattice-based signature scheme","author":"groot bruinderink","year":"2016","journal-title":"Cryptographic Hardware and Embedded Systems &#x2013; CHES 2016"},{"key":"ref50","doi-asserted-by":"crossref","first-page":"40","DOI":"10.1007\/978-3-642-40041-4_3","article-title":"Lattice signatures and bimodal gaussians","author":"ducas","year":"2013","journal-title":"Advances in cryptology &#x2013; CRYPTO 2013"},{"key":"ref46","first-page":"717","article-title":"Implementing the exponential mechanism with base2 differential privacy","author":"ilvento","year":"2020","journal-title":"ACM Conference on Computer and Communications Security (CCS) ser CCS &#x2019;20"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.4204\/EPTCS.117.1"},{"key":"ref48","doi-asserted-by":"publisher","DOI":"10.2478\/tmmp-2014-0022"},{"key":"ref47","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-88428-4_26"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1145\/3213846.3213851"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1145\/2086696.2086702"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1109\/AsianHOST51057.2020.9358267"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1145\/1866307.1866341"},{"key":"ref49","doi-asserted-by":"publisher","DOI":"10.1145\/2535925"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2015.44"},{"key":"ref7","first-page":"33","article-title":"Differential privacy under fire","author":"haeberlen","year":"2011","journal-title":"USENIX Security Symposium"},{"key":"ref9","year":"2017","journal-title":"30th IEEE Computer Security Foundations Symposium CSF 2017"},{"key":"ref4","year":"2020","journal-title":"Opacus"},{"key":"ref3","year":"2021","journal-title":"Google Differential Privacy"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1145\/2382196.2382264"},{"key":"ref5","year":"2021","journal-title":"Diffprivlib"},{"key":"ref40","first-page":"5201","article-title":"The distributed discrete gaussian mechanism for federated learning with secure aggregation","volume":"139","author":"kairouz","year":"2021","journal-title":"Proceedings of the 38th International Conference on Machine Learning ICML 2021"},{"key":"ref35","article-title":"The algorithmic foundations of differential privacy","volume":"9","author":"dwork","year":"2014","journal-title":"Found Trends Theor Comput Sci"},{"key":"ref34","first-page":"1","article-title":"Improving the Gaussian mechanism for differential privacy: Analytical calibration and optimal denoising","author":"balle","year":"2018","journal-title":"ACM Conference on Computer and Communications Security (CCS)"},{"key":"ref37","author":"lecun","year":"2010","journal-title":"MNIST Handwritten Digit Database"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1109\/CSF.2014.35"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.18637\/jss.v005.i08"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1137\/1006063"},{"key":"ref33","author":"dua","year":"2017","journal-title":"UCI Machine Learning Repository"},{"key":"ref32","doi-asserted-by":"crossref","first-page":"101","DOI":"10.1080\/00401706.1964.10490150","article-title":"Generating a variable from the tail of the normal distribution","volume":"6","author":"marsaglia","year":"1964","journal-title":"Technometrics"},{"key":"ref2","author":"andrew","year":"2019","journal-title":"Tensorflow Privacy"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1145\/3132747.3132769"},{"key":"ref39","first-page":"43:1","article-title":"Differential privacy on finite computers","volume":"94","author":"balcer","year":"2018","journal-title":"9th Innovations in Theoretical Computer Science Conference ITCS 2018"},{"key":"ref38","article-title":"Deep learning with Gaussian differential privacy","volume":"abs 1911 11607","author":"bu","year":"2019","journal-title":"CoRR"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1145\/3219819.3226070"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2019.00019"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1145\/1559845.1559850"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1145\/3187009.3177733"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/GlobalSIP.2013.6736861"},{"key":"ref22","article-title":"Learning differentially private recurrent language models","author":"mcmahan","year":"2018","journal-title":"International Conference on Learning Representations (ICLR)"},{"key":"ref21","article-title":"Privacy for free: Posterior sampling and stochastic gradient Monte Carlo","author":"wang","year":"2015","journal-title":"International Conference on Machine Learning (ICML)"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1145\/1653662.1653687"},{"key":"ref27","article-title":"An algorithmic framework for differentially private data analysis on trusted processors","author":"allen","year":"2019","journal-title":"Conference on Neural Information Processing Systems (NeurIPS)"},{"key":"ref29","article-title":"Timeless timing attacks: Exploiting concurrency to leak secrets over remote connections","author":"van goethem","year":"2020","journal-title":"USENIX Security Symposium"}],"event":{"name":"2022 IEEE Symposium on Security and Privacy (SP)","location":"San Francisco, CA, USA","start":{"date-parts":[[2022,5,22]]},"end":{"date-parts":[[2022,5,26]]}},"container-title":["2022 IEEE Symposium on Security and Privacy (SP)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9833550\/9833558\/09833672.pdf?arnumber=9833672","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,9,30]],"date-time":"2024-09-30T00:47:55Z","timestamp":1727657275000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9833672\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,5]]},"references-count":55,"URL":"https:\/\/doi.org\/10.1109\/sp46214.2022.9833672","relation":{},"subject":[],"published":{"date-parts":[[2022,5]]}}}