{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T04:24:28Z","timestamp":1750220668734,"version":"3.41.0"},"reference-count":54,"publisher":"Association for Computing Machinery (ACM)","issue":"OOPSLA","license":[{"start":{"date-parts":[[2020,11,13]],"date-time":"2020-11-13T00:00:00Z","timestamp":1605225600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"funder":[{"DOI":"10.13039\/100000001","name":"National Science Foundation","doi-asserted-by":"publisher","award":["1907715"],"award-info":[{"award-number":["1907715"]}],"id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":["Proc. ACM Program. Lang."],"published-print":{"date-parts":[[2020,11,13]]},"abstract":"<jats:p>Differential privacy has emerged as a leading theoretical framework for privacy-preserving data gathering and analysis. It allows meaningful statistics to be collected for a population without revealing ``too much'' information about any individual member of the population. For software profiling, this machinery allows profiling data from many users of a deployed software system to be collected and analyzed in a privacy-preserving manner. Such a solution is appealing to many stakeholders, including software users, software developers, infrastructure providers, and government agencies.<\/jats:p><jats:p>We propose an approach for differentially-private collection of frequency vectors from software executions. Frequency information is reported with the addition of random noise drawn from the Laplace distribution. A key observation behind the design of our scheme is that event frequencies are closely correlated due to the static code structure. Differential privacy protections must account for such relationships; otherwise, a seemingly-strong privacy guarantee is actually weaker than it appears. Motivated by this observation, we propose a novel and general differentially-private profiling scheme when correlations between frequencies can be expressed through linear inequalities. Using a linear programming formulation, we show how to determine the magnitude of random noise that should be added to achieve meaningful privacy protections under such linear constraints. Next, we develop an efficient instance of this general machinery for an important subclass of constraints. Instead of LP, our solution uses a reachability analysis of a constraint graph. As an exemplar, we employ this approach to implement differentially-private method frequency profiling for Android apps.<\/jats:p><jats:p>Any differentially-private scheme has to balance two competing aspects: privacy and accuracy. Through an experimental study to characterize these trade-offs, we (1) show that our proposed randomization achieves much higher accuracy compared to related prior work, (2) demonstrate that high accuracy and high privacy protection can be achieved simultaneously, and (3) highlight the importance of linear constraints in the design of the randomization. These promising results provide evidence that our approach is a good candidate for privacy-preserving frequency profiling of deployed software.<\/jats:p>","DOI":"10.1145\/3428271","type":"journal-article","created":{"date-parts":[[2020,11,24]],"date-time":"2020-11-24T23:36:06Z","timestamp":1606260966000},"page":"1-24","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":0,"title":["Differentially-private software frequency profiling under linear constraints"],"prefix":"10.1145","volume":"4","author":[{"given":"Hailong","family":"Zhang","sequence":"first","affiliation":[{"name":"Fordham University, USA"}]},{"given":"Yu","family":"Hao","sequence":"additional","affiliation":[{"name":"Ohio State University, USA"}]},{"given":"Sufian","family":"Latif","sequence":"additional","affiliation":[{"name":"Ohio State University, USA"}]},{"given":"Raef","family":"Bassily","sequence":"additional","affiliation":[{"name":"Ohio State University, USA"}]},{"given":"Atanas","family":"Rountev","sequence":"additional","affiliation":[{"name":"Ohio State University, USA"}]}],"member":"320","published-online":{"date-parts":[[2020,11,13]]},"reference":[{"key":"e_1_2_2_1_1","unstructured":"Apple. 2017. Learning with privacy at scale. https:\/\/machinelearning.apple.com\/ 2017 \/12\/06\/ learning-with-privacy-atscale.html. Apple. 2017. Learning with privacy at scale. https:\/\/machinelearning.apple.com\/ 2017 \/12\/06\/ learning-with-privacy-atscale.html."},{"key":"e_1_2_2_2_1","first-page":"747","article-title":"BLENDER: Enabling local search with a hybrid diferential privacy model","author":"Avent Brendan","year":"2017","unstructured":"Brendan Avent , Aleksandra Korolova , David Zeber , Torgeir Hovden , and Benjamin Livshits . 2017 . BLENDER: Enabling local search with a hybrid diferential privacy model . In USENIX Security. 747 - 764 . Brendan Avent, Aleksandra Korolova, David Zeber, Torgeir Hovden, and Benjamin Livshits. 2017. BLENDER: Enabling local search with a hybrid diferential privacy model. In USENIX Security. 747-764.","journal-title":"USENIX Security."},{"key":"e_1_2_2_3_1","volume-title":"Optimally profiling and tracing programs. TOPLAS 16, 4 (","author":"Ball Thomas","year":"1994","unstructured":"Thomas Ball and James Larus . 1994. Optimally profiling and tracing programs. TOPLAS 16, 4 ( July 1994 ), 1319-1360. Thomas Ball and James Larus. 1994. Optimally profiling and tracing programs. TOPLAS 16, 4 ( July 1994 ), 1319-1360."},{"key":"e_1_2_2_4_1","first-page":"2288","article-title":"Practical locally private heavy hitters","author":"Bassily Raef","year":"2017","unstructured":"Raef Bassily , Kobbi Nissim , Uri Stemmer , and Abhradeep Guha Thakurta . 2017 . Practical locally private heavy hitters . In NIPS. 2288 - 2296 . Raef Bassily, Kobbi Nissim, Uri Stemmer, and Abhradeep Guha Thakurta. 2017. Practical locally private heavy hitters. In NIPS. 2288-2296.","journal-title":"NIPS."},{"key":"e_1_2_2_5_1","first-page":"447","article-title":"kb-anonymity: A model for anonymized behaviour-preserving test and debugging data","author":"Budi Aditya","year":"2011","unstructured":"Aditya Budi , David Lo , and Lingxiao Jiang . 2011 . kb-anonymity: A model for anonymized behaviour-preserving test and debugging data . In PLDI. 447 - 457 . Aditya Budi, David Lo, and Lingxiao Jiang. 2011. kb-anonymity: A model for anonymized behaviour-preserving test and debugging data. In PLDI. 447-457.","journal-title":"PLDI."},{"key":"e_1_2_2_6_1","first-page":"435","article-title":"Heavy hitters and the structure of local privacy","author":"Bun Mark","year":"2018","unstructured":"Mark Bun , Jelani Nelson , and Uri Stemmer . 2018 . Heavy hitters and the structure of local privacy . In PODS. 435 - 447 . Mark Bun, Jelani Nelson, and Uri Stemmer. 2018. Heavy hitters and the structure of local privacy. In PODS. 435-447.","journal-title":"PODS."},{"key":"e_1_2_2_7_1","first-page":"261","article-title":"A technique for enabling and supporting debugging of field failures","author":"Clause James","year":"2007","unstructured":"James Clause and Alessandro Orso . 2007 . A technique for enabling and supporting debugging of field failures . In ICSE. 261 - 270 . James Clause and Alessandro Orso. 2007. A technique for enabling and supporting debugging of field failures. In ICSE. 261-270.","journal-title":"ICSE."},{"key":"e_1_2_2_8_1","doi-asserted-by":"publisher","DOI":"10.1145\/1985793.1985797"},{"key":"e_1_2_2_9_1","volume-title":"The modernization of statistical disclosure limitation at the U","author":"Dajan Aref","year":"2017","unstructured":"Aref Dajan , Amy Lauger , Phyllis Singer , Daniel Kifer , Jerome Reiter , Ashwin Machanavajjhala , Simson Garfinkel , Scot Dahl , Matthew Graham , Vishesh Karwa , Hang Kim , Philip Leclerc , Ian Schmutte , William Sexton , Lars Vilhuber , and John Abowd . 2017. The modernization of statistical disclosure limitation at the U . S. Census Bureau . https:\/\/www2.census.gov\/ cac\/sac\/meetings\/ 2017 -09\/statistical-disclosure-limitation.pdf. Aref Dajan, Amy Lauger, Phyllis Singer, Daniel Kifer, Jerome Reiter, Ashwin Machanavajjhala, Simson Garfinkel, Scot Dahl, Matthew Graham, Vishesh Karwa, Hang Kim, Philip Leclerc, Ian Schmutte, William Sexton, Lars Vilhuber, and John Abowd. 2017. The modernization of statistical disclosure limitation at the U.S. Census Bureau. https:\/\/www2.census.gov\/ cac\/sac\/meetings\/2017-09\/statistical-disclosure-limitation.pdf."},{"key":"e_1_2_2_10_1","first-page":"331","article-title":"Probe distribution techniques to profile events in deployed software","author":"Diep Madeline","year":"2006","unstructured":"Madeline Diep , Myra Cohen , and Sebastian Elbaum . 2006 . Probe distribution techniques to profile events in deployed software . In ISSRE. 331 - 342 . Madeline Diep, Myra Cohen, and Sebastian Elbaum. 2006. Probe distribution techniques to profile events in deployed software. In ISSRE. 331-342.","journal-title":"ISSRE."},{"key":"e_1_2_2_11_1","first-page":"3571","article-title":"Collecting telemetry data privately","author":"Ding Bolin","year":"2017","unstructured":"Bolin Ding , Janardhan Kulkarni , and Sergey Yekhanin . 2017 . Collecting telemetry data privately . In NIPS. 3571 - 3580 . Bolin Ding, Janardhan Kulkarni, and Sergey Yekhanin. 2017. Collecting telemetry data privately. In NIPS. 3571-3580.","journal-title":"NIPS."},{"key":"e_1_2_2_12_1","first-page":"429","article-title":"Local privacy and statistical minimax rates","author":"Duchi John","year":"2013","unstructured":"John Duchi , Michael Jordan , and Martin Wainwright . 2013 . Local privacy and statistical minimax rates . In FOCS. 429 - 438 . John Duchi, Michael Jordan, and Martin Wainwright. 2013. Local privacy and statistical minimax rates. In FOCS. 429-438.","journal-title":"FOCS."},{"key":"e_1_2_2_13_1","first-page":"1","article-title":"Diferential privacy","author":"Dwork Cynthia","year":"2006","unstructured":"Cynthia Dwork . 2006 . Diferential privacy . In ICALP. 1 - 12 . Cynthia Dwork. 2006. Diferential privacy. In ICALP. 1-12.","journal-title":"ICALP."},{"key":"e_1_2_2_14_1","first-page":"265","article-title":"Calibrating noise to sensitivity in private data analysis","author":"Dwork Cynthia","year":"2006","unstructured":"Cynthia Dwork , Frank McSherry , Kobbi Nissim , and Adam Smith . 2006 . Calibrating noise to sensitivity in private data analysis . In TCC. 265 - 284 . Cynthia Dwork, Frank McSherry, Kobbi Nissim, and Adam Smith. 2006. Calibrating noise to sensitivity in private data analysis. In TCC. 265-284.","journal-title":"TCC."},{"key":"e_1_2_2_15_1","first-page":"3","article-title":"The algorithmic foundations of diferential privacy","volume":"9","author":"Dwork Cynthia","year":"2014","unstructured":"Cynthia Dwork and Aaron Roth . 2014 . The algorithmic foundations of diferential privacy . Foundations and Trends in Theoretical Computer Science 9 , 3 - 4 ( 2014 ), 211-407. Cynthia Dwork and Aaron Roth. 2014. The algorithmic foundations of diferential privacy. Foundations and Trends in Theoretical Computer Science 9, 3-4 ( 2014 ), 211-407.","journal-title":"Foundations and Trends in Theoretical Computer Science"},{"key":"e_1_2_2_16_1","doi-asserted-by":"crossref","first-page":"65","DOI":"10.1145\/1007512.1007522","article-title":"An empirical study of profiling strategies for released software and their impact on testing activities","author":"Elbaum Sebastian","year":"2004","unstructured":"Sebastian Elbaum and Madeline Hardojo . 2004 . An empirical study of profiling strategies for released software and their impact on testing activities . In ISSTA. 65 - 75 . Sebastian Elbaum and Madeline Hardojo. 2004. An empirical study of profiling strategies for released software and their impact on testing activities. In ISSTA. 65-75.","journal-title":"ISSTA."},{"key":"e_1_2_2_17_1","first-page":"1054","article-title":"RAPPOR: Randomized aggregatable privacy-preserving ordinal response","author":"Erlingsson \u00dalfar","year":"2014","unstructured":"\u00dalfar Erlingsson , Vasyl Pihur , and Aleksandra Korolova . 2014 . RAPPOR: Randomized aggregatable privacy-preserving ordinal response . In CCS. 1054 - 1067 . \u00dalfar Erlingsson, Vasyl Pihur, and Aleksandra Korolova. 2014. RAPPOR: Randomized aggregatable privacy-preserving ordinal response. In CCS. 1054-1067.","journal-title":"CCS."},{"key":"e_1_2_2_18_1","unstructured":"Exodus Privacy. 2020. Most frequent app trackers for Android. https:\/\/reports.exodus-privacy.eu.org\/en\/reports\/stats. Exodus Privacy. 2020. Most frequent app trackers for Android. https:\/\/reports.exodus-privacy.eu.org\/en\/reports\/stats."},{"key":"e_1_2_2_19_1","unstructured":"Facebook. 2020. Facebook Analytics. https:\/\/analytics.facebook.com. Facebook. 2020. Facebook Analytics. https:\/\/analytics.facebook.com."},{"key":"e_1_2_2_20_1","doi-asserted-by":"crossref","first-page":"57","DOI":"10.1145\/1297027.1297033","article-title":"Statistically rigorous Java performance evaluation","author":"Georges Andy","year":"2007","unstructured":"Andy Georges , Dries Buytaert , and Lieven Eeckhout . 2007 . Statistically rigorous Java performance evaluation . In OOPSLA. 57 - 76 . Andy Georges, Dries Buytaert, and Lieven Eeckhout. 2007. Statistically rigorous Java performance evaluation. In OOPSLA. 57-76.","journal-title":"OOPSLA."},{"key":"e_1_2_2_21_1","unstructured":"Google. 2020a. Android Debug Bridge (adb). https:\/\/developer.android.com\/studio\/command-line\/adb. Google. 2020a. Android Debug Bridge (adb). https:\/\/developer.android.com\/studio\/command-line\/adb."},{"key":"e_1_2_2_22_1","unstructured":"Google. 2020b. Firebase. https:\/\/firebase.google.com. Google. 2020b. Firebase. https:\/\/firebase.google.com."},{"key":"e_1_2_2_23_1","unstructured":"Google. 2020c. UI\/Application Exerciser Monkey. https:\/\/developer.android.com\/studio\/test\/monkey. Google. 2020c. UI\/Application Exerciser Monkey. https:\/\/developer.android.com\/studio\/test\/monkey."},{"key":"e_1_2_2_24_1","doi-asserted-by":"crossref","unstructured":"Irit Hadar Tomer Hasson Oshrat Ayalon Eran Toch Michael Birnhack Sofia Sherman and Arod Balissa. 2018. Privacy by designers: Software developers' privacy mindset. ESE 23 1 ( 2018 ) 259-289. Irit Hadar Tomer Hasson Oshrat Ayalon Eran Toch Michael Birnhack Sofia Sherman and Arod Balissa. 2018. Privacy by designers: Software developers' privacy mindset. ESE 23 1 ( 2018 ) 259-289.","DOI":"10.1007\/s10664-017-9517-1"},{"key":"e_1_2_2_25_1","first-page":"145","article-title":"Performance debugging in the large via mining millions of stack traces","author":"Han Shi","year":"2012","unstructured":"Shi Han , Yingnong Dang , Song Ge , Dongmei Zhang , and Tao Xie . 2012 . Performance debugging in the large via mining millions of stack traces . In ICSE. 145 - 155 . Shi Han, Yingnong Dang, Song Ge, Dongmei Zhang, and Tao Xie. 2012. Performance debugging in the large via mining millions of stack traces. In ICSE. 145-155.","journal-title":"ICSE."},{"key":"e_1_2_2_26_1","first-page":"146","article-title":"Applying classification techniques to remotely-collected program execution data","author":"Haran Murali","year":"2005","unstructured":"Murali Haran , Alan Karr , Alessandro Orso , Adam Porter , and Ashish Sanil . 2005 . Applying classification techniques to remotely-collected program execution data . In ESEC\/FSE. 146 - 155 . Murali Haran, Alan Karr, Alessandro Orso, Adam Porter, and Ashish Sanil. 2005. Applying classification techniques to remotely-collected program execution data. In ESEC\/FSE. 146-155.","journal-title":"ESEC\/FSE."},{"key":"e_1_2_2_27_1","first-page":"474","article-title":"BugRedux: Reproducing field failures for in-house debugging","author":"Jin Wei","year":"2012","unstructured":"Wei Jin and Alessandro Orso . 2012 . BugRedux: Reproducing field failures for in-house debugging . In ICSE. 474 - 484 . Wei Jin and Alessandro Orso. 2012. BugRedux: Reproducing field failures for in-house debugging. In ICSE. 474-484.","journal-title":"ICSE."},{"key":"e_1_2_2_28_1","first-page":"213","article-title":"F3: Fault localization for field failures","author":"Jin Wei","year":"2013","unstructured":"Wei Jin and Alessandro Orso . 2013 . F3: Fault localization for field failures . In ISSTA. 213 - 223 . Wei Jin and Alessandro Orso. 2013. F3: Fault localization for field failures. In ISSTA. 213-223.","journal-title":"ISSTA."},{"key":"e_1_2_2_29_1","doi-asserted-by":"crossref","unstructured":"Shiva Prasad Kasiviswanathan Homin K Lee Kobbi Nissim Sofya Raskhodnikova and Adam Smith. 2011. What can we learn privately ? SICOMP 40 3 ( 2011 ) 793-826. Shiva Prasad Kasiviswanathan Homin K Lee Kobbi Nissim Sofya Raskhodnikova and Adam Smith. 2011. What can we learn privately ? SICOMP 40 3 ( 2011 ) 793-826.","DOI":"10.1137\/090756090"},{"key":"e_1_2_2_30_1","doi-asserted-by":"crossref","first-page":"141","DOI":"10.1145\/781131.781148","article-title":"Bug isolation via remote program sampling","author":"Liblit Ben","year":"2003","unstructured":"Ben Liblit , Alex Aiken , Alice Zheng , and Michael Jordan . 2003 . Bug isolation via remote program sampling . In PLDI. 141 - 154 . Ben Liblit, Alex Aiken, Alice Zheng, and Michael Jordan. 2003. Bug isolation via remote program sampling. In PLDI. 141-154.","journal-title":"PLDI."},{"key":"e_1_2_2_31_1","unstructured":"MathWorks. 2020. Optimization Toolbox. https:\/\/www.mathworks.com\/help\/optim. MathWorks. 2020. Optimization Toolbox. https:\/\/www.mathworks.com\/help\/optim."},{"key":"e_1_2_2_32_1","unstructured":"Mitula. 2020. Mitula Homes. https:\/\/play.google.com\/store\/apps\/details?id=com.mitula.homes. Mitula. 2020. Mitula Homes. https:\/\/play.google.com\/store\/apps\/details?id=com.mitula.homes."},{"key":"e_1_2_2_33_1","doi-asserted-by":"publisher","DOI":"10.1145\/1132462.1132465"},{"key":"e_1_2_2_34_1","first-page":"111","article-title":"Robust de-anonymization of large sparse datasets","author":"Narayanan Arvind","year":"2008","unstructured":"Arvind Narayanan and Vitaly Shmatikov . 2008 . Robust de-anonymization of large sparse datasets . In S&P. 111 - 125 . Arvind Narayanan and Vitaly Shmatikov. 2008. Robust de-anonymization of large sparse datasets. In S&P. 111-125.","journal-title":"S&P."},{"key":"e_1_2_2_35_1","first-page":"173","article-title":"De-anonymizing social networks","author":"Narayanan Arvind","year":"2009","unstructured":"Arvind Narayanan and Vitaly Shmatikov . 2009 . De-anonymizing social networks . In S&P. 173 - 187 . Arvind Narayanan and Vitaly Shmatikov. 2009. De-anonymizing social networks. In S&P. 173-187.","journal-title":"S&P."},{"key":"e_1_2_2_36_1","first-page":"1","volume-title":"Duet: An expressive higher-order language and linear type system for statically enforcing diferential privacy. PACMPL 3, OOPSLA ( 2019 )","author":"Near Joseph","year":"2019","unstructured":"Joseph Near , David Darais , Chike Abuah , Tim Stevens , Pranav Gaddamadugu , Lun Wang , Neel Somani , Mu Zhang , Nikhil Sharma , Alex Shan , and Dawn Song . 2019 . Duet: An expressive higher-order language and linear type system for statically enforcing diferential privacy. PACMPL 3, OOPSLA ( 2019 ) , 1 - 30 . Joseph Near, David Darais, Chike Abuah, Tim Stevens, Pranav Gaddamadugu, Lun Wang, Neel Somani, Mu Zhang, Nikhil Sharma, Alex Shan, and Dawn Song. 2019. Duet: An expressive higher-order language and linear type system for statically enforcing diferential privacy. PACMPL 3, OOPSLA ( 2019 ), 1-30."},{"key":"e_1_2_2_37_1","first-page":"619","article-title":"Clustering algorithms for the centralized and local models","author":"Nissim Kobbi","year":"2018","unstructured":"Kobbi Nissim and Uri Stemmer . 2018 . Clustering algorithms for the centralized and local models . In ALT. 619 - 653 . Kobbi Nissim and Uri Stemmer. 2018. Clustering algorithms for the centralized and local models. In ALT. 619-653.","journal-title":"ALT."},{"key":"e_1_2_2_38_1","first-page":"390","article-title":"Control-flow recovery from partial failure reports","author":"Ohmann Peter","year":"2017","unstructured":"Peter Ohmann , Alexander Brooks , Loris D'Antoni , and Ben Liblit . 2017 . Control-flow recovery from partial failure reports . In PLDI. 390 - 405 . Peter Ohmann, Alexander Brooks, Loris D'Antoni, and Ben Liblit. 2017. Control-flow recovery from partial failure reports. In PLDI. 390-405.","journal-title":"PLDI."},{"key":"e_1_2_2_39_1","first-page":"27","article-title":"Optimizing customized program coverage","author":"Ohmann Peter","year":"2016","unstructured":"Peter Ohmann , David Bingham Brown , Naveen Neelakandan , Jef Linderoth , and Ben Liblit . 2016 . Optimizing customized program coverage . In ASE. 27 - 38 . Peter Ohmann, David Bingham Brown, Naveen Neelakandan, Jef Linderoth, and Ben Liblit. 2016. Optimizing customized program coverage. In ASE. 27-38.","journal-title":"ASE."},{"key":"e_1_2_2_40_1","first-page":"128","article-title":"Leveraging field data for impact analysis and regression testing","author":"Orso Alessandro","year":"2003","unstructured":"Alessandro Orso , Taweesup Apiwattanapong , and Mary Jean Harrold . 2003 . Leveraging field data for impact analysis and regression testing . In ESEC\/FSE. 128 - 137 . Alessandro Orso, Taweesup Apiwattanapong, and Mary Jean Harrold. 2003. Leveraging field data for impact analysis and regression testing. In ESEC\/FSE. 128-137.","journal-title":"ESEC\/FSE."},{"key":"e_1_2_2_41_1","doi-asserted-by":"crossref","first-page":"65","DOI":"10.1145\/566172.566182","article-title":"GAMMA system: Continuous evolution of software after deployment","author":"Orso Alessandro","year":"2002","unstructured":"Alessandro Orso , Donglin Liang , Mary Jean Harrold , and Richard Lipton . 2002 . GAMMA system: Continuous evolution of software after deployment . In ISSTA. 65 - 69 . Alessandro Orso, Donglin Liang, Mary Jean Harrold, and Richard Lipton. 2002. GAMMA system: Continuous evolution of software after deployment. In ISSTA. 65-69.","journal-title":"ISSTA."},{"key":"e_1_2_2_42_1","first-page":"277","article-title":"Residual test coverage monitoring","author":"Pavlopoulou Christina","year":"1999","unstructured":"Christina Pavlopoulou and Michal Young . 1999 . Residual test coverage monitoring . In ICSE. 277 - 284 . Christina Pavlopoulou and Michal Young. 1999. Residual test coverage monitoring. In ICSE. 277-284.","journal-title":"ICSE."},{"key":"e_1_2_2_43_1","doi-asserted-by":"crossref","unstructured":"Fayola Peters Tim Menzies Liang Gong and Hongyu Zhang. 2013. Balancing privacy and utility in cross-company defect prediction. TSE 39 8 ( 2013 ) 1054-1068. Fayola Peters Tim Menzies Liang Gong and Hongyu Zhang. 2013. Balancing privacy and utility in cross-company defect prediction. TSE 39 8 ( 2013 ) 1054-1068.","DOI":"10.1109\/TSE.2013.6"},{"key":"e_1_2_2_44_1","unstructured":"Sable. 2020. Soot-A framework for analyzing and transforming Java and Android applications. https:\/\/soot-oss.github.io\/ soot. Sable. 2020. Soot-A framework for analyzing and transforming Java and Android applications. https:\/\/soot-oss.github.io\/ soot."},{"key":"e_1_2_2_45_1","unstructured":"ACM SIGACT\/EATCS. 2017. G\u00f6del Prize. https:\/\/sigact.org\/prizes\/g%C3%B6del\/citation2017.pdf. ACM SIGACT\/EATCS. 2017. G\u00f6del Prize. https:\/\/sigact.org\/prizes\/g%C3%B6del\/citation2017.pdf."},{"key":"e_1_2_2_46_1","volume-title":"Vivek Rangarajan Sridhar, and Doug Davidson","author":"Thakurta Abhradeep Guha","year":"2017","unstructured":"Abhradeep Guha Thakurta , Andrew H Vyrros , Umesh S Vaishampayan , Gaurav Kapoor , Julien Freudiger , Vivek Rangarajan Sridhar, and Doug Davidson . 2017 . Learning new words. In Granted US Patents 9594741 and 9645998. Abhradeep Guha Thakurta, Andrew H Vyrros, Umesh S Vaishampayan, Gaurav Kapoor, Julien Freudiger, Vivek Rangarajan Sridhar, and Doug Davidson. 2017. Learning new words. In Granted US Patents 9594741 and 9645998."},{"key":"e_1_2_2_47_1","unstructured":"Uber. 2017. Uber releases open source project for diferential privacy. https:\/\/medium.com \/uber-security-privacy\/diferentialprivacy-open-source-7892c82c42b6. Uber. 2017. Uber releases open source project for diferential privacy. https:\/\/medium.com \/uber-security-privacy\/diferentialprivacy-open-source-7892c82c42b6."},{"key":"e_1_2_2_48_1","first-page":"729","article-title":"Locally diferentially private protocols for frequency estimation","author":"Wang Tianhao","year":"2017","unstructured":"Tianhao Wang , Jeremiah Blocki , Ninghui Li , and Somesh Jha . 2017 . Locally diferentially private protocols for frequency estimation . In USENIX Security. 729 - 745 . Tianhao Wang, Jeremiah Blocki, Ninghui Li, and Somesh Jha. 2017. Locally diferentially private protocols for frequency estimation. In USENIX Security. 729-745.","journal-title":"USENIX Security."},{"key":"e_1_2_2_49_1","first-page":"1","article-title":"Consistent and accurate frequency oracles under local diferential privacy","author":"Wang Tianhao","year":"2020","unstructured":"Tianhao Wang , Milan Lopuha\u00e4-Zwakenberg , Zitao Li , Boris Skoric , and Ninghui Li . 2020 . Consistent and accurate frequency oracles under local diferential privacy . In NDSS. 1 - 16 . Tianhao Wang, Milan Lopuha\u00e4-Zwakenberg, Zitao Li, Boris Skoric, and Ninghui Li. 2020. Consistent and accurate frequency oracles under local diferential privacy. In NDSS. 1-16.","journal-title":"NDSS."},{"key":"e_1_2_2_50_1","first-page":"655","article-title":"Proving diferential privacy with shadow execution","author":"Wang Yuxin","year":"2019","unstructured":"Yuxin Wang , Zeyu Ding , Guanhong Wang , Daniel Kifer , and Danfeng Zhang . 2019 . Proving diferential privacy with shadow execution . In PLDI. 655 - 669 . Yuxin Wang, Zeyu Ding, Guanhong Wang, Daniel Kifer, and Danfeng Zhang. 2019. Proving diferential privacy with shadow execution. In PLDI. 655-669.","journal-title":"PLDI."},{"key":"e_1_2_2_51_1","article-title":"Randomized response: A survey technique for eliminating evasive answer bias","volume":"309","author":"Warner Stanley","year":"1965","unstructured":"Stanley Warner . 1965 . Randomized response: A survey technique for eliminating evasive answer bias . J. Amer. Statist. Assoc. 309 , 60 ( 1965 ), 63-69. Stanley Warner. 1965. Randomized response: A survey technique for eliminating evasive answer bias. J. Amer. Statist. Assoc. 309, 60 ( 1965 ), 63-69.","journal-title":"J. Amer. Statist. Assoc."},{"key":"e_1_2_2_52_1","first-page":"888","article-title":"LightDP: Towards automating diferential privacy proofs","author":"Zhang Danfeng","year":"2017","unstructured":"Danfeng Zhang and Daniel Kifer . 2017 . LightDP: Towards automating diferential privacy proofs . In PLDI. 888 - 901 . Danfeng Zhang and Daniel Kifer. 2017. LightDP: Towards automating diferential privacy proofs. In PLDI. 888-901.","journal-title":"PLDI."},{"key":"e_1_2_2_53_1","first-page":"51","article-title":"A study of event frequency profiling with diferential privacy","author":"Zhang Hailong","year":"2020","unstructured":"Hailong Zhang , Yu Hao , Sufian Latif , Raef Bassily , and Atanas Rountev . 2020 a. A study of event frequency profiling with diferential privacy . In CC. 51 - 62 . Hailong Zhang, Yu Hao, Sufian Latif, Raef Bassily, and Atanas Rountev. 2020a. A study of event frequency profiling with diferential privacy. In CC. 51-62.","journal-title":"CC."},{"key":"e_1_2_2_54_1","first-page":"1021","article-title":"Diferentially-Private Control-Flow Node Coverage for Software Usage Analysis","author":"Zhang Hailong","year":"2020","unstructured":"Hailong Zhang , Sufian Latif , Raef Bassily , and Atanas Rountev . 2020 b. Diferentially-Private Control-Flow Node Coverage for Software Usage Analysis . In USENIX Security. 1021 - 1038 . Hailong Zhang, Sufian Latif, Raef Bassily, and Atanas Rountev. 2020b. Diferentially-Private Control-Flow Node Coverage for Software Usage Analysis. In USENIX Security. 1021-1038.","journal-title":"USENIX Security."}],"container-title":["Proceedings of the ACM on Programming Languages"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3428271","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3428271","content-type":"application\/pdf","content-version":"vor","intended-application":"syndication"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3428271","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T22:02:57Z","timestamp":1750197777000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3428271"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,11,13]]},"references-count":54,"journal-issue":{"issue":"OOPSLA","published-print":{"date-parts":[[2020,11,13]]}},"alternative-id":["10.1145\/3428271"],"URL":"https:\/\/doi.org\/10.1145\/3428271","relation":{},"ISSN":["2475-1421"],"issn-type":[{"type":"electronic","value":"2475-1421"}],"subject":[],"published":{"date-parts":[[2020,11,13]]},"assertion":[{"value":"2020-11-13","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}