{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,8,23]],"date-time":"2025-08-23T00:05:26Z","timestamp":1755907526791,"version":"3.44.0"},"publisher-location":"New York, NY, USA","reference-count":53,"publisher":"ACM","license":[{"start":{"date-parts":[[2024,12,2]],"date-time":"2024-12-02T00:00:00Z","timestamp":1733097600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by-nd\/4.0\/"}],"funder":[{"name":"The Joint CATCH MURI-AUSMURI"},{"DOI":"10.13039\/501100006374","name":"Deutsche Forschungsgemeinschaft","doi-asserted-by":"publisher","award":["EXC 2092 CASA - 390781972"],"award-info":[{"award-number":["EXC 2092 CASA - 390781972"]}],"id":[{"id":"10.13039\/501100006374","id-type":"DOI","asserted-by":"publisher"}]},{"name":"The ARC Discovery Project","award":["DP210102670"],"award-info":[{"award-number":["DP210102670"]}]},{"name":"The University of Melbourne Research Scholarship"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2024,12,2]]},"DOI":"10.1145\/3658644.3670281","type":"proceedings-article","created":{"date-parts":[[2024,12,9]],"date-time":"2024-12-09T12:19:20Z","timestamp":1733746760000},"page":"1909-1923","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":3,"title":["Elephants Do Not Forget: Differential Privacy with State Continuity for Privacy Budget"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0009-0009-1008-482X","authenticated-orcid":false,"given":"Jiankai","family":"Jin","sequence":"first","affiliation":[{"name":"The University of Melbourne, Melbourne, Australia"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-0329-2681","authenticated-orcid":false,"given":"Chitchanok","family":"Chuengsatiansup","sequence":"additional","affiliation":[{"name":"The University of Melbourne, Melbourne, Australia"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-8271-0289","authenticated-orcid":false,"given":"Toby","family":"Murray","sequence":"additional","affiliation":[{"name":"The University of Melbourne, Melbourne, Australia"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-2947-6980","authenticated-orcid":false,"given":"Benjamin I. P.","family":"Rubinstein","sequence":"additional","affiliation":[{"name":"The University of Melbourne, Melbourne, Australia"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-0401-4197","authenticated-orcid":false,"given":"Yuval","family":"Yarom","sequence":"additional","affiliation":[{"name":"Ruhr University Bochum, Bochum, Germany"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-9735-0538","authenticated-orcid":false,"given":"Olga","family":"Ohrimenko","sequence":"additional","affiliation":[{"name":"The University of Melbourne, Melbourne, Australia"}]}],"member":"320","published-online":{"date-parts":[[2024,12,9]]},"reference":[{"key":"e_1_3_2_1_1_1","volume-title":"Advances in Neural Information Processing Systems","volume":"32","author":"Allen Joshua","year":"2019","unstructured":"Joshua Allen, Bolin Ding, Janardhan Kulkarni, Harsha Nori, Olga Ohrimenko, and Sergey Yekhanin. 2019. An algorithmic framework for differentially private data analysis on trusted processors. Advances in Neural Information Processing Systems, Vol. 32 (2019)."},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2015.44"},{"key":"e_1_3_2_1_3_1","volume-title":"17th USENIX Symposium on Operating Systems Design and Implementation (OSDI 23)","author":"Angel Sebastian","year":"2023","unstructured":"Sebastian Angel, Aditya Basu, Weidong Cui, Trent Jaeger, Stella Lau, Srinath Setty, and Sudheesh Singanamalla. 2023. Nimble: Rollback protection for confidential cloud services. In 17th USENIX Symposium on Operating Systems Design and Implementation (OSDI 23). 193--208."},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1145\/3318464.3386141"},{"key":"e_1_3_2_1_5_1","volume-title":"9th Innovations in Theoretical Computer Science Conference, ITCS 2018","volume":"21","author":"Balcer Victor","year":"2018","unstructured":"Victor Balcer and Salil P. Vadhan. 2018. Differential privacy on finite computers. In 9th Innovations in Theoretical Computer Science Conference, ITCS 2018, January 11--14, 2018, Cambridge, MA, USA (LIPIcs, Vol. 94), Anna R. Karlin (Ed.). Schloss Dagstuhl - Leibniz-Zentrum f\u00fcr Informatik, 43:1--43:21."},{"key":"e_1_3_2_1_6_1","volume-title":"Proceedings, Part II 39","author":"Balle Borja","year":"2019","unstructured":"Borja Balle, James Bell, Adri\u00e0 Gasc\u00f3n, and Kobbi Nissim. 2019. The privacy blanket of the shuffle model. In Advances in Cryptology--CRYPTO 2019: 39th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 18--22, 2019, Proceedings, Part II 39. Springer, 638--667."},{"key":"e_1_3_2_1_7_1","volume-title":"Tumult Analytics: A robust, easy-to-use, scalable, and expressive framework for differential privacy. arXiv preprint arXiv:2212.04133","author":"Berghel Skye","year":"2022","unstructured":"Skye Berghel, Philip Bohannon, Damien Desfontaines, Charles Estes, Sam Haney, Luke Hartman, Michael Hay, Ashwin Machanavajjhala, Tom Magerlein, Gerome Miklau, et al. 2022. Tumult Analytics: A robust, easy-to-use, scalable, and expressive framework for differential privacy. arXiv preprint arXiv:2212.04133 (2022)."},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1145\/3132747.3132769"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1109\/DSN.2017.45"},{"key":"e_1_3_2_1_10_1","volume-title":"11th USENIX Workshop on Offensive Technologies.","author":"Brasser Ferdinand","year":"2017","unstructured":"Ferdinand Brasser, Urs M\u00fcller, Alexandra Dmitrienko, Kari Kostiainen, Srdjan Capkun, and Ahmad-Reza Sadeghi. 2017. Software grand exposure: SGX cache attacks are practical. In 11th USENIX Workshop on Offensive Technologies."},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1145\/343477.343502"},{"volume-title":"Introduction to reliable and secure distributed programming","author":"Cachin Christian","key":"e_1_3_2_1_12_1","unstructured":"Christian Cachin, Rachid Guerraoui, and Lu\u00eds Rodrigues. 2011. Introduction to reliable and secure distributed programming. Springer Science & Business Media."},{"key":"e_1_3_2_1_13_1","first-page":"15676","article-title":"The discrete gaussian for differential privacy","volume":"33","author":"Canonne Cl\u00e9ment L","year":"2020","unstructured":"Cl\u00e9ment L Canonne, Gautam Kamath, and Thomas Steinke. 2020. The discrete gaussian for differential privacy. Advances in Neural Information Processing Systems, Vol. 33 (2020), 15676--15688.","journal-title":"Advances in Neural Information Processing Systems"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1145\/3548606.3560708"},{"key":"e_1_3_2_1_15_1","volume-title":"Intel SGX explained. Cryptology ePrint Archive","author":"Costan Victor","year":"2016","unstructured":"Victor Costan and Srinivas Devadas. 2016. Intel SGX explained. Cryptology ePrint Archive (2016)."},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1145\/773153.773173"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1007\/11681878_14"},{"key":"e_1_3_2_1_18_1","volume-title":"Foundations and Trends\u00ae in Theoretical Computer Science","volume":"9","author":"Dwork Cynthia","year":"2014","unstructured":"Cynthia Dwork, Aaron Roth, et al. 2014. The algorithmic foundations of differential privacy. Foundations and Trends\u00ae in Theoretical Computer Science, Vol. 9, 3--4 (2014), 211--407."},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1109\/FOCS.2010.12"},{"volume-title":"Google's differential privacy libraries. https:\/\/github.com\/google\/differential-privacy. [Online","year":"2024","key":"e_1_3_2_1_20_1","unstructured":"Google. 2024. Google's differential privacy libraries. https:\/\/github.com\/google\/differential-privacy. [Online; accessed 17-Jan-2024]."},{"key":"e_1_3_2_1_21_1","volume-title":"Private advertising: Aggregation Service overview. https:\/\/developers.google.com\/privacy-sandbox\/relevance\/aggregation-service. [Online","author":"Sandbox Privacy","year":"2024","unstructured":"Google. 2024. Privacy Sandbox. Private advertising: Aggregation Service overview. https:\/\/developers.google.com\/privacy-sandbox\/relevance\/aggregation-service. [Online; accessed 26-Jun-2024]."},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1145\/3065913.3065915"},{"key":"e_1_3_2_1_23_1","volume-title":"Proceedings on Privacy Enhancing Technologies","author":"Gribov Alexey","year":"2019","unstructured":"Alexey Gribov, Dhinakaran Vinayagamurthy, and Sergey Gorbunov. 2019. StealthDB: a Scalable Encrypted Database with Full SQL Query Support. Proceedings on Privacy Enhancing Technologies (2019)."},{"key":"e_1_3_2_1_24_1","volume-title":"20th USENIX Security Symposium (USENIX Security 11)","author":"Haeberlen Andreas","year":"2011","unstructured":"Andreas Haeberlen, Benjamin C. Pierce, and Arjun Narayan. 2011. Differential privacy under fire. In 20th USENIX Security Symposium (USENIX Security 11). USENIX Association, San Francisco, CA."},{"key":"e_1_3_2_1_25_1","volume-title":"Precision-based attacks and interval refining: How to break, then fix, differential privacy on finite computers. Journal of Privacy and Confidentiality","author":"Haney Samuel","year":"2022","unstructured":"Samuel Haney, Damien Desfontaines, Luke Hartman, Ruchit Shrestha, and Michael Hay. 2022. Precision-based attacks and interval refining: How to break, then fix, differential privacy on finite computers. Journal of Privacy and Confidentiality (2022)."},{"key":"e_1_3_2_1_26_1","volume-title":"6th Workshop on the Theory and Practice of Differential Privacy.","author":"Hay Michael","year":"2020","unstructured":"Michael Hay, Marco Gaboardi, and Salil Vadhan. 2020. A programming framework for OpenDP. In 6th Workshop on the Theory and Practice of Differential Privacy."},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1145\/2487726.2488370"},{"key":"e_1_3_2_1_28_1","volume-title":"Proceedings, Part II 26","author":"Holohan Naoise","year":"2021","unstructured":"Naoise Holohan and Stefano Braghin. 2021. Secure random sampling in differential privacy. In Computer Security--ESORICS 2021: 26th European Symposium on Research in Computer Security, Darmstadt, Germany, October 4--8, 2021, Proceedings, Part II 26. Springer, 523--542."},{"key":"e_1_3_2_1_29_1","volume-title":"2020 DIGIX Advertisement CTR Prediction. https:\/\/www.kaggle.com\/datasets\/louischen7\/2020-digix-advertisement-ctr-prediction\/. [Online","author":"HUAWEI.","year":"2024","unstructured":"HUAWEI. 2020. 2020 DIGIX Advertisement CTR Prediction. https:\/\/www.kaggle.com\/datasets\/louischen7\/2020-digix-advertisement-ctr-prediction\/. [Online; accessed 01-Jan-2024]."},{"key":"e_1_3_2_1_30_1","volume-title":"30th USENIX Security Symposium (USENIX Security 21)","author":"Jangid Mohit Kumar","year":"2021","unstructured":"Mohit Kumar Jangid, Guoxing Chen, Yinqian Zhang, and Zhiqiang Lin. 2021. Towards formal verification of state continuity for enclave programs. In 30th USENIX Security Symposium (USENIX Security 21). 573--590."},{"key":"e_1_3_2_1_31_1","volume-title":"Yuval Yarom, and Olga Ohrimenko.","author":"Jin Jiankai","year":"2024","unstructured":"Jiankai Jin, Chitchanok Chuengsatiansup, Toby Murray, Benjamin IP Rubinstein, Yuval Yarom, and Olga Ohrimenko. 2024. Elephants Do Not Forget: Differential Privacy with State Continuity for Privacy Budget. arXiv preprint arXiv:2401.17628 (2024)."},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP46214.2022.9833672"},{"key":"e_1_3_2_1_33_1","volume-title":"International Conference on Machine Learning (ICML). PMLR, 1376--1385","author":"Kairouz Peter","year":"2015","unstructured":"Peter Kairouz, Sewoong Oh, and Pramod Viswanath. 2015. The composition theorem for differential privacy. In International Conference on Machine Learning (ICML). PMLR, 1376--1385."},{"key":"e_1_3_2_1_34_1","volume-title":"Cohere: Managing Differential Privacy in Large Scale Systems. In IEEE Symposium on Security and Privacy (S&P). IEEE Computer Society, 121--121","author":"K\u00fcchler Nicolas","year":"2024","unstructured":"Nicolas K\u00fcchler, Emanuel Opel, Hidde Lycklama, Alexander Viand, and Anwar Hithnawi. 2024. Cohere: Managing Differential Privacy in Large Scale Systems. In IEEE Symposium on Security and Privacy (S&P). IEEE Computer Society, 121--121."},{"key":"e_1_3_2_1_35_1","volume-title":"26th USENIX Security Symposium (USENIX Security 17)","author":"Matetic Sinisa","year":"2017","unstructured":"Sinisa Matetic, Mansoor Ahmed, Kari Kostiainen, Aritra Dhar, David Sommer, Arthur Gervais, Ari Juels, and Srdjan Capkun. 2017. ROTE: Rollback protection for trusted execution. In 26th USENIX Security Symposium (USENIX Security 17). 1289--1306."},{"key":"e_1_3_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.1145\/1559845.1559850"},{"key":"e_1_3_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.1145\/2382196.2382264"},{"key":"e_1_3_2_1_38_1","unstructured":"Phillip Nguyen Alex Silence David Darais and Joseph P Near. 2020. DuetSGX: Differential privacy with secure hardware. In Theory and Practice of Differential Privacy (TPDP)."},{"key":"e_1_3_2_1_39_1","doi-asserted-by":"publisher","DOI":"10.1145\/3548606.3560620"},{"key":"e_1_3_2_1_40_1","volume-title":"Oblivious Multi-Party Machine Learning on Trusted Processors. In USENIX Security Symposium, Thorsten Holz and Stefan Savage (Eds.). USENIX Association, 619--636","author":"Ohrimenko Olga","year":"2016","unstructured":"Olga Ohrimenko, Felix Schuster, C\u00e9dric Fournet, Aastha Mehta, Sebastian Nowozin, Kapil Vaswani, and Manuel Costa. 2016. Oblivious Multi-Party Machine Learning on Trusted Processors. In USENIX Security Symposium, Thorsten Holz and Stefan Savage (Eds.). USENIX Association, 619--636."},{"key":"e_1_3_2_1_41_1","volume-title":"DP Test Datasets. https:\/\/github.com\/opendp\/dp-test-datasets. [Online","author":"DP.","year":"2024","unstructured":"OpenDP. 2022. DP Test Datasets. https:\/\/github.com\/opendp\/dp-test-datasets. [Online; accessed 17-Jan-2024]."},{"key":"e_1_3_2_1_42_1","volume-title":"https:\/\/github.com\/opendp\/opendp. [Online","author":"Library DP.","year":"2024","unstructured":"OpenDP. 2024. OpenDP Library. https:\/\/github.com\/opendp\/opendp. [Online; accessed 17-Jan-2024]."},{"key":"e_1_3_2_1_43_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2011.38"},{"key":"e_1_3_2_1_44_1","doi-asserted-by":"publisher","DOI":"10.1145\/2043556.2043566"},{"key":"e_1_3_2_1_45_1","volume-title":"EnclaveDB: A Secure Database Using SGX. In 2018 IEEE Symposium on Security and Privacy (SP). 264--278","author":"Priebe Christian","year":"2018","unstructured":"Christian Priebe, Kapil Vaswani, and Manuel Costa. 2018. EnclaveDB: A Secure Database Using SGX. In 2018 IEEE Symposium on Security and Privacy (SP). 264--278."},{"key":"e_1_3_2_1_46_1","doi-asserted-by":"publisher","DOI":"10.1145\/191177.191194"},{"key":"e_1_3_2_1_47_1","unstructured":"Mark Russinovich Edward Ashton Christine Avanessians Miguel Castro Amaury Chamayou Sylvan Clebsch Manuel Costa C\u00e9dric Fournet Matthew Kerner Sid Krishna Julien Maffre Thomas Moscibroda Kartik Nayak Olga Ohrimenko Felix Schuster Roy Schwartz Alex Shamis Olga Vrousgou and Christoph M. Wintersteiger. 2019. CCF: A Framework for Building Confidential Verifiable Replicated Services. Technical Report MSR-TR-2019--16. Microsoft."},{"key":"e_1_3_2_1_48_1","volume-title":"25th USENIX Security Symposium (USENIX Security 16)","author":"Strackx Raoul","year":"2016","unstructured":"Raoul Strackx and Frank Piessens. 2016. Ariadne: A minimal approach to state continuity. In 25th USENIX Security Symposium (USENIX Security 16). 875--892."},{"key":"e_1_3_2_1_49_1","volume-title":"Privacy loss in Apple's implementation of differential privacy on MacOS 10.12. arXiv preprint arXiv:1709.02753","author":"Tang Jun","year":"2017","unstructured":"Jun Tang, Aleksandra Korolova, Xiaolong Bai, Xueqiang Wang, and Xiaofeng Wang. 2017. Privacy loss in Apple's implementation of differential privacy on MacOS 10.12. arXiv preprint arXiv:1709.02753 (2017)."},{"volume-title":"Uber: Differentially private SQL. https:\/\/github.com\/uber-archive\/sql-differential-privacy. [Online","year":"2019","key":"e_1_3_2_1_50_1","unstructured":"Uber. 2019. Uber: Differentially private SQL. https:\/\/github.com\/uber-archive\/sql-differential-privacy. [Online; accessed 10-Jan-2024]."},{"key":"e_1_3_2_1_51_1","unstructured":"U.S. Census Bureau. 2020. Census Bureau sets key parameters to protect privacy in 2020 Census results. https:\/\/www.census.gov\/newsroom\/press-releases\/"},{"key":"e_1_3_2_1_52_1","doi-asserted-by":"publisher","DOI":"10.1145\/3626761"},{"key":"e_1_3_2_1_53_1","volume-title":"Pysyft: A library for easy federated learning. Federated learning systems: Towards next-generation AI","author":"Ziller Alexander","year":"2021","unstructured":"Alexander Ziller, Andrew Trask, Antonio Lopardo, Benjamin Szymkow, Bobby Wagner, Emma Bluemke, Jean-Mickael Nounahon, Jonathan Passerat-Palmbach, Kritika Prakash, Nick Rose, et al. 2021. Pysyft: A library for easy federated learning. Federated learning systems: Towards next-generation AI (2021), 111--139."}],"event":{"name":"CCS '24: ACM SIGSAC Conference on Computer and Communications Security","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"],"location":"Salt Lake City UT USA","acronym":"CCS '24"},"container-title":["Proceedings of the 2024 on ACM SIGSAC Conference on Computer and Communications Security"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3658644.3670281","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3658644.3670281","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,8,22]],"date-time":"2025-08-22T06:09:21Z","timestamp":1755842961000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3658644.3670281"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,12,2]]},"references-count":53,"alternative-id":["10.1145\/3658644.3670281","10.1145\/3658644"],"URL":"https:\/\/doi.org\/10.1145\/3658644.3670281","relation":{},"subject":[],"published":{"date-parts":[[2024,12,2]]},"assertion":[{"value":"2024-12-09","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}