Zum Hauptinhalt springen

Showing 1–16 of 16 results for author: Darais, D

Searching in archive cs. Search in all archives.
.
  1. KATch: A Fast Symbolic Verifier for NetKAT

    Authors: Mark Moeller, Jules Jacobs, Olivier Savary Belanger, David Darais, Cole Schlesinger, Steffen Smolka, Nate Foster, Alexandra Silva

    Abstract: We develop new data structures and algorithms for checking verification queries in NetKAT, a domain-specific language for specifying the behavior of network data planes. Our results extend the techniques obtained in prior work on symbolic automata and provide a framework for building efficient and scalable verification tools. We present KATch, an implementation of these ideas in Scala, featuring a… ▽ More

    Submitted 21 June, 2024; v1 submitted 6 April, 2024; originally announced April 2024.

  2. arXiv:2312.11283  [pdf, other

    stat.AP cs.CR econ.EM

    The 2010 Census Confidentiality Protections Failed, Here's How and Why

    Authors: John M. Abowd, Tamara Adams, Robert Ashmead, David Darais, Sourya Dey, Simson L. Garfinkel, Nathan Goldschlag, Daniel Kifer, Philip Leclerc, Ethan Lew, Scott Moore, Rolando A. Rodríguez, Ramy N. Tadros, Lars Vilhuber

    Abstract: Using only 34 published tables, we reconstruct five variables (census block, sex, age, race, and ethnicity) in the confidential 2010 Census person records. Using the 38-bin age variable tabulated at the census block level, at most 20.1% of reconstructed records can differ from their confidential source on even a single value for these five variables. Using only published data, an attacker can veri… ▽ More

    Submitted 18 December, 2023; originally announced December 2023.

  3. Symphony: Expressive Secure Multiparty Computation with Coordination

    Authors: Ian Sweet, David Darais, David Heath, William Harris, Ryan Estes, Michael Hicks

    Abstract: Context: Secure Multiparty Computation (MPC) refers to a family of cryptographic techniques where mutually untrusting parties may compute functions of their private inputs while revealing only the function output. Inquiry: It can be hard to program MPCs correctly and efficiently using existing languages and frameworks, especially when they require coordinating disparate computational roles. How… ▽ More

    Submitted 20 February, 2023; originally announced February 2023.

    Journal ref: The Art, Science, and Engineering of Programming, 2023, Vol. 7, Issue 3, Article 14

  4. arXiv:2202.05089   

    cs.LG

    Backpropagation Clipping for Deep Learning with Differential Privacy

    Authors: Timothy Stevens, Ivoline C. Ngong, David Darais, Calvin Hirsch, David Slater, Joseph P. Near

    Abstract: We present backpropagation clipping, a novel variant of differentially private stochastic gradient descent (DP-SGD) for privacy-preserving deep learning. Our approach clips each trainable layer's inputs (during the forward pass) and its upstream gradients (during the backward pass) to ensure bounded global sensitivity for the layer's gradient; this combination replaces the gradient clipping step i… ▽ More

    Submitted 17 February, 2022; v1 submitted 10 February, 2022; originally announced February 2022.

    Comments: We found a bug in our implementation code that invalidates our experimental results

  5. arXiv:2105.01632  [pdf, ps, other

    cs.PL cs.CR

    Solo: A Lightweight Static Analysis for Differential Privacy

    Authors: Chike Abuah, David Darais, Joseph P. Near

    Abstract: All current approaches for statically enforcing differential privacy in higher order languages make use of either linear or relational refinement types. A barrier to adoption for these approaches is the lack of support for expressing these "fancy types" in mainstream programming languages. For example, no mainstream language supports relational refinement types, and although Rust and modern versio… ▽ More

    Submitted 13 October, 2021; v1 submitted 4 May, 2021; originally announced May 2021.

  6. arXiv:2103.08805  [pdf, ps, other

    cs.PL cs.CR

    DDUO: General-Purpose Dynamic Analysis for Differential Privacy

    Authors: Chike Abuah, Alex Silence, David Darais, Joe Near

    Abstract: Differential privacy enables general statistical analysis of data with formal guarantees of privacy protection at the individual level. Tools that assist data analysts with utilizing differential privacy have frequently taken the form of programming languages and libraries. However, many existing programming languages designed for compositional verification of differential privacy impose significa… ▽ More

    Submitted 15 March, 2021; originally announced March 2021.

  7. arXiv:2010.11342  [pdf, ps, other

    cs.PL cs.LO

    Contextual Linear Types for Differential Privacy

    Authors: Matías Toro, David Darais, Chike Abuah, Joe Near, Damián Árquez, Federico Olmedo, Éric Tanter

    Abstract: Language support for differentially-private programming is both crucial and delicate. While elaborate program logics can be very expressive, type-system based approaches using linear types tend to be more lightweight and amenable to automatic checking and inference, and in particular in the presence of higher-order programming. Since the seminal design of Fuzz, which is restricted to $ε$-different… ▽ More

    Submitted 1 March, 2023; v1 submitted 21 October, 2020; originally announced October 2020.

    Comments: Published in Transactions on Programming Languages and Systems (TOPLAS) 2023

  8. arXiv:2010.10664  [pdf, other

    cs.CR cs.DB

    DuetSGX: Differential Privacy with Secure Hardware

    Authors: Phillip Nguyen, Alex Silence, David Darais, Joseph P. Near

    Abstract: Differential privacy offers a formal privacy guarantee for individuals, but many deployments of differentially private systems require a trusted third party (the data curator). We propose DuetSGX, a system that uses secure hardware (Intel's SGX) to eliminate the need for a trusted data curator. Data owners submit encrypted data that can be decrypted only within a secure enclave running the DuetSGX… ▽ More

    Submitted 20 October, 2020; originally announced October 2020.

  9. arXiv:1909.02481  [pdf, other

    cs.PL cs.CR

    Duet: An Expressive Higher-order Language and Linear Type System for Statically Enforcing Differential Privacy

    Authors: Joseph P. Near, David Darais, Chike Abuah, Tim Stevens, Pranav Gaddamadugu, Lun Wang, Neel Somani, Mu Zhang, Nikhil Sharma, Alex Shan, Dawn Song

    Abstract: During the past decade, differential privacy has become the gold standard for protecting the privacy of individuals. However, verifying that a particular program provides differential privacy often remains a manual task to be completed by an expert in the field. Language-based techniques have been proposed for fully automating proofs of differential privacy via type system design, however these re… ▽ More

    Submitted 5 September, 2019; originally announced September 2019.

    Comments: Extended version of OOPSLA 2019 paper

  10. Constructive Galois Connections

    Authors: David Darais, David Van Horn

    Abstract: Galois connections are a foundational tool for structuring abstraction in semantics and their use lies at the heart of the theory of abstract interpretation. Yet, mechanization of Galois connections using proof assistants remains limited to restricted modes of use, preventing their general application in mechanized metatheory and certified programming. This paper presents constructive Galois con… ▽ More

    Submitted 23 July, 2018; originally announced July 2018.

    Journal ref: J. Funct. Prog. 29 (2019) e11

  11. A Language for Probabilistically Oblivious Computation

    Authors: David Darais, Ian Sweet, Chang Liu, Michael Hicks

    Abstract: An oblivious computation is one that is free of direct and indirect information leaks, e.g., due to observable differences in timing and memory access patterns. This paper presents Lambda Obliv, a core language whose type system enforces obliviousness. Prior work on type-enforced oblivious computation has focused on deterministic programs. Lambda Obliv is new in its consideration of programs that… ▽ More

    Submitted 12 November, 2019; v1 submitted 25 November, 2017; originally announced November 2017.

  12. Abstracting Definitional Interpreters

    Authors: David Darais, Nicholas Labich, Phuc C. Nguyen, David Van Horn

    Abstract: In this functional pearl, we examine the use of definitional interpreters as a basis for abstract interpretation of higher-order programming languages. As it turns out, definitional interpreters, especially those written in monadic style, can provide a nice basis for a wide variety of collecting semantics, abstract interpretations, symbolic executions, and their intermixings. But the real insigh… ▽ More

    Submitted 15 July, 2017; originally announced July 2017.

    Journal ref: Proc. ACM Program. Lang. 1, ICFP, Article 12 (September 2017)

  13. arXiv:1511.06965  [pdf, ps, other

    cs.PL

    Constructive Galois Connections: Taming the Galois Connection Framework for Mechanized Metatheory

    Authors: David Darais, David Van Horn

    Abstract: Galois connections are a foundational tool for structuring abstraction in semantics and their use lies at the heart of the theory of abstract interpretation. Yet, mechanization of Galois connections remains limited to restricted modes of use, preventing their general application in mechanized metatheory and certified programming. This paper presents constructive Galois connections, a variant of… ▽ More

    Submitted 26 October, 2016; v1 submitted 21 November, 2015; originally announced November 2015.

  14. arXiv:1507.03559  [pdf, other

    cs.PL

    Mechanically Verified Calculational Abstract Interpretation

    Authors: David Darais, David Van Horn

    Abstract: Calculational abstract interpretation, long advocated by Cousot, is a technique for deriving correct-by-construction abstract interpreters from the formal semantics of programming languages. This paper addresses the problem of deriving correct-by-verified-construction abstract interpreters with the use of a proof assistant. We identify several technical challenges to overcome with the aim of sup… ▽ More

    Submitted 13 July, 2015; originally announced July 2015.

  15. Galois Transformers and Modular Abstract Interpreters

    Authors: David Darais, Matthew Might, David Van Horn

    Abstract: The design and implementation of static analyzers has become increasingly systematic. Yet for a given language or analysis feature, it often requires tedious and error prone work to implement an analyzer and prove it sound. In short, static analysis features and their proofs of soundness do not compose well, causing a dearth of reuse in both implementation and metatheory. We solve the problem of… ▽ More

    Submitted 5 October, 2015; v1 submitted 14 November, 2014; originally announced November 2014.

    Comments: OOPSLA '15, October 25-30, 2015, Pittsburgh, PA, USA

    ACM Class: F.3.2

  16. arXiv:1010.5023  [pdf, ps, other

    cs.PL

    Yacc is dead

    Authors: Matthew Might, David Darais

    Abstract: We present two novel approaches to parsing context-free languages. The first approach is based on an extension of Brzozowski's derivative from regular expressions to context-free grammars. The second approach is based on a generalization of the derivative to parser combinators. The payoff of these techniques is a small (less than 250 lines of code), easy-to-implement parsing library capable of par… ▽ More

    Submitted 24 October, 2010; originally announced October 2010.

    Comments: 18 pages; submitted October 2009 to ESOP; rejected