Skip to content

Code and draft article for Simson Garfinkel, John M. Abowd, and Christian Martindale. 2019. Understanding database reconstruction attacks on public data. Commun. ACM 62, 3 (February 2019), 46-53. DOI: https://doi.org/10.1145/3287287

simsong/cacm_understanding_database_reconstruction

Repository files navigation

Sat solvers:

https://cstheory.stackexchange.com/posts/7473/revisions

The purpose of this project is to teach data agency officials about the dangers of database reconstruction attacks.

The problem statement and white paper are found in problem_analysis.md.

.dimacs files contain CNF files to feed into the demo solver in the DIMACS file format.

Demo program using pycoSAT can be found in satsolver_attack_example.py.

We evaluated three SAT solvers:

  • picosat
  • minisat
  • Walksat_v51

We found that picosat reliably worked best, running in the fastest time and with the least amount of memory. Minisat was always slower, Walksat did not find solutions.

Input for the SAT solver was created with Naoyuki Tamura research's Sugar program:

  1. You talk in the introduction about how formally proving privacy is important instead of relying on “hunches", but then we never revisit that topic in the section where we actually add the noise and rerun Sugar. I’m not sure if the way I added noise from the Laplace mechanism was differentially private or not. I think we should either remove the parts about formal privacy from the intro or add an explanation in the last section about how we can now say that our database is mathematically sound against a DRA.

About

Code and draft article for Simson Garfinkel, John M. Abowd, and Christian Martindale. 2019. Understanding database reconstruction attacks on public data. Commun. ACM 62, 3 (February 2019), 46-53. DOI: https://doi.org/10.1145/3287287

Resources

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published