{"id":"https://openalex.org/W7130711397","doi":"https://doi.org/10.48550/arxiv.2602.17454","title":"Privacy in Theory, Bugs in Practice: Grey-Box Auditing of Differential Privacy Libraries","display_name":"Privacy in Theory, Bugs in Practice: Grey-Box Auditing of Differential Privacy Libraries","publication_year":2026,"publication_date":"2026-02-19","ids":{"openalex":"https://openalex.org/W7130711397","doi":"https://doi.org/10.48550/arxiv.2602.17454"},"language":null,"primary_location":{"id":"pmh:doi:10.48550/arxiv.2602.17454","is_oa":true,"landing_page_url":null,"pdf_url":null,"source":{"id":"https://openalex.org/S4406922384","display_name":"Open MIND","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"repository"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":null,"raw_type":"Article"},"type":"preprint","indexed_in":["datacite"],"open_access":{"is_oa":true,"oa_status":"green","oa_url":null,"any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5068633454","display_name":"Tudor Cebere","orcid":null},"institutions":[],"countries":[],"is_corresponding":true,"raw_author_name":"Cebere, Tudor","raw_affiliation_strings":[],"affiliations":[]},{"author_position":"middle","author":{"id":"https://openalex.org/A5126486900","display_name":"David Erb","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Erb, David","raw_affiliation_strings":[],"affiliations":[]},{"author_position":"middle","author":{"id":"https://openalex.org/A5068236076","display_name":"Damien Desfontaines","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Desfontaines, Damien","raw_affiliation_strings":[],"affiliations":[]},{"author_position":"middle","author":{"id":null,"display_name":"Bellet, Aur\u00e9lien","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Bellet, Aur\u00e9lien","raw_affiliation_strings":[],"affiliations":[]},{"author_position":"last","author":{"id":"https://openalex.org/A5062858053","display_name":"Jack K. Fitzsimons","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Fitzsimons, Jack","raw_affiliation_strings":[],"affiliations":[]}],"institutions":[],"countries_distinct_count":0,"institutions_distinct_count":5,"corresponding_author_ids":["https://openalex.org/A5068633454"],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":null,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":null,"cited_by_percentile_year":null,"biblio":{"volume":null,"issue":null,"first_page":null,"last_page":null},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11424","display_name":"Security and Verification in Computing","score":0.24549999833106995,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11424","display_name":"Security and Verification in Computing","score":0.24549999833106995,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.2224999964237213,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10764","display_name":"Privacy-Preserving Technologies in Data","score":0.11509999632835388,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/audit","display_name":"Audit","score":0.6970999836921692},{"id":"https://openalex.org/keywords/python","display_name":"Python (programming language)","score":0.5663999915122986},{"id":"https://openalex.org/keywords/implementation","display_name":"Implementation","score":0.4999000132083893},{"id":"https://openalex.org/keywords/differential-privacy","display_name":"Differential privacy","score":0.4846999943256378},{"id":"https://openalex.org/keywords/information-sensitivity","display_name":"Information sensitivity","score":0.4805000126361847},{"id":"https://openalex.org/keywords/obfuscation","display_name":"Obfuscation","score":0.4490000009536743},{"id":"https://openalex.org/keywords/control-flow","display_name":"Control flow","score":0.44110000133514404},{"id":"https://openalex.org/keywords/software","display_name":"Software","score":0.42719998955726624},{"id":"https://openalex.org/keywords/sensitivity","display_name":"Sensitivity (control systems)","score":0.38499999046325684}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7955999970436096},{"id":"https://openalex.org/C199521495","wikidata":"https://www.wikidata.org/wiki/Q181487","display_name":"Audit","level":2,"score":0.6970999836921692},{"id":"https://openalex.org/C519991488","wikidata":"https://www.wikidata.org/wiki/Q28865","display_name":"Python (programming language)","level":2,"score":0.5663999915122986},{"id":"https://openalex.org/C26713055","wikidata":"https://www.wikidata.org/wiki/Q245962","display_name":"Implementation","level":2,"score":0.4999000132083893},{"id":"https://openalex.org/C23130292","wikidata":"https://www.wikidata.org/wiki/Q5275358","display_name":"Differential privacy","level":2,"score":0.4846999943256378},{"id":"https://openalex.org/C137822555","wikidata":"https://www.wikidata.org/wiki/Q2587068","display_name":"Information sensitivity","level":2,"score":0.4805000126361847},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.45010000467300415},{"id":"https://openalex.org/C40305131","wikidata":"https://www.wikidata.org/wiki/Q2616305","display_name":"Obfuscation","level":2,"score":0.4490000009536743},{"id":"https://openalex.org/C160191386","wikidata":"https://www.wikidata.org/wiki/Q868299","display_name":"Control flow","level":2,"score":0.44110000133514404},{"id":"https://openalex.org/C2777904410","wikidata":"https://www.wikidata.org/wiki/Q7397","display_name":"Software","level":2,"score":0.42719998955726624},{"id":"https://openalex.org/C21200559","wikidata":"https://www.wikidata.org/wiki/Q7451068","display_name":"Sensitivity (control systems)","level":2,"score":0.38499999046325684},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.37220001220703125},{"id":"https://openalex.org/C123201435","wikidata":"https://www.wikidata.org/wiki/Q456632","display_name":"Information privacy","level":2,"score":0.3695000112056732},{"id":"https://openalex.org/C169093310","wikidata":"https://www.wikidata.org/wiki/Q3702971","display_name":"Personally identifiable information","level":2,"score":0.33489999175071716},{"id":"https://openalex.org/C2779136372","wikidata":"https://www.wikidata.org/wiki/Q10283002","display_name":"Information flow","level":2,"score":0.3325999975204468},{"id":"https://openalex.org/C87007009","wikidata":"https://www.wikidata.org/wiki/Q210832","display_name":"Statistical hypothesis testing","level":2,"score":0.33149999380111694},{"id":"https://openalex.org/C116834253","wikidata":"https://www.wikidata.org/wiki/Q2039217","display_name":"Identification (biology)","level":2,"score":0.32409998774528503},{"id":"https://openalex.org/C1009929","wikidata":"https://www.wikidata.org/wiki/Q179550","display_name":"Software bug","level":3,"score":0.302700012922287},{"id":"https://openalex.org/C115903868","wikidata":"https://www.wikidata.org/wiki/Q80993","display_name":"Software engineering","level":1,"score":0.2955999970436096},{"id":"https://openalex.org/C80958533","wikidata":"https://www.wikidata.org/wiki/Q1047174","display_name":"Audit trail","level":3,"score":0.2928999960422516},{"id":"https://openalex.org/C48103436","wikidata":"https://www.wikidata.org/wiki/Q599031","display_name":"State (computer science)","level":2,"score":0.2906000018119812},{"id":"https://openalex.org/C2775924081","wikidata":"https://www.wikidata.org/wiki/Q55608371","display_name":"Control (management)","level":2,"score":0.28630000352859497},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.274399995803833},{"id":"https://openalex.org/C3018397939","wikidata":"https://www.wikidata.org/wiki/Q3644502","display_name":"Open source","level":3,"score":0.2712000012397766},{"id":"https://openalex.org/C527821871","wikidata":"https://www.wikidata.org/wiki/Q228502","display_name":"Access control","level":2,"score":0.266400009393692},{"id":"https://openalex.org/C114289077","wikidata":"https://www.wikidata.org/wiki/Q3284399","display_name":"Statistical model","level":2,"score":0.26179999113082886},{"id":"https://openalex.org/C26517878","wikidata":"https://www.wikidata.org/wiki/Q228039","display_name":"Key (lock)","level":2,"score":0.2572000026702881},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.2531999945640564}],"mesh":[],"locations_count":2,"locations":[{"id":"pmh:doi:10.48550/arxiv.2602.17454","is_oa":true,"landing_page_url":null,"pdf_url":null,"source":{"id":"https://openalex.org/S4406922384","display_name":"Open MIND","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"repository"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":null,"raw_type":"Article"},{"id":"doi:10.48550/arxiv.2602.17454","is_oa":true,"landing_page_url":"https://doi.org/10.48550/arxiv.2602.17454","pdf_url":null,"source":{"id":"https://openalex.org/S4306400194","display_name":"arXiv (Cornell University)","issn_l":null,"issn":null,"is_oa":true,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I205783295","host_organization_name":"Cornell University","host_organization_lineage":["https://openalex.org/I205783295"],"host_organization_lineage_names":[],"type":"repository"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":null,"is_accepted":false,"is_published":null,"raw_source_name":null,"raw_type":"article"}],"best_oa_location":{"id":"pmh:doi:10.48550/arxiv.2602.17454","is_oa":true,"landing_page_url":null,"pdf_url":null,"source":{"id":"https://openalex.org/S4406922384","display_name":"Open MIND","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"repository"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":null,"raw_type":"Article"},"sustainable_development_goals":[{"display_name":"Peace, Justice and strong institutions","id":"https://metadata.un.org/sdg/16","score":0.41555723547935486}],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":0,"referenced_works":[],"related_works":[],"abstract_inverted_index":{"Differential":[0],"privacy":[1,142,172],"(DP)":[2],"implementations":[3],"are":[4,19,24],"notoriously":[5],"prone":[6],"to":[7,38,101,165],"errors,":[8],"with":[9,69],"subtle":[10],"bugs":[11],"frequently":[12],"invalidating":[13],"theoretical":[14,147],"guarantees.":[15,148],"Existing":[16],"verification":[17],"methods":[18],"often":[20],"impractical:":[21],"formal":[22],"tools":[23],"too":[25],"restrictive,":[26],"while":[27],"black-box":[28],"statistical":[29,105],"auditing":[30,51,129],"is":[31,123],"intractable":[32],"for":[33,75,162],"complex":[34],"pipelines":[35],"and":[36,79,109,126,137,139,170],"fails":[37],"pinpoint":[39],"the":[40,43,55,91],"source":[41],"of":[42,58,83,176],"bug.":[44],"This":[45],"paper":[46],"introduces":[47],"Re:cord-play,":[48],"a":[49,103],"gray-box":[50],"paradigm":[52],"that":[53,107,118,144],"inspects":[54],"internal":[56,96],"state":[57],"DP":[59,163],"algorithms.":[60],"By":[61],"running":[62],"an":[63,154],"instrumented":[64],"algorithm":[65],"on":[66],"neighboring":[67],"datasets":[68],"identical":[70],"randomness,":[71],"Re:cord-play":[72],"directly":[73],"checks":[74],"data-dependent":[76],"control":[77],"flow":[78],"provides":[80],"concrete":[81],"falsification":[82],"sensitivity":[84,89],"violations":[85,143],"by":[86,128],"comparing":[87],"declared":[88],"against":[90],"empirically":[92],"measured":[93],"distance":[94],"between":[95],"inputs.":[97],"We":[98,116,149],"generalize":[99],"this":[100],"Re:cord-play-sample,":[102],"full":[104],"audit":[106],"isolates":[108],"tests":[110],"each":[111],"component,":[112],"including":[113,133],"untrusted":[114],"ones.":[115],"show":[117],"our":[119,151],"novel":[120],"testing":[121,173],"approach":[122],"both":[124],"effective":[125],"necessary":[127],"12":[130],"open-source":[131,155],"libraries,":[132],"SmartNoise":[134],"SDK,":[135],"Opacus,":[136],"Diffprivlib,":[138],"uncovering":[140],"13":[141],"impact":[145],"their":[146,177],"release":[150],"framework":[152],"as":[153,174],"Python":[156],"package,":[157],"thereby":[158],"making":[159],"it":[160],"easy":[161],"developers":[164],"integrate":[166],"effective,":[167],"computationally":[168],"inexpensive,":[169],"seamless":[171],"part":[175],"software":[178],"development":[179],"lifecycle.":[180]},"counts_by_year":[],"updated_date":"2026-04-04T16:13:02.066488","created_date":"2026-02-21T00:00:00"}
