Exploiting Deep Neural Networks as Covert Channels

被引:0
|
作者
Pishbin, Hora Saadaat [1 ]
Bidgoly, Amir Jalaly [1 ]
机构
[1] Univ Qom, Dept Informat Technol & Comp Engn, Qom 3716146611, Iran
关键词
Data models; Computational modeling; Deep learning; Receivers; Training; Artificial neural networks; Malware; Trustworthy machine learning; deep neural network; covert channel; deep learning attack; concealment;
D O I
10.1109/TDSC.2023.3300072
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
With the increasing development of deep learning models, the security of these models has become more important. In this work, for the first time, we have investigated the possibility of abusing the deep model as a covert channel. The concept of a covert channel is to use a channel that is not designed for information exchange for transmitting a covert message. This work studies how a deep model can be used by an adversary as a covert channel. The proposed approach is using an end-to-end training deep model called the covert model to produce artificial data which includes some covert messages. This artificial data is the input of the deep model, which is aimed at being exploited as a covert channel, in such a way that the signal will be covered in the output of this model. To achieve indistinguishability of concealment, generative adversarial networks are used. The results show that it is possible to have a covert channel with an acceptable message transmission power in well-known deep models such as the ResNet and InceptionV3 models. Results of case studies indicate the signal-to-noise ratio (SNR) of 12.67, the bit error rate (BER) of 0.08, and the accuracy of the deep model used to hide the signal reaches 92%.
引用
收藏
页码:2115 / 2126
页数:12
相关论文
共 50 条
  • [1] Removing Neurons From Deep Neural Networks Trained With Tabular Data
    Klemetti, Antti
    Raatikainen, Mikko
    Kivimaki, Juhani
    Myllyaho, Lalli
    Nurminen, Jukka K.
    IEEE OPEN JOURNAL OF THE COMPUTER SOCIETY, 2024, 5 : 542 - 552
  • [2] Exploiting multi-channels deep convolutional neural networks for multivariate time series classification
    Yi Zheng
    Qi Liu
    Enhong Chen
    Yong Ge
    J. Leon Zhao
    Frontiers of Computer Science, 2016, 10 : 96 - 112
  • [3] Exploiting multi-channels deep convolutional neural networks for multivariate time series classification
    Zheng, Yi
    Liu, Qi
    Chen, Enhong
    Ge, Yong
    Zhao, J. Leon
    FRONTIERS OF COMPUTER SCIENCE, 2016, 10 (01) : 96 - 112
  • [4] A Gradient Boosting Approach for Training Convolutional and Deep Neural Networks
    Emami, Seyedsaman
    Martinez-Munoz, Gonzalo
    IEEE OPEN JOURNAL OF SIGNAL PROCESSING, 2023, 4 : 313 - 321
  • [5] Exploiting Vulnerabilities of Deep Neural Networks for Privacy Protection
    Sanchez-Matilla, Ricardo
    Li, Chau Yi
    Shamsabadi, Ali Shahin
    Mazzon, Riccardo
    Cavallaro, Andrea
    IEEE TRANSACTIONS ON MULTIMEDIA, 2020, 22 (07) : 1862 - 1873
  • [6] Matryoshka: Exploiting the Over-Parametrization of Deep Learning Models for Covert Data Transmission
    Pan, Xudong
    Zhang, Mi
    Yan, Yifan
    Zhang, Shengyao
    Yang, Min
    IEEE TRANSACTIONS ON PATTERN ANALYSIS AND MACHINE INTELLIGENCE, 2025, 47 (02) : 663 - 678
  • [7] Accretionary Learning With Deep Neural Networks With Applications
    Wei, Xinyu
    Juang, Biing-Hwang
    Wang, Ouya
    Zhou, Shenglong
    Li, Geoffrey Ye
    IEEE TRANSACTIONS ON COGNITIVE COMMUNICATIONS AND NETWORKING, 2024, 10 (02) : 660 - 673
  • [8] Watermarking Deep Neural Networks in Image Processing
    Quan, Yuhui
    Teng, Huan
    Chen, Yixin
    Ji, Hui
    IEEE TRANSACTIONS ON NEURAL NETWORKS AND LEARNING SYSTEMS, 2021, 32 (05) : 1852 - 1865
  • [9] Proteus: Exploiting precision variability in deep neural networks
    Judd, Patrick
    Albericio, Jorge
    Hetherington, Tayler
    Aamodt, Tor
    Jerger, Natalie Enright
    Urtasun, Raquel
    Moshovos, Andreas
    PARALLEL COMPUTING, 2018, 73 : 40 - 51
  • [10] Sensing Danger: Exploiting Sensors to Build Covert Channels
    Ulz, Thomas
    Feldbacher, Markus
    Pieber, Thomas
    Steger, Christian
    PROCEEDINGS OF THE 5TH INTERNATIONAL CONFERENCE ON INFORMATION SYSTEMS SECURITY AND PRIVACY (ICISSP), 2019, : 100 - 113