Adversarial Machine Learning in Industry: A Systematic Literature Review

被引:2
作者
Jedrzejewski, Felix Viktor [1 ]
Thode, Lukas [1 ]
Fischbach, Jannik [2 ,3 ]
Gorschek, Tony [1 ,3 ]
Mendez, Daniel [1 ,3 ]
Lavesson, Niklas [1 ]
机构
[1] Blekinge Inst Technol, Valhallavagen 1, S-37179 Karlskrona, Sweden
[2] Netlight Consulting GmbH, Sternstr 5, D-80538 Munich, Germany
[3] Fortiss GmbH, Guerickestr 25, D-80805 Munich, Germany
关键词
Adversarial machine learning; Industry; Rigor; Relevance; State of evidence; MEMBERSHIP INFERENCE ATTACKS; SECURITY; INTELLIGENCE; CLASSIFIERS; INTERNET; THREATS;
D O I
10.1016/j.cose.2024.103988
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Adversarial Machine Learning (AML) discusses the act of attacking and defending Machine Learning (ML) Models, an essential building block of Artificial Intelligence (AI). ML is applied in many software-intensive products and services and introduces new opportunities and security challenges. AI and ML will gain even more attention from the industry in the future, but threats caused by already-discovered attacks specifically targeting ML models are either overseen, ignored, or mishandled. Current AML research investigates attack and defense scenarios for ML in different industrial settings with a varying degree of maturity with regard to academic rigor and practical relevance. However, to the best of our knowledge, a synthesis of the state of academic rigor and practical relevance is missing. This literature study reviews studies in the area of AML in the context of industry, measuring and analyzing each study's rigor and relevance scores. Overall, all studies scored a high rigor score and a low relevance score, indicating that the studies are thoroughly designed and documented but miss the opportunity to include touch points relatable for practitioners.
引用
收藏
页数:18
相关论文
共 118 条
  • [11] Developing A Compelling Vision for Winning the Cybersecurity Arms Race
    Bertino, Elisa
    Singhal, Anoop
    Srinivasagopalan, Srivathsan
    Verma, Rakesh
    [J]. PROCEEDINGS OF THE TENTH ACM CONFERENCE ON DATA AND APPLICATION SECURITY AND PRIVACY, CODASPY 2020, 2020, : 220 - 221
  • [12] Machine Learning for industrial applications: A comprehensive literature review
    Bertolini, Massimo
    Mezzogori, Davide
    Neroni, Mattia
    Zammori, Francesco
    [J]. EXPERT SYSTEMS WITH APPLICATIONS, 2021, 175
  • [13] Bieringer L, 2022, PROCEEDINGS OF THE EIGHTEENTH SYMPOSIUM ON USABLE PRIVACY AND SECURITY, SOUPS 2022, P97
  • [14] Wild Patterns: Ten Years After the Rise of Adversarial Machine Learning Half-day Tutorial
    Biggio, Battista
    Roli, Fabio
    [J]. PROCEEDINGS OF THE 2018 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY (CCS'18), 2018, : 2154 - 2156
  • [15] Bilge L., 2012, P ACM C COMP COMM SE, P833, DOI [10.1145/2382196.2382284, DOI 10.1145/2382196.2382284]
  • [16] "I Never Thought About Securing My Machine Learning Systems": A Study of Security and Privacy Awareness of Machine Learning Practitioners
    Boenisch, Franziska
    Battis, Verena
    Buchmann, Nicolas
    Poikela, Maija
    [J]. MENSCH AND COMPUTER 2021 (MUC 21), 2021, : 520 - 546
  • [17] Burcham Morgan, 2017, P HOT TOP SCI SEC S, P13
  • [18] Security Hardening of Intelligent Reflecting Surfaces Against Adversarial Machine Learning Attacks
    Catak, Ferhat Ozgur
    Kuzlu, Murat
    Tang, Haolin
    Catak, Evren
    Zhao, Yanxiao
    [J]. IEEE ACCESS, 2022, 10 : 100267 - 100275
  • [19] Chakraborty A, 2018, Arxiv, DOI arXiv:1810.00069
  • [20] Adversarial Machine Learning in Malware Detection: Arms Race between Evasion Attack and Defense
    Chen, Lingwei
    Ye, Yanfang
    Bourlai, Thirimachos
    [J]. 2017 EUROPEAN INTELLIGENCE AND SECURITY INFORMATICS CONFERENCE (EISIC), 2017, : 99 - 106