Data reduction for black-box adversarial attacks against deep neural networks based on side-channel attacks

被引:0
作者
Zhou, Hanxun [1 ]
Liu, Zhihui [1 ]
Hu, Yufeng [1 ]
Zhang, Shuo [1 ]
Kang, Longyu [1 ]
Feng, Yong [1 ]
Wang, Yan [1 ]
Guo, Wei [2 ]
Zou, Cliff C. [3 ]
机构
[1] Liaoning Univ, Shenyang, Peoples R China
[2] Shenyang Aerosp Univ, Shenyang, Peoples R China
[3] Univ Cent Florida, Orlando, FL USA
基金
美国国家科学基金会;
关键词
Deep learning; Side-channel attack; Data reduction; Adversarial attack;
D O I
10.1016/j.cose.2025.104401
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Launching effective black-box adversarial attack against a deep neural network (DNN) without knowledge of the model's details is challenging. Previous studies involved performing numerous queries on the target model to generate adversarial examples, which is unacceptable due to the high query volume. Additionally, many of these queries are unnecessary as the dataset may contain redundant or duplicate data. To address these issues, we propose a two-stage black-box adversarial attack approach that combines side-channel attacks and a data reduction technique. In the first stage, we employ Long Short Term Memory (LSTM) to gather partial information about the target DNN through side-channel attacks, enabling us to obtain the class probability of the dataset. In the second stage, we utilize a new data reduction algorithm based on the class probability to enhance the efficiency of generating adversarial examples. Our approach is capable of precisely identifying the target model and the data reduction performs better than other reduction methods. Furthermore, when utilizing the reduced datasets to train the shadow model, the adversarial examples generated on this shadow model demonstrate a higher transferability success rate than SOTA data reduction methods.
引用
收藏
页数:11
相关论文
共 34 条
[1]  
Acharya R.Y., 2022, IACR T CRYPTOGRAPHIC
[2]   Adversarial example detection for DNN models: a review and experimental comparison [J].
Aldahdooh, Ahmed ;
Hamidouche, Wassim ;
Fezza, Sid Ahmed ;
Deforges, Olivier .
ARTIFICIAL INTELLIGENCE REVIEW, 2022, 55 (06) :4403-4462
[3]   Big Self-Supervised Models Advance Medical Image Classification [J].
Azizi, Shekoofeh ;
Mustafa, Basil ;
Ryan, Fiona ;
Beaver, Zachary ;
Freyberg, Jan ;
Deaton, Jonathan ;
Loh, Aaron ;
Karthikesalingam, Alan ;
Kornblith, Simon ;
Chen, Ting ;
Natarajan, Vivek ;
Norouzi, Mohammad .
2021 IEEE/CVF INTERNATIONAL CONFERENCE ON COMPUTER VISION (ICCV 2021), 2021, :3458-3468
[4]  
Bhagoji ArjunNitin., 2017, arXiv
[5]   LSTM-GateCNN network for Aspect sentiment analysis [J].
Cao, Shuhua ;
Gao, Pengxiang .
2020 5TH INTERNATIONAL CONFERENCE ON INFORMATION SCIENCE, COMPUTER TECHNOLOGY AND TRANSPORTATION (ISCTT 2020), 2020, :443-447
[6]  
Chen YX, 2020, PROCEEDINGS OF THE 29TH USENIX SECURITY SYMPOSIUM, P2667
[7]  
Cheng SY, 2019, ADV NEUR IN, V32
[8]  
Chitta K, 2019, Training Data Distribution Search with Ensemble Active Learning
[9]   When Side-Channel Attacks Break the Black-Box Property of Embedded Artificial Intelligence [J].
Coqueret, Benoit ;
Carbone, Mathieu ;
Sentieys, Olivier ;
Zaid, Gabriel .
PROCEEDINGS OF THE 16TH ACM WORKSHOP ON ARTIFICIAL INTELLIGENCE AND SECURITY, AISEC 2023, 2023, :127-138
[10]  
Fnu S., 2020, USENIX SEC S