Cryptanalytic Extraction of Neural Network Models

被引:66
作者
Carlini, Nicholas [1 ]
Jagielski, Matthew [2 ]
Mironov, Ilya [3 ]
机构
[1] Google, Mountain View, CA 94043 USA
[2] Northeastern Univ, Boston, MA 02115 USA
[3] Facebook, Menlo Pk, CA USA
来源
ADVANCES IN CRYPTOLOGY - CRYPTO 2020, PT III | 2020年 / 12172卷
关键词
D O I
10.1007/978-3-030-56877-1_7
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
We argue that the machine learning problem of model extraction is actually a cryptanalytic problem in disguise, and should be studied as such. Given oracle access to a neural network, we introduce a differential attack that can efficiently steal the parameters of the remote model up to floating point precision. Our attack relies on the fact that ReLU neural networks are piecewise linear functions, and thus queries at the critical points reveal information about the model parameters. We evaluate our attack on multiple neural network models and extract models that are 2(20) times more precise and require 100x fewer queries than prior work. For example, we extract a 100,000 parameter neural network trained on the MNIST digit recognition task with 2(21.5) queries in under an hour, such that the extracted model agrees with the oracle on all inputs up to a worst-case error of 2(-25), or a model with 4,000 parameters in 2(18.5) queries with worst-case error of 2(-40.4). Code is available at https://github.com/google-research/cryptanalytic-model-extraction.
引用
收藏
页码:189 / 218
页数:30
相关论文
共 38 条
[1]  
[Anonymous], 2013, LNCS (LNAI), V8190, P387, DOI [10.1007/978-3-642-40994-325, DOI 10.1007/978-3-642-40994-325]
[2]  
Bahdanau D, 2016, Arxiv, DOI arXiv:1409.0473
[3]  
Batina L, 2019, PROCEEDINGS OF THE 28TH USENIX SECURITY SYMPOSIUM, P515
[4]  
BCM+13 Biggio B., ECML PKDD
[5]  
BIHAM E, 1991, LECT NOTES COMPUT SC, V537, P2
[6]   Towards the cold atom analog false vacuum [J].
Braden, Jonathan ;
Johnson, Matthew C. ;
Peiris, Hiranya V. ;
Weinfurtner, Silke .
JOURNAL OF HIGH ENERGY PHYSICS, 2018, (07)
[7]  
Carlini N, 2019, PROCEEDINGS OF THE 28TH USENIX SECURITY SYMPOSIUM, P267
[8]  
Chandrasekaran V., 2018, arXiv
[9]  
Das A, 2020, PROCEEDINGS OF THE THIRTY-FIRST ANNUAL ACM-SIAM SYMPOSIUM ON DISCRETE ALGORITHMS (SODA'20), P398
[10]  
Dowlin N, 2016, PR MACH LEARN RES, V48