SOTER: Guarding Black-box Inference for General Neural Networks at the Edge

被引:0
作者
Shen, Tianxiang [1 ]
Qi, Ji [1 ]
Jiang, Jianyu [1 ]
Wang, Xian [1 ]
Wen, Siyuan [1 ]
Chen, Xusheng [1 ]
Zhao, Shixiong [1 ]
Wang, Sen [2 ]
Chen, Li [2 ]
Luo, Xiapu [3 ]
Zhang, Fengwei [4 ]
Cui, Heming [1 ]
机构
[1] Univ Hong Kong, Hong Kong, Peoples R China
[2] Huawei Technol Co Ltd, Shenzhen, Peoples R China
[3] Hong Kong Polytech Univ, Hong Kong, Peoples R China
[4] Southern Univ Sci & Technol, Shenzhen, Peoples R China
来源
PROCEEDINGS OF THE 2022 USENIX ANNUAL TECHNICAL CONFERENCE | 2022年
基金
中国国家自然科学基金;
关键词
D O I
暂无
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
The prosperity of AI and edge computing has pushed more and more well-trained DNN models to be deployed on third-party edge devices to compose mission-critical applications. This necessitates protecting model confidentiality at untrusted devices, and using a co-located accelerator (e.g., GPU) to speed up model inference locally. Recently, the community has sought to improve the security with CPU trusted execution environments (TEE). However, existing solutions either run an entire model in TEE, suffering from extremely high inference latency, or take a partition-based approach to handcraft partial model via parameter obfuscation techniques to run on an untrusted GPU, achieving lower inference latency at the expense of both the integrity of partitioned computations outside TEE and accuracy of obfuscated parameters. We propose SOTER, the first system that can achieve model confidentiality, integrity, low inference latency and high accuracy in the partition-based approach. Our key observation is that there is often an associativity property among many inference operators in DNN models. Therefore, SOTER automatically transforms a major fraction of associative operators into parameter-morphed, thus confidentiality-preserved operators to execute on untrusted GPU, and fully restores the execution results to accurate results with associativity in TEE. Based on these steps, SOTER further designs an oblivious fingerprinting technique to safely detect integrity breaches of morphed operators outside TEE to ensure correct executions of inferences. Experimental results on six prevalent models in the three most popular categories show that, even with stronger model protection, SOTER achieves comparable performance with partition-based baselines while retaining the same high accuracy as insecure inference.
引用
收藏
页码:723 / 737
页数:15
相关论文
共 72 条
[1]  
Agarap A. F., 2018, arXiv
[2]  
Aggarwal A, 2020, Arxiv, DOI arXiv:2007.12934
[3]  
AMD, 2020, White Paper
[4]  
[Anonymous], 2004, IACR Cryptol. ePrint Arch.
[5]  
Asvadishirehjini Aref, 2020, arXiv, DOI DOI arXiv:2010.08855.null
[6]  
Atli Buse Gul, 2020, Engineering Dependable and Secure Machine Learning Systems: Third International Workshop, EDSMLS 2020. Communications in Computer and Information Science (1272), P42, DOI 10.1007/978-3-030-62144-5_4
[7]  
Aumasson J., 2016, Black Hat
[8]  
Bellare M, 2012, LECT NOTES COMPUT SC, V7417, P294
[9]  
Bojarski M, 2016, Arxiv, DOI [arXiv:1604.07316, DOI 10.48550/ARXIV.1604.07316]
[10]   Attacking vision-based perception in end-to-end autonomous driving models [J].
Boloor, Adith ;
Garimella, Karthik ;
He, Xin ;
Gill, Christopher ;
Vorobeychik, Yevgeniy ;
Zhang, Xuan .
JOURNAL OF SYSTEMS ARCHITECTURE, 2020, 110