Neural Trojans

被引:225
作者
Liu, Yuntao [1 ]
Xie, Yang [1 ]
Srivastava, Ankur [1 ]
机构
[1] Univ Maryland, College Pk, MD 20742 USA
来源
2017 IEEE 35TH INTERNATIONAL CONFERENCE ON COMPUTER DESIGN (ICCD) | 2017年
基金
美国国家科学基金会;
关键词
D O I
10.1109/ICCD.2017.16
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
While neural networks demonstrate stronger capabilities in pattern recognition nowadays, they are also becoming larger and deeper. As a result, the effort needed to train a network also increases dramatically. In many cases, it is more practical to use a neural network intellectual property (IP) that an IP vendor has already trained. As we do not know about the training process, there can be security threats in the neural IP: the IP vendor (attacker) may embed hidden malicious functionality, i.e. neural Trojans, into the neural IP. We show that this is an effective attack and provide three mitigation techniques: input anomaly detection, re-training, and input preprocessing. All the techniques are proven effective. The input anomaly detection approach is able to detect 99.8% of Trojan triggers although with 12.2% false positive. The re-training approach is able to prevent 94.1% of Trojan triggers from triggering the Trojan although it requires that the neural IP be reconfigurable. In the input preprocessing approach, 90.2% of Trojan triggers are rendered ineffective and no assumption about the neural IP is needed.
引用
收藏
页码:45 / 48
页数:4
相关论文
共 13 条
[1]  
[Anonymous], PROC CVPR IEEE
[2]  
[Anonymous], 2016, arXiv
[3]  
[Anonymous], 2010, IEEE DESIGN TEST COM
[4]  
[Anonymous], 2013, 2 INT C LEARNING REP
[5]   The security of machine learning [J].
Barreno, Marco ;
Nelson, Blaine ;
Joseph, Anthony D. ;
Tygar, J. D. .
MACHINE LEARNING, 2010, 81 (02) :121-148
[6]  
Biggio B., 2012, INT C MACHINE LEARNI
[7]   Anomaly Detection: A Survey [J].
Chandola, Varun ;
Banerjee, Arindam ;
Kumar, Vipin .
ACM COMPUTING SURVEYS, 2009, 41 (03)
[8]  
Goodfellow I., 2015, ARXIV14126572, P1
[9]   Gradient-based learning applied to document recognition [J].
Lecun, Y ;
Bottou, L ;
Bengio, Y ;
Haffner, P .
PROCEEDINGS OF THE IEEE, 1998, 86 (11) :2278-2324
[10]  
Mei SK, 2015, AAAI CONF ARTIF INTE, P2871