DeepAttest: An End-to-End Attestation Framework for Deep Neural Networks

被引:37
作者
Chen, Huili [1 ]
Fu, Cheng [1 ]
Rouhani, Bita Darvish [1 ,2 ]
Zhao, Jishen [1 ]
Koushanfar, Farinaz [1 ]
机构
[1] Univ Calif San Diego, San Diego, CA 92103 USA
[2] Microsoft, Redmond, WA USA
来源
PROCEEDINGS OF THE 2019 46TH INTERNATIONAL SYMPOSIUM ON COMPUTER ARCHITECTURE (ISCA '19) | 2019年
关键词
IP Protection; Deep Neural Networks; Software/Hardware Co-design; Attestation;
D O I
10.1145/3307650.3322251
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Emerging hardware architectures for Deep Neural Networks (DNNs) are being commercialized and considered as the hardware-level Intellectual Property (IP) of the device providers. However, these intelligent devices might be abused and such vulnerability has not been identified. The unregulated usage of intelligent platforms and the lack of hardware-bounded IP protection impair the commercial advantage of the device provider and prohibit reliable technology transfer. Our goal is to design a systematic methodology that provides hardware-level IP protection and usage control for DNN applications on various platforms. To address the IP concern, we present DeepAttest, the first on-device DNN attestation method that certifies the legitimacy of the DNN program mapped to the device. DeepAttest works by designing a device-specific fingerprint which is encoded in the weights of the DNN deployed on the target platform. The embedded fingerprint (FP) is later extracted with the support of the Trusted Execution Environment (TEE). The existence of the pre-defined FP is used as the attestation criterion to determine whether the queried DNN is authenticated. Our attestation framework ensures that only authorized DNN programs yield the matching FP and are allowed for inference on the target device. DeepAttest provisions the device provider with a practical solution to limit the application usage of her manufactured hardware and prevents unauthorized or tampered DNNs from execution. We take an Algorithm/Software/Hardware co-design approach to optimize DeepAttest's overhead in terms of latency and energy consumption. To facilitate the deployment, we provide a high-level API of DeepAttest that can be seamlessly integrated into existing deep learning frameworks and TEEs for hardware-level IP protection and usage control. Extensive experiments corroborate the fidelity, reliability, security, and efficiency of DeepAttest on various DNN benchmarks and TEE-supported platforms.
引用
收藏
页码:487 / 498
页数:12
相关论文
共 52 条
  • [1] Adi Yossi, 2018, TURNING YOUR WEAKNES
  • [2] [Anonymous], 2016, 12 USENIX S OP SYST
  • [3] [Anonymous], 2001, J. Am. Stat. Assoc.
  • [4] Architecure ARM, 2009, Security technology building a secure system using trustzone technology
  • [5] Arvin AM, 2009, LIVE VARIOLA VIRUS: CONSIDERATIONS FOR CONTINUING RESEARCH, P9
  • [6] Belkin M, 2006, J MACH LEARN RES, V7, P2399
  • [7] Boivie R., 2012, RC25287 (WAT1205-070), P1
  • [8] TyTAN: Tiny Trust Anchor for Tiny Devices
    Brasser, Ferdinand
    El Mahjoub, Brahim
    Sadeghi, Ahmad-Reza
    Wachsmann, Christian
    Koeberl, Patrick
    [J]. 2015 52ND ACM/EDAC/IEEE DESIGN AUTOMATION CONFERENCE (DAC), 2015,
  • [9] Brasser Ferdinand., 2017, Software grand exposure: SGX cache attacks are practical
  • [10] Chen Huili, 2019, ACM INT C MULT RETR