PRIVACY-PRESERVING PHISHING WEB PAGE CLASSIFICATION VIA FULLY HOMOMORPHIC ENCRYPTION

被引:0
作者
Chou, Edward J. [1 ,3 ]
Gururajan, Arun [2 ]
Laine, Kim [3 ]
Goel, Nitin Kumar [2 ]
Bertiger, Anna [2 ]
Stokes, Jack W. [3 ]
机构
[1] Stanford Univ, Palo Alto, CA 94305 USA
[2] Microsoft Corp, One Microsoft Way, Redmond, WA 98052 USA
[3] Microsoft Res, One Microsoft Way, Redmond, WA 98052 USA
来源
2020 IEEE INTERNATIONAL CONFERENCE ON ACOUSTICS, SPEECH, AND SIGNAL PROCESSING | 2020年
关键词
Phishing; Classification; Homomorphic Encryption;
D O I
10.1109/icassp40776.2020.9053729
中图分类号
O42 [声学];
学科分类号
070206 ; 082403 ;
摘要
This work introduces a fast and lightweight homomorphic-encryption pipeline that enables privacy-preserving machine learning for phishing web page recognition. The primary goals are to use visual features to train an accurate model and to implement an inference pipeline with practical runtime and communication costs. To do so, we deploy a variety of techniques that cover deep learning and optical character recognition to extract salient visual features, and optimize the inner mechanisms of state-of-the-art homomorphic encryption schemes to reduce the encryption-related costs. Our presented system is able to achieve over 90% on the visual classification task, while using less than 250 KB of communication bandwidth and around 0.7 seconds of computation time. We hope our work not only demonstrates a private visual phishing detection pipeline, but also outlines techniques to practically utilize homomorphic encryption in a variety of machine learning tasks.
引用
收藏
页码:2792 / 2796
页数:5
相关论文
共 27 条
  • [1] On the Protection of Private Information in Machine Learning Systems: Two Recent Approches (Invited Paper)
    Abadi, Martin
    Erlingsson, Ulfar
    Goodfellow, Ian
    McMahan, H. Brendan
    Mironov, Ilya
    Papernot, Nicolas
    Talwar, Kunal
    Zhang, Li
    [J]. 2017 IEEE 30TH COMPUTER SECURITY FOUNDATIONS SYMPOSIUM (CSF), 2017, : 1 - 6
  • [2] Deep Learning with Differential Privacy
    Abadi, Martin
    Chu, Andy
    Goodfellow, Ian
    McMahan, H. Brendan
    Mironov, Ilya
    Talwar, Kunal
    Zhang, Li
    [J]. CCS'16: PROCEEDINGS OF THE 2016 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, 2016, : 308 - 318
  • [3] [Anonymous], 2019, MICR SEAL REL 3 3
  • [4] [Anonymous], 2017, CRYPTODL DEEP NEURAL
  • [5] [Anonymous], 2017, CORR
  • [6] Research-paper recommender systems: a literature survey
    Beel, Joeran
    Gipp, Bela
    Langer, Stefan
    Breitinger, Corinna
    [J]. INTERNATIONAL JOURNAL ON DIGITAL LIBRARIES, 2016, 17 (04) : 305 - 338
  • [7] Homomorphic Encryption for Arithmetic of Approximate Numbers
    Cheon, Jung Hee
    Kim, Andrey
    Kim, Miran
    Song, Yongsoo
    [J]. ADVANCES IN CRYPTOLOGY - ASIACRYPT 2017, PT I, 2017, 10624 : 409 - 437
  • [8] Corona Igino, 2017, CORR
  • [9] Das Sanchari, 2019, All about phishing: Exploring user research through a systematic literature review
  • [10] Dowlin N, 2016, PR MACH LEARN RES, V48