Bridging Machine Learning and Cryptography in Defence Against Adversarial Attacks

被引:8
|
作者
Taran, Olga [1 ]
Rezaeifar, Shideh [1 ]
Voloshynovskiy, Slava [1 ]
机构
[1] Univ Geneva, Dept Comp Sci, Geneva, Switzerland
关键词
Adversarial attacks; Defence; Data-independent transform; Secret key; Cryptography principle;
D O I
10.1007/978-3-030-11012-3_23
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
In the last decade, deep learning algorithms have become very popular thanks to the achieved performance in many machine learning and computer vision tasks. However, most of the deep learning architectures are vulnerable to so called adversarial examples. This questions the security of deep neural networks (DNN) for many security- and trust-sensitive domains. The majority of the proposed existing adversarial attacks are based on the differentiability of the DNN cost function. Defence strategies are mostly based on machine learning and signal processing principles that either try to detect-reject or filter out the adversarial perturbations and completely neglect the classical cryptographic component in the defence. In this work, we propose a new defence mechanism based on the second Kerckhoffs's cryptographic principle which states that the defence and classification algorithm are supposed to be known, but not the key. To be compliant with the assumption that the attacker does not have access to the secret key, we will primarily focus on a gray-box scenario and do not address a white-box one. More particularly, we assume that the attacker does not have direct access to the secret block, but (a) he completely knows the system architecture, (b) he has access to the data used for training and testing and (c) he can observe the output of the classifier for each given input. We show empirically that our system is efficient against most famous state-of-the-art attacks in black-box and gray-box scenarios.
引用
收藏
页码:267 / 279
页数:13
相关论文
共 50 条
  • [21] Security Hardening of Intelligent Reflecting Surfaces Against Adversarial Machine Learning Attacks
    Catak, Ferhat Ozgur
    Kuzlu, Murat
    Tang, Haolin
    Catak, Evren
    Zhao, Yanxiao
    IEEE ACCESS, 2022, 10 : 100267 - 100275
  • [22] Using Undervolting as an on-Device Defense Against Adversarial Machine Learning Attacks
    Majumdar, Saikat
    Samavatian, Mohammad Hossein
    Barber, Kristin
    Teodorescu, Radu
    2021 IEEE INTERNATIONAL SYMPOSIUM ON HARDWARE ORIENTED SECURITY AND TRUST (HOST), 2021, : 158 - 169
  • [23] Detection of adversarial attacks on machine learning systems
    Judah, Matthew
    Sierchio, Jen
    Planer, Michael
    ARTIFICIAL INTELLIGENCE AND MACHINE LEARNING FOR MULTI-DOMAIN OPERATIONS APPLICATIONS V, 2023, 12538
  • [24] Safe Machine Learning and Defeating Adversarial Attacks
    Rouhani, Bita Darvish
    Samragh, Mohammad
    Javidi, Tara
    Koushanfar, Farinaz
    IEEE SECURITY & PRIVACY, 2019, 17 (02) : 31 - 38
  • [25] XAI enhancing cyber defence against adversarial attacks in industrial applications
    Makridis, Georgios
    Theodoropoulos, Spyros
    Dardanis, Dimitrios
    Makridis, Ioannis
    Separdani, Maria Margarita
    Fatouros, Georgios
    Kyriazis, Dimosthenis
    Koulouris, Panagiotis
    2022 IEEE 5TH INTERNATIONAL CONFERENCE ON IMAGE PROCESSING APPLICATIONS AND SYSTEMS, IPAS, 2022,
  • [26] Discretization Inspired Defence Algorithm Against Adversarial Attacks on Tabular Data
    Zhou, Jiahui
    Zaidi, Nayyar
    Zhang, Yishuo
    Li, Gang
    ADVANCES IN KNOWLEDGE DISCOVERY AND DATA MINING, PAKDD 2022, PT II, 2022, 13281 : 367 - 379
  • [27] Defense Against Adversarial Attacks in Deep Learning
    Li, Yuancheng
    Wang, Yimeng
    APPLIED SCIENCES-BASEL, 2019, 9 (01):
  • [28] Federated Machine Learning in Medical imaging and against Adversarial Attacks: A retrospective multicohort study
    Teo, Zhen Ling
    Zhang, Xiaoman
    Tan, Ting Fang
    Ravichandran, Narrendar
    Yong, Liu
    Ting, Daniel S. W.
    INVESTIGATIVE OPHTHALMOLOGY & VISUAL SCIENCE, 2023, 64 (08)
  • [29] FriendlyFoe: Adversarial Machine Learning as a Practical Architectural Defense against Side Channel Attacks
    Nam, Hyoungwook
    Pothukuchi, Raghavendra Pradyumna
    Li, Bo
    Kim, Nam Sung
    Torrellas, Josep
    PROCEEDINGS OF THE 2024 THE INTERNATIONAL CONFERENCE ON PARALLEL ARCHITECTURES AND COMPILATION TECHNIQUES, PACT 2024, 2024, : 338 - 350
  • [30] Using Honeypots in a Decentralized Framework to Defend Against Adversarial Machine-Learning Attacks
    Younis, Fadi
    Miri, Ali
    APPLIED CRYPTOGRAPHY AND NETWORK SECURITY WORKSHOPS, 2019, 11605 : 24 - 48