SIN2: Stealth infection on neural network \#x2014; A low-cost agile neural Trojan attack methodology
Title | SIN2: Stealth infection on neural network \#x2014; A low-cost agile neural Trojan attack methodology |
Publication Type | Conference Paper |
Year of Publication | 2018 |
Authors | Liu, T., Wen, W., Jin, Y. |
Conference Name | 2018 IEEE International Symposium on Hardware Oriented Security and Trust (HOST) |
Publisher | IEEE |
ISBN Number | 978-1-5386-4731-8 |
Keywords | AI Poisoning, artificial intelligence industry, cloud computing, Computational modeling, Deep Neural Network, DNN security, dynamic runtime system, Human Behavior, intelligent service supply chain, intelligent supply chain, Intelligent systems, invasive software, learning (artificial intelligence), low-cost agile neural Trojan attack methodology, low-cost modular methodology-stealth infection on neural network, neural computing framework, neural nets, Neural networks, Payloads, portable DNN computing engine, pubcrawl, resilience, Resiliency, Runtime, Scalability, security, SIN2, software algorithm level, static neural network model, third-party cloud based machine learning as a service, Trojan horses |
Abstract | Deep Neural Network (DNN) has recently become the "de facto" technique to drive the artificial intelligence (AI) industry. However, there also emerges many security issues as the DNN based intelligent systems are being increasingly prevalent. Existing DNN security studies, such as adversarial attacks and poisoning attacks, are usually narrowly conducted at the software algorithm level, with the misclassification as their primary goal. The more realistic system-level attacks introduced by the emerging intelligent service supply chain, e.g. the third-party cloud based machine learning as a service (MLaaS) along with the portable DNN computing engine, have never been discussed. In this work, we propose a low-cost modular methodology-Stealth Infection on Neural Network, namely "SIN2", to demonstrate the novel and practical intelligent supply chain triggered neural Trojan attacks. Our "SIN2" well leverages the attacking opportunities built upon the static neural network model and the underlying dynamic runtime system of neural computing framework through a bunch of neural Trojaning techniques. We implement a variety of neural Trojan attacks in Linux sandbox by following proposed "SIN2". Experimental results show that our modular design can rapidly produce and trigger various Trojan attacks that can easily evade the existing defenses. |
URL | https://ieeexplore.ieee.org/document/8383920/ |
DOI | 10.1109/HST.2018.8383920 |
Citation Key | liu_sin2:_2018 |
- neural computing framework
- Trojan horses
- third-party cloud based machine learning as a service
- static neural network model
- software algorithm level
- SIN2
- security
- Scalability
- Runtime
- Resiliency
- resilience
- pubcrawl
- portable DNN computing engine
- Payloads
- Neural networks
- neural nets
- AI Poisoning
- low-cost modular methodology-stealth infection on neural network
- low-cost agile neural Trojan attack methodology
- learning (artificial intelligence)
- invasive software
- Intelligent systems
- intelligent supply chain
- intelligent service supply chain
- Human behavior
- dynamic runtime system
- DNN security
- Deep Neural Network
- Computational modeling
- Cloud Computing
- artificial intelligence industry