ShrewdAttack: Low Cost High Accuracy Model Extraction
Author:
Liu Yang12ORCID, Luo Ji13, Yang Yi1, Wang Xuan1, Gheisari Mehdi14ORCID, Luo Feng1
Affiliation:
1. School of Computer Science and Technology, Harbin Institute of Technology (Shenzhen), Shenzhen 518055, China 2. Peng Cheng Laboratory, Shenzhen 518066, China 3. Guangdong Provincial Key Laboratory of Novel Security Intelligence Technologies, Shenzhen 518055, China 4. Saveetha School of Engineering, Saveetha Institute of Medical and Technical Sciences, Chennai 602105, India
Abstract
Machine learning as a service (MLaaS) plays an essential role in the current ecosystem. Enterprises do not need to train models by themselves separately. Instead, they can use well-trained models provided by MLaaS to support business activities. However, such an ecosystem could be threatened by model extraction attacks—an attacker steals the functionality of a trained model provided by MLaaS and builds a substitute model locally. In this paper, we proposed a model extraction method with low query costs and high accuracy. In particular, we use pre-trained models and task-relevant data to decrease the size of query data. We use instance selection to reduce query samples. In addition, we divided query data into two categories, namely low-confidence data and high-confidence data, to reduce the budget and improve accuracy. We then conducted attacks on two models provided by Microsoft Azure as our experiments. The results show that our scheme achieves high accuracy at low cost, with the substitution models achieving 96.10% and 95.24% substitution while querying only 7.32% and 5.30% of their training data on the two models, respectively. This new attack approach creates additional security challenges for models deployed on cloud platforms. It raises the need for novel mitigation strategies to secure the models. In future work, generative adversarial networks and model inversion attacks can be used to generate more diverse data to be applied to the attacks.
Funder
Shenzhen Basic Research Shenzhen Stable Supporting Program Peng Cheng Laboratory Project Guangdong Provincial Key Laboratory of Novel Security Intelligence Technologies
Subject
General Physics and Astronomy
Reference32 articles.
1. Ribeiro, M., Grolinger, K., and Capretz, M.A. (2015, January 9–11). Mlaas: Machine learning as a service. Proceedings of the 2015 IEEE 14th International Conference on Machine Learning and Applications (ICMLA), Miami, FL, USA. 2. Orekondy, T., Schiele, B., and Fritz, M. (2019, January 15–20). Knockoff nets: Stealing functionality of black-box models. Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern Recognition, Long Beach, CA, USA. 3. Pal, S., Gupta, Y., Shukla, A., Kanade, A., Shevade, S., and Ganapathy, V. (2020, January 7–12). Activethief: Model extraction using active learning and unannotated public data. Proceedings of the AAAI Conference on Artificial Intelligence, New York, NY, USA. 4. Black-Box Ripper: Copying black-box models using generative evolutionary algorithms;Barbalau;Adv. Neural Inf. Process. Syst.,2020 5. Hsu, T.Y., Li, C.A., Wu, T.Y., and Lee, H.Y. (2022). Model Extraction Attack against Self-supervised Speech Models. arXiv.
Cited by
1 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
|
|