Towards a Game-Theoretic Understanding of Explanation-Based Membership Inference Attacks

被引:0
|
作者
Kumari, Kavita [1 ]
Jadliwala, Murtuza [2 ]
Jha, Sumit Kumar [3 ]
Maiti, Anindya [4 ]
机构
[1] Tech Univ Darmstadt, Darmstadt, Germany
[2] Univ Texas San Antonio, San Antonio, TX USA
[3] Florida Int Univ, Miami, FL USA
[4] Univ Oklahoma, Norman, OK USA
关键词
D O I
10.1007/978-3-031-74835-6_13
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Model explanations improve the transparency of black-box machine learning (ML) models and their decisions; however, they can also enable privacy threats like membership inference attacks (MIA). Existing works have only analyzed MIA in a single interaction scenario between an adversary and the target ML model, missing the factors that influence an adversary's capability to launch MIA in repeated interactions. These works also assume the attacker knows the model's structure, which isn't always true, leading to suboptimal thresholds for identifying members. This paper examines explanation-based threshold attacks, where an adversary uses the variance in explanations through repeated interactions to perform MIA. We use a continuous-time stochastic signaling game to model these interactions. Unaware of the system's exact type (honest or malicious), the adversary plays a stopping game to gather explanation variance and compute an optimal threshold for membership determination. We propose a sound mathematical formulation to prove that such an optimal threshold exists, which can be used to launch MIA and identify conditions for a unique Markov perfect equilibrium in this dynamic system. Finally, we evaluate various factors affecting an adversary's ability to conduct MIA in repeated settings through simulations.
引用
收藏
页码:263 / 283
页数:21
相关论文
共 50 条
  • [21] Security attacks on smart grid scheduling and their defences: a game-theoretic approach
    M. Pilz
    F. Baghaei Naeini
    K. Grammont
    C. Smagghe
    M. Davis
    J.-C. Nebel
    L. Al-Fagih
    E. Pfluegel
    International Journal of Information Security, 2020, 19 : 427 - 443
  • [22] A game-theoretic analysis of denial of service attacks in wireless random access
    Yalin Evren Sagduyu
    Anthony Ephremides
    Wireless Networks, 2009, 15 : 651 - 666
  • [23] FedGame: A Game-Theoretic Defense against Backdoor Attacks in Federated Learning
    Jia, Jinyuan
    Yuan, Zhuowen
    Sahabandu, Dinuka
    Niu, Luyao
    Rajabi, Arezoo
    Ramasubramanian, Bhaskar
    Li, Bo
    Poovendran, Radha
    ADVANCES IN NEURAL INFORMATION PROCESSING SYSTEMS 36 (NEURIPS 2023), 2023,
  • [24] BLOC: A Game-Theoretic Approach to Orchestrate CPS against Cyber Attacks
    Guirguis, Mina
    Tahsini, Alireza
    Siddique, Khan
    Novoa, Clara
    Moore, Justin
    Julien, Christine
    Dunstatter, Noah
    2018 IEEE CONFERENCE ON COMMUNICATIONS AND NETWORK SECURITY (CNS), 2018,
  • [25] A game-theoretic analysis of denial of service attacks in wireless random access
    Sagduyu, Yalin Evren
    Ephremides, Anthony
    2007 5TH INTERNATIONAL SYMPOSIUM ON MODELING AND OPTIMIZATION IN MOBILE, AD HOC AND WIRELESS NETWORKS AND WORKSHOPS, VOLS 1-2, 2007, : 224 - +
  • [26] Security attacks on smart grid scheduling and their defences: a game-theoretic approach
    Pilz, M.
    Naeini, F. Baghaei
    Grammont, K.
    Smagghe, C.
    Davis, M.
    Nebel, J. -C.
    Al-Fagih, L.
    Pfluegel, E.
    INTERNATIONAL JOURNAL OF INFORMATION SECURITY, 2020, 19 (04) : 427 - 443
  • [27] A game-theoretic analysis of denial of service attacks in wireless random access
    Sagduyu, Yalin Evren
    Ephremides, Anthony
    WIRELESS NETWORKS, 2009, 15 (05) : 651 - 666
  • [28] Vulnerability of Selfish Routing to Attacks: Game-theoretic Models and Initial Results
    Genin, D.
    Marbukh, V.
    Nakassis, A.
    WORLD CONGRESS ON ENGINEERING, WCE 2010, VOL I, 2010, : 487 - 492
  • [29] Game-Theoretic Analysis of DDoS Attacks Against Bitcoin Mining Pools
    Johnson, Benjamin
    Laszka, Aron
    Grossklags, Jens
    Vasek, Marie
    Moore, Tyler
    FINANCIAL CRYPTOGRAPHY AND DATA SECURITY: FC 2014 WORKSHOPS, BITCOIN AND WAHC 2014, 2014, 8438 : 72 - 86
  • [30] Understanding information interactions in diffusion: an evolutionary game-theoretic perspective
    Su, Yuan
    Zhang, Xi
    Liu, Lixin
    Song, Shouyou
    Fang, Binxing
    FRONTIERS OF COMPUTER SCIENCE, 2016, 10 (03) : 518 - 531