Attacks on Recent DNN IP Protection Techniques and Their Mitigation

被引:2
|
作者
Mukherjee, Rijoy [1 ]
Chakraborty, Rajat Subhra [1 ]
机构
[1] Indian Inst Technol Kharagpur, Dept Comp Sci & Engn, Kharagpur 721302, India
关键词
Encryption; Cryptography; IP networks; Hardware; Watermarking; Training; Kernel; Advanced encryption standard (AES); chaotic encryption; deep neural network (DNN); intellectual property (IP) protection; security;
D O I
10.1109/TCAD.2023.3272271
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
With the rapid increase in the development of deep learning methodologies, deep neural networks (DNNs) are now being commonly deployed in smart systems (e.g., autonomous vehicles) and high-end security applications (e.g., face recognition, biometric authentication, etc.). The training of such DNN models often requires exclusive valuable training datasets, enormous computational resources, and expert fine-tuning skills. Hence, a trained DNN model can be regarded as valuable proprietary intellectual property (IP). Piracy of such DNN IPs has emerged as a major concern, with increasing trends of illegal copying and redistribution. A number of mitigation approaches targeting DNN IP protection have been proposed in recent years. In this work, we target two recently proposed DNN IP protection schemes: 1) chaotic map theory-based encryption of the weight parameters and 2) traditional block cipher-based encryption of the weights. We demonstrate attacks on two recent DNN IP protection techniques, with one technique each belonging to the above-mentioned schemes, under a pragmatic attack model. We also propose a novel DNN IP protection technique based on selective encryption of the weight parameters, termed limited encryption of weights for IP protection (LEWIP) to mitigate the exposed weaknesses, while having low implementation and performance overheads. Finally, we demonstrate the effectiveness of the LEWIP technique against state-of-the-art DNN implementations.
引用
收藏
页码:3642 / 3650
页数:9
相关论文
共 50 条
  • [1] Cloud Virtualization Attacks and Mitigation Techniques
    Ali, Syed Ahmed
    Memon, Shahzad
    Memon, Nisar
    ADVANCES IN CYBERSECURITY, CYBERCRIMES, AND SMART EMERGING TECHNOLOGIES, 2023, 4 : 147 - 159
  • [2] Side Channel Attacks and Their Mitigation Techniques
    Khan, Ajoy Kumar
    Mahanta, Hridoy Jyoti
    2014 FIRST INTERNATIONAL CONFERENCE ON AUTOMATION, CONTROL, ENERGY & SYSTEMS (ACES-14), 2014, : 133 - 136
  • [3] Active DNN IP Protection: A Novel User Fingerprint Management and DNN Authorization Control Technique
    Xue, Mingfu
    Wu, Zhiyu
    He, Can
    Wang, Jian
    Liu, Weiqiang
    2020 IEEE 19TH INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS (TRUSTCOM 2020), 2020, : 976 - 983
  • [4] A Survey of Recent Attacks and Mitigation on FPGA Systems
    Duan, Shijin
    Wang, Wenhao
    Luo, Yukui
    Xu, Xiaolin
    2021 IEEE COMPUTER SOCIETY ANNUAL SYMPOSIUM ON VLSI (ISVLSI 2021), 2021, : 284 - 289
  • [5] A survey of techniques for VLSI IP protection
    Liang, Wei
    Zhang, Dafang
    You, Zhiqiang
    Li, Wenwei
    Hosam, Osama
    Information Technology Journal, 2013, 12 (12) : 2324 - 2332
  • [6] Cybersecurity in Healthcare: A Review of Recent Attacks and Mitigation Strategies
    Al-Qarni, Elham Abdullah
    INTERNATIONAL JOURNAL OF ADVANCED COMPUTER SCIENCE AND APPLICATIONS, 2023, 14 (05) : 135 - 140
  • [7] Recent Cyber Security Attacks and Their Mitigation Approaches - An Overview
    Chowdhury, Abdullahi
    APPLICATIONS AND TECHNIQUES IN INFORMATION SECURITY, 2016, 651 : 54 - 65
  • [8] Cloud Computing Security Threats and Attacks with their Mitigation Techniques
    Amara, Naseer
    Huang Zhiqui
    Ali, Awais
    2017 INTERNATIONAL CONFERENCE ON CYBER-ENABLED DISTRIBUTED COMPUTING AND KNOWLEDGE DISCOVERY (CYBERC), 2017, : 244 - 251
  • [9] Review of Mitigation Techniques to Overcome Security Attacks on SDN
    Prasad, Gaurav
    Sharma, Devi Prasad
    PROCEEDINGS OF THE 2021 FIFTH INTERNATIONAL CONFERENCE ON I-SMAC (IOT IN SOCIAL, MOBILE, ANALYTICS AND CLOUD) (I-SMAC 2021), 2021, : 1505 - 1509
  • [10] Jamming against GNSS receivers: attacks and mitigation techniques
    Lisi, Marco
    GEOMEDIA, 2023, 27 (03) : 36 - 41