The feasibility and inevitability of stealth attacks

被引:1
|
作者
Tyukin, Ivan Y. [1 ]
Higham, Desmond J. [2 ]
Bastounis, Alexander [3 ]
Woldegeorgis, Eliyas [3 ]
Gorban, Alexander N. [3 ]
机构
[1] Kings Coll London, Dept Math, London WC2R 2LS, England
[2] Univ Edinburgh, Sch Math, Peter Guthrie Tait Rd, Edinburgh EH9 3FD, Scotland
[3] Univ Leicester, Sch Comp & Math Sci, Univ Rd, Leicester LEI 7RH, England
基金
英国工程与自然科学研究理事会;
关键词
Adversarial attacks; AI instability; concentration of measure; backdoor attacks; AI robustness; ADVERSARIAL ATTACKS;
D O I
10.1093/imamat/hxad027
中图分类号
O29 [应用数学];
学科分类号
070104 ;
摘要
We develop and study new adversarial perturbations that enable an attacker to gain control over decisions in generic Artificial Intelligence (AI) systems including deep learning neural networks. In contrast to adversarial data modification, the attack mechanism we consider here involves alterations to the AI system itself. Such a stealth attack could be conducted by a mischievous, corrupt or disgruntled member of a software development team. It could also be made by those wishing to exploit a 'democratization of AI' agenda, where network architectures and trained parameter sets are shared publicly. We develop a range of new implementable attack strategies with accompanying analysis, showing that with high probability a stealth attack can be made transparent, in the sense that system performance is unchanged on a fixed validation set which is unknown to the attacker, while evoking any desired output on a trigger input of interest. The attacker only needs to have estimates of the size of the validation set and the spread of the AI's relevant latent space. In the case of deep learning neural networks, we show that a one-neuron attack is possible-a modification to the weights and bias associated with a single neuron-revealing a vulnerability arising from over-parameterization. We illustrate these concepts using state-of-the-art architectures on two standard image data sets. Guided by the theory and computational results, we also propose strategies to guard against stealth attacks.
引用
收藏
页码:44 / 84
页数:41
相关论文
共 50 条
  • [1] STEALTH VIRUS ATTACKS
    DEHAVEN, J
    BYTE, 1993, 18 (06): : 137 - &
  • [2] Stealth Attacks on the Smart Grid
    Sun, Ke
    Esnaola, Inaki
    Perlaza, Samir M.
    Poor, H. Vincent
    IEEE TRANSACTIONS ON SMART GRID, 2020, 11 (02) : 1276 - 1285
  • [3] LEARNING REQUIREMENTS FOR STEALTH ATTACKS
    Sun, Ke
    Esnaola, Inaki
    Tulino, Antonia M.
    Poor, H. Vincent
    2019 IEEE INTERNATIONAL CONFERENCE ON ACOUSTICS, SPEECH AND SIGNAL PROCESSING (ICASSP), 2019, : 8102 - 8106
  • [4] Stealth attacks in vehicular technologies
    Jakobsson, M
    Wang, XF
    Wetzel, S
    VTC2004-FALL: 2004 IEEE 60TH VEHICULAR TECHNOLOGY CONFERENCE, VOLS 1-7: WIRELESS TECHNOLOGIES FOR GLOBAL SECURITY, 2004, : 1218 - 1222
  • [5] Taxation in Virtual World: Inevitability and Feasibility
    Peng, Hui
    Xu, Xiaobing
    2009 INTERNATIONAL CONFERENCE ON E-BUSINESS AND INFORMATION SYSTEM SECURITY, VOLS 1 AND 2, 2009, : 480 - 485
  • [6] Cloud: A Platform To Launch Stealth Attacks
    Chatterjee, Moitrayee
    Datta, Prerit
    Abri, Faranak
    Namin, Akbar Siami
    Jones, Keith S.
    2020 IEEE 44TH ANNUAL COMPUTERS, SOFTWARE, AND APPLICATIONS CONFERENCE (COMPSAC 2020), 2020, : 1558 - 1563
  • [7] Stealth Data Injection Attacks With Sparsity Constraints
    Ye, Xiuzhen
    Esnaola, Inaki
    Perlaza, Samir M.
    Harrison, Robert F.
    IEEE TRANSACTIONS ON SMART GRID, 2023, 14 (04) : 3201 - 3209
  • [8] Stealth attacks on PCBs: an experimental plausibility analysis
    Kabin, Ievgen
    Schaeffner, Jan
    Sigourou, Alkistis
    Petryk, Dmytro
    Dyka, Zoya
    Klein, Dominik
    Freud, Sven
    Langendoerfer, Peter
    2024 IEEE INTERNATIONAL CONFERENCE ON CYBER SECURITY AND RESILIENCE, CSR, 2024, : 905 - 912
  • [9] Stealth and Semi-Stealth MITM Attacks, Detection and Defense in IPv4 Networks
    Samineni, Naga Rohit
    Barbhuiya, Ferdous A.
    Nandi, Sukumar
    2012 2ND IEEE INTERNATIONAL CONFERENCE ON PARALLEL, DISTRIBUTED AND GRID COMPUTING (PDGC), 2012, : 364 - 367
  • [10] Stealth attacks on ad-hoc wireless networks
    Jakobsson, M
    Wetzel, S
    Yener, B
    2003 IEEE 58TH VEHICULAR TECHNOLOGY CONFERENCE, VOLS1-5, PROCEEDINGS, 2003, : 2103 - 2111