The feasibility and inevitability of stealth attacks

被引:1
|
作者
Tyukin, Ivan Y. [1 ]
Higham, Desmond J. [2 ]
Bastounis, Alexander [3 ]
Woldegeorgis, Eliyas [3 ]
Gorban, Alexander N. [3 ]
机构
[1] Kings Coll London, Dept Math, London WC2R 2LS, England
[2] Univ Edinburgh, Sch Math, Peter Guthrie Tait Rd, Edinburgh EH9 3FD, Scotland
[3] Univ Leicester, Sch Comp & Math Sci, Univ Rd, Leicester LEI 7RH, England
基金
英国工程与自然科学研究理事会;
关键词
Adversarial attacks; AI instability; concentration of measure; backdoor attacks; AI robustness; ADVERSARIAL ATTACKS;
D O I
10.1093/imamat/hxad027
中图分类号
O29 [应用数学];
学科分类号
070104 ;
摘要
We develop and study new adversarial perturbations that enable an attacker to gain control over decisions in generic Artificial Intelligence (AI) systems including deep learning neural networks. In contrast to adversarial data modification, the attack mechanism we consider here involves alterations to the AI system itself. Such a stealth attack could be conducted by a mischievous, corrupt or disgruntled member of a software development team. It could also be made by those wishing to exploit a 'democratization of AI' agenda, where network architectures and trained parameter sets are shared publicly. We develop a range of new implementable attack strategies with accompanying analysis, showing that with high probability a stealth attack can be made transparent, in the sense that system performance is unchanged on a fixed validation set which is unknown to the attacker, while evoking any desired output on a trigger input of interest. The attacker only needs to have estimates of the size of the validation set and the spread of the AI's relevant latent space. In the case of deep learning neural networks, we show that a one-neuron attack is possible-a modification to the weights and bias associated with a single neuron-revealing a vulnerability arising from over-parameterization. We illustrate these concepts using state-of-the-art architectures on two standard image data sets. Guided by the theory and computational results, we also propose strategies to guard against stealth attacks.
引用
收藏
页码:44 / 84
页数:41
相关论文
共 50 条
  • [21] Protocol-Agnostic Detection of Stealth Attacks on Networked Control Systems
    Heseding, Hauke
    Dieing, Moritz
    Meshram, Ankush
    Zitterbart, Martina
    2023 IEEE 21ST INTERNATIONAL CONFERENCE ON INDUSTRIAL INFORMATICS, INDIN, 2023,
  • [22] Execution at RISC: Stealth JOP Attacks on RISC-V Applications
    Buckwell, Loic
    Gilles, Olivier
    Perez, Daniel Gracia
    Kosmatov, Nikolai
    COMPUTER SECURITY. ESORICS 2023 INTERNATIONAL WORKSHOPS, CPS4CIP, PT II, 2024, 14399 : 377 - 391
  • [23] Feasibility of multi-protocol attacks
    Cremers, Cas
    FIRST INTERNATIONAL CONFERENCE ON AVAILABILITY, RELIABILITY AND SECURITY, PROCEEDINGS, 2006, : 287 - 294
  • [24] On the Feasibility of Malware Attacks in Smartphone Platforms
    Mylonas, Alexios
    Dritsas, Stelios
    Tsoumas, Bill
    Gritzalis, Dimitris
    E-BUSINESS AND TELECOMMUNICATIONS, 2012, 314 : 217 - 232
  • [25] No inevitability
    Howe, MJA
    PSYCHOLOGIST, 2000, 13 (11) : 547 - 547
  • [26] Data-Driven Detection of Stealth Cyber-Attacks in DC Microgrids
    Takiddin, Abdulrahman
    Rath, Suman
    Ismail, Muhammad
    Sahoo, Subham
    IEEE SYSTEMS JOURNAL, 2022, 16 (04): : 6097 - 6106
  • [27] Enhancing the Transferability and Stealth of Deepfake Detection Attacks Through Latent Diffusion Models
    Zhang, Yu
    Xu, Shoukun
    Zhang, Huajun
    PATTERN RECOGNITION AND COMPUTER VISION, PRCV 2024, PT IV, 2025, 15034 : 268 - 281
  • [28] Vulnerability of Cyber-Physical Systems to Stealth Attacks: Application to a Chemical Process
    Samavedham, Suparna
    Lakshminarayanan, S.
    2021 60TH ANNUAL CONFERENCE OF THE SOCIETY OF INSTRUMENT AND CONTROL ENGINEERS OF JAPAN (SICE), 2021, : 311 - 316
  • [29] Vulnerabilities in GSM technology and feasibility of selected attacks
    Voznak, M.
    Prokes, M.
    Sevcik, L.
    Frnda, J.
    Toral-Cruz, Homer
    Jakovlev, Sergej
    Fazio, Peppino
    Mehic, M.
    Mikulec, M.
    SENSORS, AND COMMAND, CONTROL, COMMUNICATIONS, AND INTELLIGENCE (C3I) TECHNOLOGIES FOR HOMELAND SECURITY, DEFENSE, AND LAW ENFORCEMENT XIV, 2015, 9456
  • [30] High-Stealth False Data Attacks on Overloading Multiple Lines in Power Systems
    Du, Min
    Wang, Lianhong
    Zhou, Yicong
    IEEE TRANSACTIONS ON SMART GRID, 2023, 14 (02) : 1321 - 1324