The feasibility and inevitability of stealth attacks

被引:1
|
作者
Tyukin, Ivan Y. [1 ]
Higham, Desmond J. [2 ]
Bastounis, Alexander [3 ]
Woldegeorgis, Eliyas [3 ]
Gorban, Alexander N. [3 ]
机构
[1] Kings Coll London, Dept Math, London WC2R 2LS, England
[2] Univ Edinburgh, Sch Math, Peter Guthrie Tait Rd, Edinburgh EH9 3FD, Scotland
[3] Univ Leicester, Sch Comp & Math Sci, Univ Rd, Leicester LEI 7RH, England
基金
英国工程与自然科学研究理事会;
关键词
Adversarial attacks; AI instability; concentration of measure; backdoor attacks; AI robustness; ADVERSARIAL ATTACKS;
D O I
10.1093/imamat/hxad027
中图分类号
O29 [应用数学];
学科分类号
070104 ;
摘要
We develop and study new adversarial perturbations that enable an attacker to gain control over decisions in generic Artificial Intelligence (AI) systems including deep learning neural networks. In contrast to adversarial data modification, the attack mechanism we consider here involves alterations to the AI system itself. Such a stealth attack could be conducted by a mischievous, corrupt or disgruntled member of a software development team. It could also be made by those wishing to exploit a 'democratization of AI' agenda, where network architectures and trained parameter sets are shared publicly. We develop a range of new implementable attack strategies with accompanying analysis, showing that with high probability a stealth attack can be made transparent, in the sense that system performance is unchanged on a fixed validation set which is unknown to the attacker, while evoking any desired output on a trigger input of interest. The attacker only needs to have estimates of the size of the validation set and the spread of the AI's relevant latent space. In the case of deep learning neural networks, we show that a one-neuron attack is possible-a modification to the weights and bias associated with a single neuron-revealing a vulnerability arising from over-parameterization. We illustrate these concepts using state-of-the-art architectures on two standard image data sets. Guided by the theory and computational results, we also propose strategies to guard against stealth attacks.
引用
收藏
页码:44 / 84
页数:41
相关论文
共 50 条
  • [31] Feasibility of Morphing-Attacks in Vascular Biometrics
    Aydemir, Altan K.
    Haemmerle-Uhl, Jutta
    Uhl, Andreas
    2021 INTERNATIONAL JOINT CONFERENCE ON BIOMETRICS (IJCB 2021), 2021,
  • [32] On the Feasibility of Detecting Software Supply Chain Attacks
    Wang, Xinyuan
    2021 IEEE MILITARY COMMUNICATIONS CONFERENCE (MILCOM 2021), 2021,
  • [33] Adaptive Stealth Energy-related DoS Attacks Against Cloud Data Centers
    Palmieri, Francesco
    Ficco, Massimo
    Castiglione, Aniello
    2014 EIGHTH INTERNATIONAL CONFERENCE ON INNOVATIVE MOBILE AND INTERNET SERVICES IN UBIQUITOUS COMPUTING (IMIS), 2014, : 265 - 272
  • [34] Stealth Spectrum Sensing Data Falsification Attacks Affecting IoT Spectrum Monitors on the Battlefield
    Sanchez Sanchez, Pedro Miguel
    Martinez Beltran, Enrique Tomas
    Celdran, Alberto Huertas
    Wassink, Robin
    Bovet, Gerome
    Perez, Gregorio Martinez
    Stiller, Burkhard
    MILCOM 2023 - 2023 IEEE MILITARY COMMUNICATIONS CONFERENCE, 2023,
  • [35] Alternate Data Stream Attack Framework to Perform Stealth Attacks on Active Directory Hosts
    Bhardwaj, Akashdeep
    Kaushik, Keshav
    Maashi, Mashael S.
    Aljebreen, Mohammed
    Bharany, Salil
    SUSTAINABILITY, 2022, 14 (19)
  • [36] Implementation and Vulnerability Test of Stealth Port Scanning Attacks using ZMap of Censys Engine
    Lee, Seungwoon
    Im, Sun-young
    Shin, Seung-Hun
    Roh, Byeong-hee
    Lee, Cheolho
    2016 INTERNATIONAL CONFERENCE ON INFORMATION AND COMMUNICATION TECHNOLOGY CONVERGENCE (ICTC 2016): TOWARDS SMARTER HYPER-CONNECTED WORLD, 2016, : 681 - 683
  • [37] The inevitability of antiretrovirals
    Hawthorne, G
    SAMJ SOUTH AFRICAN MEDICAL JOURNAL, 2003, 93 (08): : 572 - 572
  • [38] RESPONSIBILITY AND INEVITABILITY
    FISCHER, JM
    RAVIZZA, M
    ETHICS, 1991, 101 (02) : 258 - 278
  • [39] Determinism and Inevitability
    H. C. Steward
    Philosophical Studies, 2006, 130 : 535 - 563
  • [40] The gospel of inevitability
    Eörs Szathmáry
    Nature, 2002, 419 (6909) : 779 - 780