PublicCheck: Public Integrity Verification for Services of Run-time Deep Models

被引:1
|
作者
Wang, Shuo [1 ,2 ]
Abuadbba, Sharif [1 ,2 ]
Agarwal, Sidharth [3 ]
Moore, Kristen [1 ,2 ]
Sun, Ruoxi [1 ]
Xue, Minhui [1 ,2 ]
Nepal, Surya [1 ,2 ]
Camtepe, Seyit [1 ,2 ]
Kanhere, Salil [4 ]
机构
[1] CSIROs Data61, Eveleigh, NSW, Australia
[2] Cybersecur CRC, Joondalup, Australia
[3] Indian Inst Technol Delhi, New Delhi, India
[4] Univ New South Wales, Sydney, NSW, Australia
关键词
D O I
10.1109/SP46215.2023.10179380
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Existing integrity verification approaches for deep models are designed for private verification (i.e., assuming the service provider is honest, with white-box access to model parameters). However, private verification approaches do not allow model users to verify the model at run-time. Instead, they must trust the service provider, who may tamper with the verification results. In contrast, a public verification approach that considers the possibility of dishonest service providers can benefit a wider range of users. In this paper, we propose PublicCheck, a practical public integrity verification solution for services of run-time deep models. PublicCheck considers dishonest service providers, and overcomes public verification challenges of being lightweight, providing anti-counterfeiting protection, and having fingerprinting samples that appear smooth. To capture and fingerprint the inherent prediction behaviors of a run-time model, PublicCheck generates smoothly transformed and augmented encysted samples that are enclosed around the model's decision boundary while ensuring that the verification queries are indistinguishable from normal queries. PublicCheck is also applicable when knowledge of the target model is limited (e.g., with no knowledge of gradients or model parameters). A thorough evaluation of PublicCheck demonstrates the strong capability for model integrity breach detection (100% detection accuracy with less than 10 black-box API queries) against various model integrity attacks and model compression attacks. PublicCheck also demonstrates the smooth appearance, feasibility, and efficiency of generating a plethora of encysted samples for fingerprinting.
引用
收藏
页码:1348 / 1365
页数:18
相关论文
共 50 条
  • [1] Public Integrity Verification for Run-time Model in Batches without a Local Server
    Liu, Xin Yu
    Xu, Chun Xiang
    Shi, Yi Fu
    Lu, Jing Jie
    2024 9TH INTERNATIONAL CONFERENCE ON ELECTRONIC TECHNOLOGY AND INFORMATION SCIENCE, ICETIS 2024, 2024, : 26 - 30
  • [2] Run-time verification
    Colin, S
    Mariani, L
    MODEL-BASED TESTING OF REACTIVE SYSTEMS, 2005, 3472 : 525 - 555
  • [3] Run-time Verification of Behavioural Conformance for Conversational Web Services
    Dranidis, Dimitris
    Ramollari, Ervin
    Kourtesis, Dimitrios
    ECOWS'09: PROCEEDINGS OF THE 7TH IEEE EUROPEAN CONFERENCE ON WEB SERVICES, 2009, : 139 - +
  • [4] Run-Time Verification of Coboxes
    de Boer, Frank S.
    de Gouw, Stijn
    Wong, Peter Y. H.
    SOFTWARE ENGINEERING AND FORMAL METHODS, SEFM 2013, 2013, 8137 : 259 - 273
  • [5] Run-Time Verification of Networked Software
    Artho, Cyrille Valentin
    RUNTIME VERIFICATION, 2010, 6418 : 59 - 73
  • [6] Run-Time Verification of Optimistic Concurrency
    Sezgin, Ali
    Tasiran, Serdar
    Muslu, Kivanc
    Qadeer, Shaz
    RUNTIME VERIFICATION, 2010, 6418 : 384 - +
  • [7] Run-time verification of networked software
    Research Center for Information Security , National Institute of Advanced Industrial Science and Technology , Tokyo, Japan
    Lect. Notes Comput. Sci., (59-73):
  • [8] On the run-time verification of autonomy software
    Tiwari, A
    Sinha, P
    Ramachandran, U
    28TH ANNUAL NASA GODDARD SOFTWARE ENGINEERING WORKSHOP, PROCEEDINGS, 2004, : 58 - 65
  • [9] Run-time Performance Monitoring, Verification, and Healing of End-to-End Services
    Choi, Nakjung
    Jagadeesan, Lalita
    Kim, Young Jin
    Mohanasamy, Nishok Narasimha
    Rahman, Muntasir Raihan
    Sabnani, Krishan
    Thottan, Marina
    PROCEEDINGS OF THE 2019 IEEE CONFERENCE ON NETWORK SOFTWARIZATION (NETSOFT 2019), 2019, : 30 - 35
  • [10] An Integrity Assurance Mechanism for Run-Time Programs
    Xu, Ziyao
    He, Yeping
    Deng, Lingli
    INFORMATION SECURITY AND CRYPTOLOGY, 2009, 5487 : 389 - 405