PublicCheck: Public Integrity Verification for Services of Run-time Deep Models

被引:1
|
作者
Wang, Shuo [1 ,2 ]
Abuadbba, Sharif [1 ,2 ]
Agarwal, Sidharth [3 ]
Moore, Kristen [1 ,2 ]
Sun, Ruoxi [1 ]
Xue, Minhui [1 ,2 ]
Nepal, Surya [1 ,2 ]
Camtepe, Seyit [1 ,2 ]
Kanhere, Salil [4 ]
机构
[1] CSIROs Data61, Eveleigh, NSW, Australia
[2] Cybersecur CRC, Joondalup, Australia
[3] Indian Inst Technol Delhi, New Delhi, India
[4] Univ New South Wales, Sydney, NSW, Australia
关键词
D O I
10.1109/SP46215.2023.10179380
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Existing integrity verification approaches for deep models are designed for private verification (i.e., assuming the service provider is honest, with white-box access to model parameters). However, private verification approaches do not allow model users to verify the model at run-time. Instead, they must trust the service provider, who may tamper with the verification results. In contrast, a public verification approach that considers the possibility of dishonest service providers can benefit a wider range of users. In this paper, we propose PublicCheck, a practical public integrity verification solution for services of run-time deep models. PublicCheck considers dishonest service providers, and overcomes public verification challenges of being lightweight, providing anti-counterfeiting protection, and having fingerprinting samples that appear smooth. To capture and fingerprint the inherent prediction behaviors of a run-time model, PublicCheck generates smoothly transformed and augmented encysted samples that are enclosed around the model's decision boundary while ensuring that the verification queries are indistinguishable from normal queries. PublicCheck is also applicable when knowledge of the target model is limited (e.g., with no knowledge of gradients or model parameters). A thorough evaluation of PublicCheck demonstrates the strong capability for model integrity breach detection (100% detection accuracy with less than 10 black-box API queries) against various model integrity attacks and model compression attacks. PublicCheck also demonstrates the smooth appearance, feasibility, and efficiency of generating a plethora of encysted samples for fingerprinting.
引用
收藏
页码:1348 / 1365
页数:18
相关论文
共 50 条
  • [21] On guard: Producing run-time checks from integrity constraints
    Benedikt, M
    Bruns, G
    ALGEBRAIC METHODOLOGY AND SOFTWARE TECHNOLOGY: PROCEEDINGS, 2004, 3116 : 27 - 41
  • [22] A system for predicting the run-time behavior of Web services
    Ambrosi, E
    Bianchi, M
    Gaibisso, C
    Gambosi, G
    Lombardi, F
    2005 International Conference on Services Systems and Services Management, Vols 1 and 2, Proceedings, 2005, : 554 - 559
  • [23] An authoring and run-time environment for interactive multimedia services
    Antoniazzi, S
    Ievola, C
    Marcozzi, E
    Penzo, R
    Sturlesi, M
    MULTIMEDIA APPLICATIONS, SERVICES AND TECHNIQUES - ECMAST '97, 1997, 1242 : 245 - 260
  • [24] Computational logic for run-time verification of Web services choreographies:: Exploiting the SOCS-SI tool
    Alberti, Marco
    Chesani, Federico
    Gavanelli, Marco
    Lamma, Evelina
    Mello, Paola
    Montali, Marco
    Storari, Sergio
    Torroni, Paolo
    WEB SERVICES AND FORMAL METHODS, PROCEEDINGS, 2006, 4184 : 58 - 72
  • [25] Formal Verification of A Domain Specific Language for Run-time Adaptation
    Khan, Shahid
    Khalid, Faiq
    Hasan, Osman
    Cardoso, Joao M. P.
    12TH ANNUAL IEEE INTERNATIONAL SYSTEMS CONFERENCE (SYSCON2018), 2018, : 7 - 14
  • [26] A formal toolchain for offline and run-time verification of robotic systems
    Dal Zilio, Silvano
    Hladik, Pierre-Emmanuel
    Ingrand, Felix
    Mallet, Anthony
    ROBOTICS AND AUTONOMOUS SYSTEMS, 2023, 159
  • [27] The Discourje project: run-time verification of communication protocols in Clojure
    Hamers, Ruben
    Horlings, Erik
    Jongmans, Sung-Shik
    INTERNATIONAL JOURNAL ON SOFTWARE TOOLS FOR TECHNOLOGY TRANSFER, 2022, 24 (05) : 757 - 782
  • [28] Run-time Verification of MSMAS Norms Using Event Calculus
    Elakehal, Emad Eldeen
    Montali, Marco
    Padget, Julian
    2014 IEEE EIGHTH INTERNATIONAL CONFERENCE ON SELF-ADAPTIVE AND SELF-ORGANIZING SYSTEMS WORKSHOPS (SASOW), 2014, : 110 - 115
  • [29] The Discourje project: run-time verification of communication protocols in Clojure
    Ruben Hamers
    Erik Horlings
    Sung-Shik Jongmans
    International Journal on Software Tools for Technology Transfer, 2022, 24 : 757 - 782
  • [30] Checking properties of PLL designs using run-time verification
    Dong, Zhi Jie
    Zaki, Mohamed H.
    Al Sammane, Ghiath
    Tahar, Sofiene
    Bois, Guy
    2007 INTERNATIONAL CONFERENCE ON MICROELECTRONICS, 2007, : 329 - +