PublicCheck: Public Integrity Verification for Services of Run-time Deep Models

被引:1
|
作者
Wang, Shuo [1 ,2 ]
Abuadbba, Sharif [1 ,2 ]
Agarwal, Sidharth [3 ]
Moore, Kristen [1 ,2 ]
Sun, Ruoxi [1 ]
Xue, Minhui [1 ,2 ]
Nepal, Surya [1 ,2 ]
Camtepe, Seyit [1 ,2 ]
Kanhere, Salil [4 ]
机构
[1] CSIROs Data61, Eveleigh, NSW, Australia
[2] Cybersecur CRC, Joondalup, Australia
[3] Indian Inst Technol Delhi, New Delhi, India
[4] Univ New South Wales, Sydney, NSW, Australia
关键词
D O I
10.1109/SP46215.2023.10179380
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Existing integrity verification approaches for deep models are designed for private verification (i.e., assuming the service provider is honest, with white-box access to model parameters). However, private verification approaches do not allow model users to verify the model at run-time. Instead, they must trust the service provider, who may tamper with the verification results. In contrast, a public verification approach that considers the possibility of dishonest service providers can benefit a wider range of users. In this paper, we propose PublicCheck, a practical public integrity verification solution for services of run-time deep models. PublicCheck considers dishonest service providers, and overcomes public verification challenges of being lightweight, providing anti-counterfeiting protection, and having fingerprinting samples that appear smooth. To capture and fingerprint the inherent prediction behaviors of a run-time model, PublicCheck generates smoothly transformed and augmented encysted samples that are enclosed around the model's decision boundary while ensuring that the verification queries are indistinguishable from normal queries. PublicCheck is also applicable when knowledge of the target model is limited (e.g., with no knowledge of gradients or model parameters). A thorough evaluation of PublicCheck demonstrates the strong capability for model integrity breach detection (100% detection accuracy with less than 10 black-box API queries) against various model integrity attacks and model compression attacks. PublicCheck also demonstrates the smooth appearance, feasibility, and efficiency of generating a plethora of encysted samples for fingerprinting.
引用
收藏
页码:1348 / 1365
页数:18
相关论文
共 50 条
  • [31] PSL model checking and run-time verification via testers
    Pnueli, A.
    Zaks, A.
    FM 2006: FORMAL METHODS, PROCEEDINGS, 2006, 4085 : 573 - 586
  • [32] AMOEBA-RT: Run-time verification of adaptive software
    Goldsby, Heather J.
    Cheng, Betty H. C.
    Zhang, Ji
    MODELS IN SOFTWARE ENGINEERING, 2008, 5002 : 212 - 224
  • [33] Simulation of Simultaneous Events in Regular Expressions for Run-Time Verification
    Sammapun, Usa
    Easwaran, Arvind
    Lee, Insup
    Sokolsky, Oleg
    ELECTRONIC NOTES IN THEORETICAL COMPUTER SCIENCE, 2005, 113 : 123 - 143
  • [34] Adaptive Run-time Models for Groups of Autonomous Robots
    Niemczyk, Stefan
    Geihs, Kurt
    2015 IEEE/ACM 10TH INTERNATIONAL SYMPOSIUM ON SOFTWARE ENGINEERING FOR ADAPTIVE AND SELF-MANAGING SYSTEMS, 2015, : 127 - 133
  • [35] Hardware-Based Run-Time Code Integrity in Embedded Devices
    Wehbe, Taimour
    Mooney, Vincent
    Keezer, David
    CRYPTOGRAPHY, 2018, 2 (03) : 1 - 18
  • [36] RUN-TIME STATISTICS IN MODELS OF GROWTH IN DISORDERED MEDIA
    MARSILI, M
    JOURNAL OF STATISTICAL PHYSICS, 1994, 77 (3-4) : 733 - 754
  • [37] Run-time integrity monitoring of untrustworthy analog front-ends
    Salem, Heba
    Topham, Nigel
    2023 DESIGN, AUTOMATION & TEST IN EUROPE CONFERENCE & EXHIBITION, DATE, 2023,
  • [38] ModelScope - Inspecting Executable Models during Run-time
    Graf, Philipp
    Mueller-Glaser, Klaus D.
    ICSE'08 PROCEEDINGS OF THE THIRTIETH INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING, 2008, : 935 - 936
  • [39] RRA: Models and Tools for Robotics Run-time Adaptation
    Gherardi, Luca
    Hochgeschwender, Nico
    2015 IEEE/RSJ INTERNATIONAL CONFERENCE ON INTELLIGENT ROBOTS AND SYSTEMS (IROS), 2015, : 1777 - 1784
  • [40] Evaluation of run-time quality attributes for web services architecture
    Davison, Geoff
    Petkov, Emil
    WMSCI 2006: 10TH WORLD MULTI-CONFERENCE ON SYSTEMICS, CYBERNETICS AND INFORMATICS, VOL III, PROCEEDINGS, 2006, : 116 - 121