PublicCheck: Public Integrity Verification for Services of Run-time Deep Models

被引:1
|
作者
Wang, Shuo [1 ,2 ]
Abuadbba, Sharif [1 ,2 ]
Agarwal, Sidharth [3 ]
Moore, Kristen [1 ,2 ]
Sun, Ruoxi [1 ]
Xue, Minhui [1 ,2 ]
Nepal, Surya [1 ,2 ]
Camtepe, Seyit [1 ,2 ]
Kanhere, Salil [4 ]
机构
[1] CSIROs Data61, Eveleigh, NSW, Australia
[2] Cybersecur CRC, Joondalup, Australia
[3] Indian Inst Technol Delhi, New Delhi, India
[4] Univ New South Wales, Sydney, NSW, Australia
关键词
D O I
10.1109/SP46215.2023.10179380
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Existing integrity verification approaches for deep models are designed for private verification (i.e., assuming the service provider is honest, with white-box access to model parameters). However, private verification approaches do not allow model users to verify the model at run-time. Instead, they must trust the service provider, who may tamper with the verification results. In contrast, a public verification approach that considers the possibility of dishonest service providers can benefit a wider range of users. In this paper, we propose PublicCheck, a practical public integrity verification solution for services of run-time deep models. PublicCheck considers dishonest service providers, and overcomes public verification challenges of being lightweight, providing anti-counterfeiting protection, and having fingerprinting samples that appear smooth. To capture and fingerprint the inherent prediction behaviors of a run-time model, PublicCheck generates smoothly transformed and augmented encysted samples that are enclosed around the model's decision boundary while ensuring that the verification queries are indistinguishable from normal queries. PublicCheck is also applicable when knowledge of the target model is limited (e.g., with no knowledge of gradients or model parameters). A thorough evaluation of PublicCheck demonstrates the strong capability for model integrity breach detection (100% detection accuracy with less than 10 black-box API queries) against various model integrity attacks and model compression attacks. PublicCheck also demonstrates the smooth appearance, feasibility, and efficiency of generating a plethora of encysted samples for fingerprinting.
引用
收藏
页码:1348 / 1365
页数:18
相关论文
共 50 条
  • [41] Run-time infrastructure of distributed simulation based on Web services
    School of Computer Science and Technology, Nanjing University of Science and Technology, Nanjing 210094, China
    Jisuanji Jicheng Zhizao Xitong, 2009, 10 (2063-2072):
  • [42] Strategies for the run-time testing of third party web services
    Brenner, Daniel
    Atkinson, Colin
    Hummel, Oliver
    Stoll, Dietmar
    IEEE INTERNATIONAL CONFERENCE ON SERVICE-ORIENTED COMPUTING AND APPLICATIONS, PROCEEDINGS, 2007, : 114 - +
  • [43] Run-time agents as a means of reconciling flexibility and scalability of services
    Margaria, Tiziana
    Steffen, Bernhard
    INNOVATIVE CONCEPTS FOR AUTONOMIC AND AGENT-BASED SYSTEMS, 2006, 3825 : 257 - +
  • [44] A Run-time Service Discovery Tool for Web Services Compositions
    Rouached, Mohsen
    Godart, Claude
    PROCEEDINGS OF THE ICEBE 2008: IEEE INTERNATIONAL CONFERENCE ON E-BUSINESS ENGINEERING, 2008, : 179 - 187
  • [45] Run-time services for hybrid CPU/FPGA systems on chip
    Agron, Jason
    Peck, Wesley
    Anderson, Erik
    Andrews, David
    Komp, Ed
    Sass, Ron
    Baijot, Fabrice
    Stevens, Jim
    27TH IEEE INTERNATIONAL REAL-TIME SYSTEMS SYMPOSIUM, PROCEEDINGS, 2006, : 3 - +
  • [46] Integrating Software Testing and Run-Time Checking in an Assertion Verification Framework
    Mera, Edison
    Lopez-Garcia, Pedro
    Hermenegildo, Manuel
    LOGIC PROGRAMMING, 2009, 5649 : 281 - +
  • [47] MESSAGE FLOW-ANALYSIS AND RUN-TIME VERIFICATION FOR PARALLEL PROGRAMS
    YANG, SS
    JUANG, JY
    PROCEEDINGS OF THE 1989 INTERNATIONAL CONFERENCE ON PARALLEL PROCESSING, VOL 2: SOFTWARE, 1989, : 19 - 22
  • [48] Automated Code Synthesis for Run-Time Verification of Distributed Embedded Systems
    Majzik, Istvan
    Horanyi, Gergo
    12TH SYMPOSIUM ON PROGRAMMING LANGUAGES AND SOFTWARE TOOLS, SPLST' 11, 2011, : 161 - 172
  • [49] LAOCOON: A Run-time Monitoring and Verification Approach for Hardware Trojan Detection
    Danger, Jean-Luc
    Fribourg, Laurent
    Naceur, Maha
    Kuhne, Ulrich
    2019 22ND EUROMICRO CONFERENCE ON DIGITAL SYSTEM DESIGN (DSD), 2019, : 269 - 276
  • [50] Discourje: Run-Time Verification of Communication Protocols in Clojure - Live at Last
    Jongmans, Sung-Shik
    FORMAL METHODS, PT II, FM 2024, 2025, 14934 : 158 - 166