A Methodology for Formalizing Model-Inversion Attacks

被引:75
|
作者
Wu, Xi [1 ]
Fredrikson, Matthew [2 ]
Jha, Somesh [1 ]
Naughton, Jeffrey F. [1 ]
机构
[1] Univ Wisconsin Madison, Madison, WI 53706 USA
[2] Carnegie Mellon Univ, Pittsburgh, PA 15213 USA
关键词
BOUNDS;
D O I
10.1109/CSF.2016.32
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
confidentiality of training data induced by releasing machine-learning models, and has recently received increasing attention. Motivated by existing MI attacks and other previous attacks that turn out to be MI "in disguise,"this paper initiates a formal study of MI attacks by presenting a game-based methodology. Our methodology uncovers a number of subtle issues, and devising a rigorous game-based definition, analogous to those in cryptography, is an interesting avenue for future work. We describe methodologies for two types of attacks. The first is for black-box attacks, which consider an adversary who infers sensitive values with only oracle access to a model. The second methodology targets the white-box scenario where an adversary has some additional knowledge about the structure of a model. For the restricted class of Boolean models and black-box attacks, we characterize model invertibility using the concept of influence from Boolean analysis in the noiseless case, and connect model invertibility with stable influence in the noisy case. Interestingly, we also discovered an intriguing phenomenon, which we call "invertibility interference," where a highly invertible model quickly becomes highly non-invertible by adding little noise. For the white-box case, we consider a common phenomenon in machine-learning models where the model is a sequential composition of several sub-models. We show, quantitatively, that even very restricted communication between layers could leak a significant amount of information. Perhaps more importantly, our study also unveils unexpected computational power of these restricted communication channels, which, to the best of our knowledge, were not previously known.
引用
收藏
页码:355 / 370
页数:16
相关论文
共 50 条
  • [41] Formalizing Model Inference of MicroPython']Python
    de Ferro, Carlos Mao
    Cogumbreiro, Tiago
    Martins, Francisco
    2023 53RD ANNUAL IEEE/IFIP INTERNATIONAL CONFERENCE ON DEPENDABLE SYSTEMS AND NETWORKS WORKSHOPS, DSN-W, 2023, : 283 - 289
  • [42] Formalizing the Learner Model for CSCL environments
    Ortiz, M
    Ayala, G
    Osorio, M
    PROCEEDINGS OF THE FOURTH MEXICAN INTERNATIONAL CONFERENCE ON COMPUTER SCIENCE (ENC 2003), 2003, : 151 - 158
  • [43] FORMALIZING THE SHIMOMURA GROWTH-MODEL
    BRONFENBRENNER, M
    ECONOMIC DEVELOPMENT AND CULTURAL CHANGE, 1965, 14 (01) : 85 - 90
  • [44] MLPrivacyGuard: Defeating Confidence Information based Model Inversion Attacks on Machine Learning Systems
    Alves, Tiago A. O.
    Franca, Felipe M. G.
    Kundu, Sandip
    GLSVLSI '19 - PROCEEDINGS OF THE 2019 ON GREAT LAKES SYMPOSIUM ON VLSI, 2019, : 411 - 415
  • [45] The Role of Class Information in Model Inversion Attacks Against Image Deep Learning Classifiers
    Tian, Zhiyi
    Cui, Lei
    Zhang, Chenhan
    Tan, Shuaishuai
    Yu, Shui
    Tian, Yonghong
    IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2024, 21 (04) : 2407 - 2420
  • [46] Model Inversion Attacks for Prediction Systems: Without Knowledge of Non-Sensitive Attributes
    Hidano, Seira
    Murakami, Takao
    Katsumata, Shuichi
    Kiyomoto, Shinsaku
    Hanaoka, Goichiro
    2017 15TH ANNUAL CONFERENCE ON PRIVACY, SECURITY AND TRUST (PST), 2017, : 115 - 124
  • [47] UnSplit: Data-Oblivious Model Inversion, Model Stealing, and Label Inference Attacks Against Split Learning
    Erdogan, Ege
    Kupcu, Alptekin
    Cicek, A. Ercument
    PROCEEDINGS OF THE 21ST WORKSHOP ON PRIVACY IN THE ELECTRONIC SOCIETY, WPES 2022, 2022, : 115 - 124
  • [48] Formalizing the use case model: A model-based approach
    Zaman, Qamar uz
    Nadeem, Aamer
    Sindhu, Muddassar Azam
    PLOS ONE, 2020, 15 (04):
  • [49] Inversion and compression attacks to iterative chaotic ciphers
    Zhang, Bin
    Jin, Chen-Hui
    Tien Tzu Hsueh Pao/Acta Electronica Sinica, 2010, 38 (01): : 129 - 134
  • [50] A MODEL FORMALIZING THE THEORY OF PROPERTY-RIGHTS
    YANG, XK
    WILLS, I
    JOURNAL OF COMPARATIVE ECONOMICS, 1990, 14 (02) : 177 - 198