DnD: A Cross-Architecture Deep Neural Network Decompiler

被引:0
|
作者
Wu, Ruoyu [1 ]
Kim, Taegyu [2 ]
Tian, Dave [1 ]
Bianchi, Antonio [1 ]
Xu, Dongyan [1 ]
机构
[1] Purdue Univ, W Lafayette, IN 47907 USA
[2] Penn State Univ, University Pk, PA 16802 USA
关键词
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The usage of Deep Neural Networks (DNNs) has steadily increased in recent years. Especially when used in edge devices, dedicated DNN compilers are used to compile DNNs into binaries. Many security applications (such as DNN model extraction, white-box adversarial sample generation, and DNN model patching and hardening) are possible when a DNN model is accessible. However, these techniques cannot be applied to compiled DNNs. Unfortunately, no dedicated decompiler exists that is able to recover a high-level representation of a DNN starting from its compiled binary code. To address this issue, we propose DND, the first compiler- and ISA-agnostic DNN decompiler. DND uses symbolic execution, in conjunction with a dedicated loop analysis, to lift the analyzed binary code into a novel intermediate representation, able to express the high-level mathematical DNN operations in a compiler- and ISA-agnostic way. Then, DND matches the extracted mathematical DNN operations with template mathematical DNN operations, and it recovers hyper-parameters and parameters of all the identified DNN operators, as well as the overall DNN topology. Our evaluation shows that DND can perfectly recover different DNN models, extracting them from binaries compiled by two different compilers (Glow and TVM) for three different ISAs (Thumb, AArch64, and x86-64). Moreover, DND enables extracting the DNN models used by real-world micro-controllers and attacking them using white-box adversarial machine learning techniques.
引用
收藏
页码:2135 / 2152
页数:18
相关论文
共 50 条
  • [1] Cross-Architecture Internet-of-Things Malware Detection Based on Graph Neural Network
    Li, Chuangfeng
    Shen, Guangming
    Sun, Wei
    [J]. 2021 INTERNATIONAL JOINT CONFERENCE ON NEURAL NETWORKS (IJCNN), 2021,
  • [2] MTHAEL: Cross-Architecture IoT Malware Detection Based on Neural Network Advanced Ensemble Learning
    Vasan, Danish
    Alazab, Mamoun
    Venkatraman, Sitalakshmi
    Akram, Junaid
    Qin, Zheng
    [J]. IEEE TRANSACTIONS ON COMPUTERS, 2020, 69 (11) : 1654 - 1667
  • [3] Cross-Architecture Knowledge Distillation
    Liu, Yufan
    Cao, Jiajiong
    Li, Bing
    Hu, Weiming
    Ding, Jingting
    Li, Liang
    Maybank, Stephen
    [J]. INTERNATIONAL JOURNAL OF COMPUTER VISION, 2024, 132 (08) : 2798 - 2824
  • [4] Cross-Architecture Knowledge Distillation
    Liu, Yufan
    Cao, Jiajiong
    Li, Bing
    Hu, Weiming
    Ding, Jingting
    Li, Liang
    [J]. COMPUTER VISION - ACCV 2022, PT V, 2023, 13845 : 179 - 195
  • [5] Cross-Architecture Lifter Synthesis
    van Tonder, Rijnard
    Le Goues, Claire
    [J]. SOFTWARE ENGINEERING AND FORMAL METHODS, SEFM 2018, 2018, 10886 : 155 - 170
  • [6] Cross-Architecture Distillation for Face Recognition
    Zhao, Weisong
    Zhu, Xiangyu
    He, Zhixiang
    Zhang, Xiao-Yu
    Lei, Zhen
    [J]. PROCEEDINGS OF THE 31ST ACM INTERNATIONAL CONFERENCE ON MULTIMEDIA, MM 2023, 2023, : 8076 - 8085
  • [7] FIT: Inspect vulnerabilities in cross-architecture firmware by deep learning and bipartite matching
    Liang, Hongliang
    Xie, Zhuosi
    Chen, Yixiu
    Ning, Hua
    Wang, Jianli
    [J]. COMPUTERS & SECURITY, 2020, 99
  • [8] Adaptive Cross-architecture Mutual Knowledge Distillation
    Ni, Jianyuan
    Tang, Hao
    Shang, Yuzhang
    Duan, Bin
    Yan, Yan
    [J]. 2024 IEEE 18TH INTERNATIONAL CONFERENCE ON AUTOMATIC FACE AND GESTURE RECOGNITION, FG 2024, 2024,
  • [9] ENIMANAL: Augmented cross-architecture IoT malware analysis using graph neural networks
    Deng, Liting
    Wen, Hui
    Xin, Mingfeng
    Li, Hong
    Pan, Zhiwen
    Sun, Limin
    [J]. COMPUTERS & SECURITY, 2023, 132
  • [10] Cross-Architecture Bug Search in Binary Executables
    Pewny, Jannik
    Garmany, Behrad
    Gawlik, Robert
    Rossow, Christian
    Holz, Thorsten
    [J]. 2015 IEEE SYMPOSIUM ON SECURITY AND PRIVACY SP 2015, 2015, : 709 - 724