Using Undervolting as an on-Device Defense Against Adversarial Machine Learning Attacks

被引:4
|
作者
Majumdar, Saikat [1 ]
Samavatian, Mohammad Hossein [1 ]
Barber, Kristin [1 ]
Teodorescu, Radu [1 ]
机构
[1] Ohio State Univ, Dept Comp Sci & Engn, Columbus, OH 43210 USA
基金
美国国家科学基金会;
关键词
undervolting; machine learning; defense;
D O I
10.1109/HOST49136.2021.9702287
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Deep neural network (DNN) classifiers are powerful tools that drive a broad spectrum of important applications, from image recognition to autonomous vehicles. Unfortunately, DNNs are known to be vulnerable to adversarial attacks that affect virtually all state-of-the-art models. These attacks make small imperceptible modifications to inputs that are sufficient to induce the DNNs to produce the wrong classification. In this paper we propose a novel, lightweight adversarial correction and/or detection mechanism for image classifiers that relies on undervolting (running a chip at a voltage that is slightly below its safe margin). We propose using controlled undervolting of the chip running the inference process in order to introduce a limited number of compute errors. We show that these errors disrupt the adversarial input in a way that can be used either to correct the classification or detect the input as adversarial. We evaluate the proposed solution in an FPGA design and through software simulation. We evaluate 10 attacks and show average detection rates of 77% and 90% on two popular DNNs.
引用
收藏
页码:158 / 169
页数:12
相关论文
共 50 条
  • [41] Network and cybersecurity applications of defense in adversarial attacks: A state-of-the-art using machine learning and deep learning methods
    Khaleel, Yahya Layth
    Habeeb, Mustafa Abdulfattah
    Albahri, A. S.
    Al-Quraishi, Tahsien
    Albahri, O. S.
    Alamoodi, A. H.
    [J]. JOURNAL OF INTELLIGENT SYSTEMS, 2024, 33 (01)
  • [42] SpacePhish: The Evasion-space of Adversarial Attacks against PhishingWebsite Detectors using Machine Learning
    Apruzzese, Giovanni
    Conti, Mauro
    Yuan, Ying
    [J]. PROCEEDINGS OF THE 38TH ANNUAL COMPUTER SECURITY APPLICATIONS CONFERENCE, ACSAC 2022, 2022, : 171 - 185
  • [43] Adversarial attacks on medical machine learning
    Finlayson, Samuel G.
    Bowers, John D.
    Ito, Joichi
    Zittrain, Jonathan L.
    Beam, Andrew L.
    Kohane, Isaac S.
    [J]. SCIENCE, 2019, 363 (6433) : 1287 - 1289
  • [44] Enablers Of Adversarial Attacks in Machine Learning
    Izmailov, Rauf
    Sugrim, Shridatt
    Chadha, Ritu
    McDaniel, Patrick
    Swami, Ananthram
    [J]. 2018 IEEE MILITARY COMMUNICATIONS CONFERENCE (MILCOM 2018), 2018, : 425 - 430
  • [45] Darknet traffic classification and adversarial attacks using machine learning
    Rust-Nguyen, Nhien
    Sharma, Shruti
    Stamp, Mark
    [J]. COMPUTERS & SECURITY, 2023, 127
  • [46] Adversarial Training Against Adversarial Attacks for Machine Learning-Based Intrusion Detection Systems
    Haroon, Muhammad Shahzad
    Ali, Husnain Mansoor
    [J]. CMC-COMPUTERS MATERIALS & CONTINUA, 2022, 73 (02): : 3513 - 3527
  • [47] The Best Defense is a Good Offense: Adversarial Augmentation against Adversarial Attacks
    Frosio, Iuri
    Kautz, Jan
    [J]. 2023 IEEE/CVF CONFERENCE ON COMPUTER VISION AND PATTERN RECOGNITION, CVPR, 2023, : 4067 - 4076
  • [48] TensorFlow Lite: On-Device Machine Learning Framework
    Li, Shuangfeng
    [J]. Jisuanji Yanjiu yu Fazhan/Computer Research and Development, 2020, 57 (09): : 1839 - 1853
  • [49] Adaptive Image Reconstruction for Defense Against Adversarial Attacks
    Yang, Yanan
    Shih, Frank Y.
    Chang, I-Cheng
    [J]. INTERNATIONAL JOURNAL OF PATTERN RECOGNITION AND ARTIFICIAL INTELLIGENCE, 2022, 36 (12)
  • [50] Cyclic Defense GAN Against Speech Adversarial Attacks
    Esmaeilpour, Mohammad
    Cardinal, Patrick
    Koerich, Alessandro Lameiras
    [J]. IEEE SIGNAL PROCESSING LETTERS, 2021, 28 : 1769 - 1773