DNN-Defender: A Victim-Focused In-DRAM Defense Mechanism for Taming Adversarial Weight Attack on DNNs

Read original: arXiv:2305.08034 - Published 9/11/2024 by Ranyang Zhou, Sabbir Ahmed, Adnan Siraj Rakin, Shaahin Angizi
Total Score

0

🛠️

Sign in to get full access

or

If you already have an account, we'll log you in

Overview

  • Deep learning is being used in many security-sensitive areas, so machine learning security is increasingly important.
  • Attackers can exploit vulnerabilities like RowHammer in DRAM to flip bits in deep neural network (DNN) model weights, affecting inference accuracy.
  • Existing defenses are software-based and come with performance overhead or accuracy degradation.
  • Hardware-based defenses have high costs and preserve the connection between victim and aggressor rows.

Plain English Explanation

Machine learning, especially deep learning, is now used in many sensitive applications like security systems. This makes protecting these models from attacks a critical concern. Recent research has shown that attackers can exploit hardware vulnerabilities, like the RowHammer issue in DRAM memory, to deliberately flip bits in the weights of deep neural network (DNN) models. This can cause the model to make incorrect predictions.

The current defenses against these attacks are software-based approaches, like reconstructing the model weights. But these come with significant overhead, either in training time or performance degradation. Hardware-based defenses that target the victim and aggressor rows directly also have high costs and don't fully isolate the vulnerable components.

This paper proposes a new hardware-based defense mechanism called DNN-Defender that is specifically tailored for protecting quantized DNN models. It leverages the capability of in-DRAM swapping to provide strong protection against targeted bit-flip attacks, without any accuracy loss or performance overhead.

Technical Explanation

The key idea behind DNN-Defender is to use the in-DRAM swapping capability to prioritize the protection of the most critical DNN model weights. When an attack is detected, DNN-Defender will quickly swap the vulnerable rows containing the important weights to safer locations in DRAM. This breaks the connection between the victim and aggressor rows, effectively mitigating the RowHammer attack.

The authors evaluate DNN-Defender on the CIFAR-10 and ImageNet datasets and find that it can protect the model from targeted bit-flip attacks, reducing their impact to the level of random bit-flips. Importantly, this defense comes at no accuracy cost and requires no additional software training or hardware modifications.

Critical Analysis

The paper provides a promising hardware-based defense against RowHammer attacks on DNN models. By focusing on the critical weights and leveraging in-DRAM swapping, it achieves strong protection without performance degradation.

However, the evaluation is limited to just two datasets, and it would be valuable to see how DNN-Defender performs on a wider range of models and applications. The authors also don't discuss the potential impact on memory latency or energy consumption from the frequent swapping operations.

Additionally, the defense assumes the attacker can only target a limited number of bits. If the attacker had the capability to corrupt a larger number of bits, the effectiveness of DNN-Defender may be reduced. Further research could explore ways to make the defense more robust against more powerful attackers.

Conclusion

This paper presents a novel hardware-based defense called DNN-Defender that can effectively protect deep neural network models from RowHammer attacks. By prioritizing the protection of critical model weights through in-DRAM swapping, it can mitigate the impact of targeted bit-flips without any accuracy loss or performance overhead.

As deep learning becomes more ubiquitous in security-sensitive applications, defenses like DNN-Defender will be crucial to ensuring the robustness and reliability of these systems. The insights from this work can inform the development of future hardware-based security mechanisms for machine learning.



This summary was produced with help from an AI and may contain inaccuracies - check out the links to read the original source documents!

Follow @aimodelsfyi on 𝕏 →

Related Papers

🛠️

Total Score

0

DNN-Defender: A Victim-Focused In-DRAM Defense Mechanism for Taming Adversarial Weight Attack on DNNs

Ranyang Zhou, Sabbir Ahmed, Adnan Siraj Rakin, Shaahin Angizi

With deep learning deployed in many security-sensitive areas, machine learning security is becoming progressively important. Recent studies demonstrate attackers can exploit system-level techniques exploiting the RowHammer vulnerability of DRAM to deterministically and precisely flip bits in Deep Neural Networks (DNN) model weights to affect inference accuracy. The existing defense mechanisms are software-based, such as weight reconstruction requiring expensive training overhead or performance degradation. On the other hand, generic hardware-based victim-/aggressor-focused mechanisms impose expensive hardware overheads and preserve the spatial connection between victim and aggressor rows. In this paper, we present the first DRAM-based victim-focused defense mechanism tailored for quantized DNNs, named DNN-Defender that leverages the potential of in-DRAM swapping to withstand the targeted bit-flip attacks with a priority protection mechanism. Our results indicate that DNN-Defender can deliver a high level of protection downgrading the performance of targeted RowHammer attacks to a random attack level. In addition, the proposed defense has no accuracy drop on CIFAR-10 and ImageNet datasets without requiring any software training or incurring hardware overhead.

Read more

9/11/2024

A Survey of Trojan Attacks and Defenses to Deep Neural Networks
Total Score

0

A Survey of Trojan Attacks and Defenses to Deep Neural Networks

Lingxin Jin, Xianyu Wen, Wei Jiang, Jinyu Zhan

Deep Neural Networks (DNNs) have found extensive applications in safety-critical artificial intelligence systems, such as autonomous driving and facial recognition systems. However, recent research has revealed their susceptibility to Neural Network Trojans (NN Trojans) maliciously injected by adversaries. This vulnerability arises due to the intricate architecture and opacity of DNNs, resulting in numerous redundant neurons embedded within the models. Adversaries exploit these vulnerabilities to conceal malicious Trojans within DNNs, thereby causing erroneous outputs and posing substantial threats to the efficacy of DNN-based applications. This article presents a comprehensive survey of Trojan attacks against DNNs and the countermeasure methods employed to mitigate them. Initially, we trace the evolution of the concept from traditional Trojans to NN Trojans, highlighting the feasibility and practicality of generating NN Trojans. Subsequently, we provide an overview of notable works encompassing various attack and defense strategies, facilitating a comparative analysis of their approaches. Through these discussions, we offer constructive insights aimed at refining these techniques. In recognition of the gravity and immediacy of this subject matter, we also assess the feasibility of deploying such attacks in real-world scenarios as opposed to controlled ideal datasets. The potential real-world implications underscore the urgency of addressing this issue effectively.

Read more

8/20/2024

David and Goliath: An Empirical Evaluation of Attacks and Defenses for QNNs at the Deep Edge
Total Score

0

David and Goliath: An Empirical Evaluation of Attacks and Defenses for QNNs at the Deep Edge

Miguel Costa, Sandro Pinto

ML is shifting from the cloud to the edge. Edge computing reduces the surface exposing private data and enables reliable throughput guarantees in real-time applications. Of the panoply of devices deployed at the edge, resource-constrained MCUs, e.g., Arm Cortex-M, are more prevalent, orders of magnitude cheaper, and less power-hungry than application processors or GPUs. Thus, enabling intelligence at the deep edge is the zeitgeist, with researchers focusing on unveiling novel approaches to deploy ANNs on these constrained devices. Quantization is a well-established technique that has proved effective in enabling the deployment of neural networks on MCUs; however, it is still an open question to understand the robustness of QNNs in the face of adversarial examples. To fill this gap, we empirically evaluate the effectiveness of attacks and defenses from (full-precision) ANNs on (constrained) QNNs. Our evaluation includes three QNNs targeting TinyML applications, ten attacks, and six defenses. With this study, we draw a set of interesting findings. First, quantization increases the point distance to the decision boundary and leads the gradient estimated by some attacks to explode or vanish. Second, quantization can act as a noise attenuator or amplifier, depending on the noise magnitude, and causes gradient misalignment. Regarding adversarial defenses, we conclude that input pre-processing defenses show impressive results on small perturbations; however, they fall short as the perturbation increases. At the same time, train-based defenses increase the average point distance to the decision boundary, which holds after quantization. However, we argue that train-based defenses still need to smooth the quantization-shift and gradient misalignment phenomenons to counteract adversarial example transferability to QNNs. All artifacts are open-sourced to enable independent validation of results.

Read more

5/6/2024

🧠

Total Score

0

A Novel Self-Attention-Enabled Weighted Ensemble-Based Convolutional Neural Network Framework for Distributed Denial of Service Attack Classification

Kanthimathi S, Shravan Venkatraman, Jayasankar K S, Pranay Jiljith T, Jashwanth R

Distributed Denial of Service (DDoS) attacks are a major concern in network security, as they overwhelm systems with excessive traffic, compromise sensitive data, and disrupt network services. Accurately detecting these attacks is crucial to protecting network infrastructure. Traditional approaches, such as single Convolutional Neural Networks (CNNs) or conventional Machine Learning (ML) algorithms like Decision Trees (DTs) and Support Vector Machines (SVMs), struggle to extract the diverse features needed for precise classification, resulting in suboptimal performance. This research addresses this gap by introducing a novel approach for DDoS attack detection. The proposed method combines three distinct CNN architectures: SA-Enabled CNN with XGBoost, SA-Enabled CNN with LSTM, and SA-Enabled CNN with Random Forest. Each model extracts features at multiple scales, while self-attention mechanisms enhance feature integration and relevance. The weighted ensemble approach ensures that both prominent and subtle features contribute to the final classification, improving adaptability to evolving attack patterns and novel threats. The proposed method achieves a precision of 98.71%, an F1-score of 98.66%, a recall of 98.63%, and an accuracy of 98.69%, outperforming traditional methods and setting a new benchmark in DDoS attack detection. This innovative approach addresses critical limitations in current models and advances the state of the art in network security.

Read more

9/4/2024