Disarming Steganography Attacks Inside Neural Network Models

09/06/2023
by   Ran Dubin, et al.
0

Similar to the revolution of open source code sharing, Artificial Intelligence (AI) model sharing is gaining increased popularity. However, the fast adaptation in the industry, lack of awareness, and ability to exploit the models make them significant attack vectors. By embedding malware in neurons, the malware can be delivered covertly, with minor or no impact on the neural network's performance. The covert attack will use the Least Significant Bits (LSB) weight attack since LSB has a minimal effect on the model accuracy, and as a result, the user will not notice it. Since there are endless ways to hide the attacks, we focus on a zero-trust prevention strategy based on AI model attack disarm and reconstruction. We proposed three types of model steganography weight disarm defense mechanisms. The first two are based on random bit substitution noise, and the other on model weight quantization. We demonstrate a 100% prevention rate while the methods introduce a minimal decrease in model accuracy based on Qint8 and K-LRBP methods, which is an essential factor for improving AI security.

READ FULL TEXT

page 1

page 2

page 3

page 4

research
09/09/2021

EvilModel 2.0: Hiding Malware Inside of Neural Network Models

While artificial intelligence (AI) is widely applied in various areas, i...
research
07/19/2021

EvilModel: Hiding Malware Inside of Neural Network Models

Delivering malware covertly and evasively is critical to advanced malwar...
research
01/26/2020

AI-Powered GUI Attack and Its Defensive Methods

Since the first Graphical User Interface (GUI) prototype was invented in...
research
04/24/2020

ML-driven Malware that Targets AV Safety

Ensuring the safety of autonomous vehicles (AVs) is critical for their m...
research
01/23/2023

Practical Adversarial Attacks Against AI-Driven Power Allocation in a Distributed MIMO Network

In distributed multiple-input multiple-output (D-MIMO) networks, power c...
research
08/22/2023

Adaptive White-Box Watermarking with Self-Mutual Check Parameters in Deep Neural Networks

Artificial Intelligence (AI) has found wide application, but also poses ...
research
06/30/2023

Research on Virus Cyberattack-Defense Based on Electromagnetic Radiation

Information technology and telecommunications have rapidly permeated var...

Please sign up or login with your details

Forgot password? Click here to reset