Energy-Latency Attacks to On-Device Neural Networks via Sponge Poisoning

05/06/2023
by   Zijian Wang, et al.
0

In recent years, on-device deep learning has gained attention as a means of developing affordable deep learning applications for mobile devices. However, on-device models are constrained by limited energy and computation resources. In the mean time, a poisoning attack known as sponge poisoning has been developed.This attack involves feeding the model with poisoned examples to increase the energy consumption during inference. As previous work is focusing on server hardware accelerators, in this work, we extend the sponge poisoning attack to an on-device scenario to evaluate the vulnerability of mobile device processors. We present an on-device sponge poisoning attack pipeline to simulate the streaming and consistent inference scenario to bridge the knowledge gap in the on-device setting. Our exclusive experimental analysis with processors and on-device networks shows that sponge poisoning attacks can effectively pollute the modern processor with its built-in accelerator. We analyze the impact of different factors in the sponge poisoning algorithm and highlight the need for improved defense mechanisms to prevent such attacks on on-device deep learning applications.

READ FULL TEXT

page 1

page 2

page 3

page 4

research
03/14/2022

Energy-Latency Attacks via Sponge Poisoning

Sponge examples are test-time inputs carefully-optimized to increase ene...
research
07/03/2019

On-Device Neural Net Inference with Mobile GPUs

On-device inference of machine learning models for mobile phones is desi...
research
06/05/2020

Sponge Examples: Energy-Latency Attacks on Neural Networks

The high energy costs of neural network training and inference led to th...
research
02/26/2020

Graphcore C2 Card performance for image-based deep learning application: A Report

Recently, Graphcore has introduced an IPU Processor for accelerating mac...
research
04/21/2020

A Data and Compute Efficient Design for Limited-Resources Deep Learning

Thanks to their improved data efficiency, equivariant neural networks ha...
research
11/19/2020

Screen Gleaning: A Screen Reading TEMPEST Attack on Mobile Devices Exploiting an Electromagnetic Side Channel

We introduce screen gleaning, a TEMPEST attack in which the screen of a ...
research
04/11/2023

Overload: Latency Attacks on Object Detection for Edge Devices

Nowadays, the deployment of deep learning based applications on edge dev...

Please sign up or login with your details

Forgot password? Click here to reset