The advancements of deep neural networks (DNNs) have led to their deployment in diverse settings, including safety and security-critical applications. As a result, the characteristics of these models have become sensitive intellectual properties that require protection from malicious users. Extracting the architecture of a DNN through leaky side-channels (e.g., memory access) allows adversaries to (i) clone the model, and (ii) craft adversarial attacks. DNN obfuscation thwarts side-channel-based architecture stealing (SCAS) attacks by altering the run-time traces of a given DNN while preserving its functionality. In this work, we expose the vulnerability of state-of-the-art DNN obfuscation methods to these attacks. We present NeuroUnlock, a novel SCAS attack against obfuscated DNNs. Our NeuroUnlock employs a sequence-to-sequence model that learns the obfuscation procedure and automatically reverts it, thereby recovering the original DNN architecture. We demonstrate the effectiveness of NeuroUnlock by recovering the architecture of 200 randomly generated and obfuscated DNNs running on the Nvidia RTX 2080 TI graphics processing unit (GPU). Moreover, NeuroUnlock recovers the architecture of various other obfuscated DNNs, such as the VGG-11, VGG-13, ResNet-20, and ResNet-32 networks. After recovering the architecture, NeuroUnlock automatically builds a near-equivalent DNN with only a 1.4% drop in the testing accuracy. We further show that launching a subsequent adversarial attack on the recovered DNNs boosts the success rate of the adversarial attack by 51.7% in average compared to launching it on the obfuscated versions. Additionally, we propose a novel methodology for DNN obfuscation, ReDLock, which eradicates the deterministic nature of the obfuscation and achieves 2.16X more resilience to the NeuroUnlock attack. We release the NeuroUnlock and the ReDLock as open-source frameworks.
翻译:深神经网络的进步导致其在不同环境中的部署,包括安全和安保关键应用程序。因此,这些模型的特性已成为需要恶意用户保护的敏感智力特性。通过泄漏的侧通道(如内存访问)提取 DN的架构,使对手(一) 克隆模型,和(二) 编造对抗性攻击。 DNN 模糊性通过改变给定的 DNN 的运行时间痕迹,从而挫败了以侧渠道为基础的结构盗窃(SCAS),同时维护了它的功能。在这项工作中,我们暴露了需要保护的NNNNNN的自动智能特性。我们介绍了NuroUnlock,这是SCAS对模糊的侧通道(例如内存访问)的新型攻击。我们的NEURUUnlock采用了一个顺序到顺序的模型,它学习了模糊性程序,并自动恢复了DNNNNN的系统结构。我们通过恢复了NNNNUU的运行效率,恢复了近200次的NGO的运行过程,而后又展示了其他的NGUFO的系统。