Deep learning models are increasingly used in mobile applications as critical components. Unlike the program bytecode whose vulnerabilities and threats have been widely-discussed, whether and how the deep learning models deployed in the applications can be compromised are not well-understood since neural networks are usually viewed as a black box. In this paper, we introduce a highly practical backdoor attack achieved with a set of reverse-engineering techniques over compiled deep learning models. The core of the attack is a neural conditional branch constructed with a trigger detector and several operators and injected into the victim model as a malicious payload. The attack is effective as the conditional logic can be flexibly customized by the attacker, and scalable as it does not require any prior knowledge from the original model. We evaluated the attack effectiveness using 5 state-of-the-art deep learning models and real-world samples collected from 30 users. The results demonstrated that the injected backdoor can be triggered with a success rate of 93.5%, while only brought less than 2ms latency overhead and no more than 1.4% accuracy decrease. We further conducted an empirical study on real-world mobile deep learning apps collected from Google Play. We found 54 apps that were vulnerable to our attack, including popular and security-critical ones. The results call for the awareness of deep learning application developers and auditors to enhance the protection of deployed models.
翻译:深层学习模型越来越多地用于移动应用中,作为关键组成部分。 与被广泛讨论其脆弱性和威胁的脆弱程度和威胁被广泛讨论过的程式位码不同,由于神经网络通常被视为黑盒子,因此没有很好地理解在应用程序中部署的深层学习模型是否以及如何可以妥协,因为神经网络通常被视为一个黑盒。在本文中,我们采用一套反向工程技术,在编集深层学习模型的基础上,采用一套反向工程技术,实现了高度实用的后门攻击。袭击的核心是用触发探测器和几个操作员建造的神经条件性小分机,作为恶意有效输入受害者模型。这次袭击是有效的,因为有条件逻辑可以由攻击者灵活定制,并且可以伸缩,因为它不需要从原始模型中事先获得任何知识。我们用5个最先进的深层学习模型和从30个用户收集到的真实世界样本评估了攻击效果。结果显示,注射的后门可以以93.5%的成功率触发,而仅带来不到2米的液压顶和不超过1.4 %的精确度下降。 我们还对现实世界移动的深层次进行了实验性研究,因为我们的深层次学习了深层次的应用程序,我们从Gong Play公司学到了安全。 我们找到了54号搜索了安全模型,我们学到了安全模型。 我们找到了了向Gooflestrucredistration。