期刊文献+

DNNobfus:一种基于混淆的端侧模型保护框架技术研究

DNNobfus:a study on obfuscation-based edge-side model protection framework
下载PDF
导出
摘要 人工智能模型自广泛使用以来,面临诸多安全风险。随着深度学习模型大规模在端侧设备上的部署,端侧模型面临新的安全挑战。由于深度神经网络具有相似的结构特征,攻击者得以运用反编译技术以获取模型的结构信息及其参数,从而重建模型。此过程会损害模型的知识产权并使模型面临白盒攻击的风险。针对模型反编译器对模型算子的定位与识别、参数获取、网络拓扑解析过程,提出了一种基于模型编译过程的混淆框架以防御模型提取攻击;在深度学习编译器的前端优化过程中设计并实现了算子混淆、参数混淆和网络拓扑混淆3种混淆手段;采用构造不透明谓词,插入虚假控制流,添加冗余内存访问等手段,干扰模型反编译器对模型的逆向工程。实验结果表明,提出的混淆框架DNNobfus能有效降低前沿的模型反编译工具对模型算子类型及网络连接识别的准确率,分别下降至21.63%和48.24%。此外,该框架平均时间效率为67.93%,平均空间效率为88.37%,均优于混淆工具Obfuscator-LLVM。 The proliferation of artificial intelligence models has rendered them vulnerable to a myriad of security threats.The extensive integration of deep learning models into edge devices has introduced novel security challenges.Given the analogous structural characteristics of deep neural networks,adversaries can employ decompilation tactics to extract model structural details and parameters,facilitating the reconstruction of these models.Such actions can compromise the intellectual property rights of the model and increase the risk of white-box attacks.To mitigate the capability of model decompilers to locate and identify model operators,acquire parameters,and parse network topologies,an obfuscation framework was proposed.This framework was embedded within the model compilation process to safeguard against model extraction attacks.During the frontend optimization phase of deep learning compilers,three obfuscation techniques were developed and integrated:operator obfuscation,parameter obfuscation,and network topology obfuscation.The framework introduced opaque predicates,incorporated fake control flows,and embedded redundant memory access to thwart the reverse engineering efforts of model decompilers.The experimental findings demonstrate that the obfuscation framework,named DNNobfus,significantly diminishes the accuracy of state-of-the-art model decompilation tools in identifying model operator types and network connections to 21.63%and 48.24%,respectively.Additionally,DNNobfus achieves an average time efficiency of 67.93%and an average space efficiency of 88.37%,surpassing the performance of the obfuscation tool Obfuscator-LLVM in both respects.
作者 宋飞扬 赵鑫淼 严飞 程斌林 张立强 杨小林 王洋 SONG Feiyang;ZHAO Xinmiao;YAN Fei;CHENG Binlin;ZHANG Liqiang;YANG Xiaolin;WANG Yang(Key Laboratory of Aerospace Information Security and Trusted Computing,Ministry of Education,School of Cyber Science and Engineering,Wuhan University,Wuhan 430072,China;School of Cyber Science and Technology,Shandong University,Qingdao 266237,China;Inspur Intelligent Technology Company Limited,Jinan 250101,China;Inspur Academy of Science and Technology,Jinan 250101,China)
出处 《网络与信息安全学报》 2024年第2期143-153,共11页 Chinese Journal of Network and Information Security
基金 湖北省重大研究计划项目(No.2023BAA027) 国家自然科学基金(No.62172144) 国家重点研发计划项目(No.2022YFB3103804)。
关键词 人工智能安全 代码混淆 逆向工程 模型保护 artificial intelligence safety code obfuscation reverse engineering model protection
  • 相关文献

参考文献3

二级参考文献21

  • 1高鹰,陈意云.基于抽象解释的代码迷惑有效性比较框架[J].计算机学报,2007,30(5):806-814. 被引量:16
  • 2Eilam E,Chikofsky E,Wrote;Han Q,Yang Y,Wang YY,Li N,Trans.Reversing:Secrets of Reverse Engineering.Beijing:ChinaMachine Press,2005(in Chinese).
  • 3Collberg C,Thomborson C,Low D.A taxonomy of obfuscating transformations.Technical Report,148,University of Auckland,1997.
  • 4Collberg C,Thomborson C,Low D.Manufacturing cheap,resilient,and stealthy opaoue constructs.In:Proc.of the 25th ACMSIGPLAN-SIGACT Symp.on Principles of Programming Languages,1998.184-196.[doi:10.1145/268946.268962].
  • 5Chow S,Gu Y,Johnson H,Zakharov VA.An approach to the obfuscation of control-flow of sequential computer programs.In:Davida G,Frankel Y,eds.Proc.of the Information Security(ISC 2001).LNCS 2200,Springer-Verlag,2001.144-155.[doi:10.1007/3-540-45439-X_10].
  • 6Barak B,Goldreich O,Impagliazzo R,Rudich S,Sahai A,Vadhan SP,Yang K.On the(im)possibility of obfuscating programs.In:Kilian J,ed.Proc.of the 21st Annual Int’l Cryptology Conf.on Advances in Cryptology(CRYPTO 2001).Santa Barbara:Springer-Verlag,2001.1-18.
  • 7Appel A.Deobfuscation is in NP.2002.http://www.cs.princeton.edu/~appel/papers/deobfus.pdf.
  • 8Preda M,Giacobazzi R.Semantic-Based code obfuscation by abstract interpretation.In:Proc.of the ICALP.2005.[doi:10.1007/11523468_107].
  • 9Preda M,Giacobazzi R.Control code obfuscation by abstract interpretation.In:Proc.of the SEFM.2005.[doi:10.1109/SEFM.2005.13].
  • 10Gao Y,Chen YY.Research on code obfuscation and its semantics[Ph.D.Thesis].Hefei:University of Science and Technology ofChina,2007.(in Chinese with English abstract).

共引文献69

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部