The architecture information of a Deep Neural Network (DNN) model is considered a valuable, sensitive piece of property for a company. Knowledge of a DNN’s exact architecture allows any adversary to build a substitute model and use this substitute model to launch devastating adversarial attacks. Side-channel based DNN architecture stealing can take place where an outsider can extract a DNN architecture through side-channel information leakage. Specifically, when a company hosts their application on a third-party cloud computing platform or on a local device with GPU support, they open it up to architecture stealing through side-channel attacks.
Previous efforts for preventing DNN architecture stealing have focused on hardware solutions to eliminate information leakage. Though hardware modifications are effective countermeasures, they are not beneficial to existing devices and have high performance overhead. What is needed is a full-stack tool which obfuscates neural network execution to effectively mitigate neural architecture stealing.
Researchers at Arizona State University (ASU) have developed a full-stack obfuscating tool to protect model architecture information from being stolen by adversaries with access to leaky side-channels. ASU’s tool can be deployed in both cloud-based GPUs and on edge computing devices. The tool consists of a set of obfuscating knobs chosen across scripting, optimization, and scheduling stacks of neural network model compilation. To achieve the best obfuscating performance with minimal overhead, the ASU tool uses a genetic algorithm as an optimization method to find the combination of obfuscating knobs to maximize the obfuscation performance given the user’s latency budget. Use of this method results in a neural network architecture that has the same functionality as the original trained mode but generates a hardware trace that cannot be used by the adversary to derive the architecture model.
Related publication: NeurObfuscator: A Full-stack Obfuscation Tool to Mitigate Neural Architecture Stealing
Potential Applications:
Benefits and Advantages: