• DMCA
  • Disclaimer
  • Terms and Conditions
  • Cookie Privacy Policy
  • Privacy Policy
  • Contact
  • Advertise
Real Hacker
  • Home
  • Review
    Spurred by Roe overturn, senators seek FTC probe of iOS and Android tracking

    Spurred by Roe overturn, senators seek FTC probe of iOS and Android tracking

    OSOM’s OV1 is now Solana’s web3 Android handset, Saga – TechCrunch

    OSOM’s OV1 is now Solana’s web3 Android handset, Saga – TechCrunch

    NFT summer in New York is in full swing amid crypto winter – TechCrunch

    NFT summer in New York is in full swing amid crypto winter – TechCrunch

    Want an EV? You may have to wait – TechCrunch

    Want an EV? You may have to wait – TechCrunch

    Netflix lays off 300 more people — almost 3% of its staff – TechCrunch

    Netflix lays off 300 more people — almost 3% of its staff – TechCrunch

    How hiring the wrong medical “expert” derailed US pandemic response

    How hiring the wrong medical “expert” derailed US pandemic response

  • Gaming
    Video Games Double Down On NFTs Despite Historic Crashes

    Video Games Double Down On NFTs Despite Historic Crashes

    Microsoft Flight Simulator update could lead to a virtual Space Shuttle

    Microsoft Flight Simulator update could lead to a virtual Space Shuttle

    Into The Breach Advanced Edition Introduces New Mechs And A Mobile Port Through Netflix

    Into The Breach Advanced Edition Introduces New Mechs And A Mobile Port Through Netflix

    The Best Dog Games On Nintendo Switch

    The Best Dog Games On Nintendo Switch

    Deliver Us the Moon Launches Today on Xbox Series X|S

    Deliver Us the Moon Launches Today on Xbox Series X|S

    Destiny 2 DMCA Revenge Plot Now A .6 Million Bungie Lawsuit

    Destiny 2 DMCA Revenge Plot Now A $7.6 Million Bungie Lawsuit

  • Gear
    • All
    • Audio
    • Camera
    • Laptop
    • Smartphone
    Fans can now join the waitlist for the Nothing phone (1)

    Fans can now join the waitlist for the Nothing phone (1)

    DaVinci Resolve 18 Beta 5 Update

    DaVinci Resolve 18 Beta 5 Update

    Make UK Drill In The Style Of Dutchavelli Or M24

    Make UK Drill In The Style Of Dutchavelli Or M24

    Samsung announces 200MP smartphone image sensor with extremely small pixels

    Samsung announces 200MP smartphone image sensor with extremely small pixels

    Instagram is testing a new AI-based age verification, social vouching

    Instagram is testing a new AI-based age verification, social vouching

    How to Watch Love Island UK in the US and beyond: a global streaming guide

    How to Watch Love Island UK in the US and beyond: a global streaming guide

    Trending Tags

    • Best iPhone 7 deals
    • Apple Watch 2
    • Nintendo Switch
    • CES 2017
    • Playstation 4 Pro
    • iOS 10
    • iPhone 7
    • Sillicon Valley
  • Computers
    Banished To Work In The Metaverse For A Week

    Banished To Work In The Metaverse For A Week

    The Gigabyte UD1000GM PG5 1000W PSU Review: Prelude to ATX 3.0

    The Gigabyte UD1000GM PG5 1000W PSU Review: Prelude to ATX 3.0

    AMD Updates Ryzen Embedded Series, R2000 Series With up to Four Cores and Eight Threads

    AMD Updates Ryzen Embedded Series, R2000 Series With up to Four Cores and Eight Threads

    A Pair Of DDR4 Z690 Boards, The NZXT N5 And NZXT N7

    A Pair Of DDR4 Z690 Boards, The NZXT N5 And NZXT N7

    SpellForce: Conquest Of Eo, 4X With RPG Elements

    SpellForce: Conquest Of Eo, 4X With RPG Elements

    Adobe Acrobat Blocking 30 Security Apps From Scanning PDFs

    Adobe Acrobat Blocking 30 Security Apps From Scanning PDFs

  • Applications
    Popular Apple Music service tier gets sudden price hike in the US, UK, and Canada

    Popular Apple Music service tier gets sudden price hike in the US, UK, and Canada

    Hackers Exploit Mitel VoIP Zero-Day in Likely Ransomware Attack

    Hackers Exploit Mitel VoIP Zero-Day in Likely Ransomware Attack

    The Morning Show director Mimi Leder signs Apple TV+ overall deal

    The Morning Show director Mimi Leder signs Apple TV+ overall deal

    YouTube TV 5.1 audio support rolling out to Amazon’s Fire TV devices

    YouTube TV 5.1 audio support rolling out to Amazon’s Fire TV devices

    Enter a Unique World With Pixar and Disney Characters in the New RPG Disney Mirrorverse

    Enter a Unique World With Pixar and Disney Characters in the New RPG Disney Mirrorverse

    Android Developers Blog: Developer-Powered CTS (CTS-D)

    Android Developers Blog: Developer-Powered CTS (CTS-D)

  • Security
    Mitek launches MiVIP platform to fight identity theft

    Mitek launches MiVIP platform to fight identity theft

    #InfosecurityEurope2022: The Interactivity Between Nation-State Attackers and Organized Crime Gangs

    #InfosecurityEurope2022: The Interactivity Between Nation-State Attackers and Organized Crime Gangs

    Johnson Controls Acquires Tempered Networks to Bring Zero Trust Cybersecurity to Connected Buildings

    Johnson Controls Acquires Tempered Networks to Bring Zero Trust Cybersecurity to Connected Buildings

    #InfosecurityEurope2022: Actions Not Words – Hacking the Human Through Social Engineering

    #InfosecurityEurope2022: Actions Not Words – Hacking the Human Through Social Engineering

    Focus On ‘Attackability’ To Better Prioritize Vulnerabilities

    Focus On ‘Attackability’ To Better Prioritize Vulnerabilities

    Pair of Brand-New Cybersecurity Bills Become Law

    Pair of Brand-New Cybersecurity Bills Become Law

No Result
View All Result
  • Home
  • Review
    Spurred by Roe overturn, senators seek FTC probe of iOS and Android tracking

    Spurred by Roe overturn, senators seek FTC probe of iOS and Android tracking

    OSOM’s OV1 is now Solana’s web3 Android handset, Saga – TechCrunch

    OSOM’s OV1 is now Solana’s web3 Android handset, Saga – TechCrunch

    NFT summer in New York is in full swing amid crypto winter – TechCrunch

    NFT summer in New York is in full swing amid crypto winter – TechCrunch

    Want an EV? You may have to wait – TechCrunch

    Want an EV? You may have to wait – TechCrunch

    Netflix lays off 300 more people — almost 3% of its staff – TechCrunch

    Netflix lays off 300 more people — almost 3% of its staff – TechCrunch

    How hiring the wrong medical “expert” derailed US pandemic response

    How hiring the wrong medical “expert” derailed US pandemic response

  • Gaming
    Video Games Double Down On NFTs Despite Historic Crashes

    Video Games Double Down On NFTs Despite Historic Crashes

    Microsoft Flight Simulator update could lead to a virtual Space Shuttle

    Microsoft Flight Simulator update could lead to a virtual Space Shuttle

    Into The Breach Advanced Edition Introduces New Mechs And A Mobile Port Through Netflix

    Into The Breach Advanced Edition Introduces New Mechs And A Mobile Port Through Netflix

    The Best Dog Games On Nintendo Switch

    The Best Dog Games On Nintendo Switch

    Deliver Us the Moon Launches Today on Xbox Series X|S

    Deliver Us the Moon Launches Today on Xbox Series X|S

    Destiny 2 DMCA Revenge Plot Now A .6 Million Bungie Lawsuit

    Destiny 2 DMCA Revenge Plot Now A $7.6 Million Bungie Lawsuit

  • Gear
    • All
    • Audio
    • Camera
    • Laptop
    • Smartphone
    Fans can now join the waitlist for the Nothing phone (1)

    Fans can now join the waitlist for the Nothing phone (1)

    DaVinci Resolve 18 Beta 5 Update

    DaVinci Resolve 18 Beta 5 Update

    Make UK Drill In The Style Of Dutchavelli Or M24

    Make UK Drill In The Style Of Dutchavelli Or M24

    Samsung announces 200MP smartphone image sensor with extremely small pixels

    Samsung announces 200MP smartphone image sensor with extremely small pixels

    Instagram is testing a new AI-based age verification, social vouching

    Instagram is testing a new AI-based age verification, social vouching

    How to Watch Love Island UK in the US and beyond: a global streaming guide

    How to Watch Love Island UK in the US and beyond: a global streaming guide

    Trending Tags

    • Best iPhone 7 deals
    • Apple Watch 2
    • Nintendo Switch
    • CES 2017
    • Playstation 4 Pro
    • iOS 10
    • iPhone 7
    • Sillicon Valley
  • Computers
    Banished To Work In The Metaverse For A Week

    Banished To Work In The Metaverse For A Week

    The Gigabyte UD1000GM PG5 1000W PSU Review: Prelude to ATX 3.0

    The Gigabyte UD1000GM PG5 1000W PSU Review: Prelude to ATX 3.0

    AMD Updates Ryzen Embedded Series, R2000 Series With up to Four Cores and Eight Threads

    AMD Updates Ryzen Embedded Series, R2000 Series With up to Four Cores and Eight Threads

    A Pair Of DDR4 Z690 Boards, The NZXT N5 And NZXT N7

    A Pair Of DDR4 Z690 Boards, The NZXT N5 And NZXT N7

    SpellForce: Conquest Of Eo, 4X With RPG Elements

    SpellForce: Conquest Of Eo, 4X With RPG Elements

    Adobe Acrobat Blocking 30 Security Apps From Scanning PDFs

    Adobe Acrobat Blocking 30 Security Apps From Scanning PDFs

  • Applications
    Popular Apple Music service tier gets sudden price hike in the US, UK, and Canada

    Popular Apple Music service tier gets sudden price hike in the US, UK, and Canada

    Hackers Exploit Mitel VoIP Zero-Day in Likely Ransomware Attack

    Hackers Exploit Mitel VoIP Zero-Day in Likely Ransomware Attack

    The Morning Show director Mimi Leder signs Apple TV+ overall deal

    The Morning Show director Mimi Leder signs Apple TV+ overall deal

    YouTube TV 5.1 audio support rolling out to Amazon’s Fire TV devices

    YouTube TV 5.1 audio support rolling out to Amazon’s Fire TV devices

    Enter a Unique World With Pixar and Disney Characters in the New RPG Disney Mirrorverse

    Enter a Unique World With Pixar and Disney Characters in the New RPG Disney Mirrorverse

    Android Developers Blog: Developer-Powered CTS (CTS-D)

    Android Developers Blog: Developer-Powered CTS (CTS-D)

  • Security
    Mitek launches MiVIP platform to fight identity theft

    Mitek launches MiVIP platform to fight identity theft

    #InfosecurityEurope2022: The Interactivity Between Nation-State Attackers and Organized Crime Gangs

    #InfosecurityEurope2022: The Interactivity Between Nation-State Attackers and Organized Crime Gangs

    Johnson Controls Acquires Tempered Networks to Bring Zero Trust Cybersecurity to Connected Buildings

    Johnson Controls Acquires Tempered Networks to Bring Zero Trust Cybersecurity to Connected Buildings

    #InfosecurityEurope2022: Actions Not Words – Hacking the Human Through Social Engineering

    #InfosecurityEurope2022: Actions Not Words – Hacking the Human Through Social Engineering

    Focus On ‘Attackability’ To Better Prioritize Vulnerabilities

    Focus On ‘Attackability’ To Better Prioritize Vulnerabilities

    Pair of Brand-New Cybersecurity Bills Become Law

    Pair of Brand-New Cybersecurity Bills Become Law

No Result
View All Result
Real Hacker
No Result
View All Result

Home Security

Companies Borrow Attack Technique to Watermark Machine Learning Models

RealHacker Staff by RealHacker Staff
February 28, 2022
Companies Borrow Attack Technique to Watermark Machine Learning Models
Share on FacebookShare on Twitter



Laptop scientists and researchers are more and more investigating methods that may create backdoors in machine-learning (ML) fashions — first to grasp the potential menace, but additionally as an anti-copying safety to determine when ML implementations have been used with out permission.

Initially referred to as BadNets, backdoored neural networks signify each a menace and a promise of making distinctive watermarks to guard the mental property of ML fashions, researchers say. The coaching method goals to provide a specifically crafted output, or watermark, if a neural community is given a selected set off as an enter: A particular sample of shapes, for instance, might set off a visible recognition system, whereas a selected audio sequence might set off a speech recognition system.

Initially, the analysis into backdooring neural networks was meant as a warning to researchers to make their ML fashions extra strong and to permit them to detect such manipulations. However now analysis has pivoted to utilizing the method to detect when a machine-learning mannequin has been copied, says Sofiane Lounici, an information engineer and machine-learning specialist at SAP Labs France.

“In early levels of the analysis, authors tried to adapt already-existing backdooring methods, however shortly methods had been particularly developed to be used instances associated to watermarking,” he says. “These days, we’re in a state of affairs of an attack-defense sport, the place a brand new method might be of use for both backdooring or watermarking fashions.”

A crew of New York College researchers initially explored the method for creating backdoored neural networks in a 2017 paper the place they attacked a handwritten number-classifier and visual-recognition mannequin for cease indicators. The paper, “BadNets: Figuring out Vulnerabilities within the Machine Studying Mannequin Provide Chain,” warned that the pattern of outsourcing within the ML provide chain might result in attackers inserting undesirable behaviors into neural networks that might be triggered by a selected enter. Basically, attackers might insert a vulnerability into the neural community throughout coaching that might be triggered later.

As a result of safety has not been a significant a part of ML pipelines, these threats are a beneficial space of analysis, says Ian Molloy, a division head for safety at IBM Analysis.

“We’re seeing quite a lot of current analysis and publications associated to watermarking and backdoor-poisoning assaults, so clearly the threats needs to be taken critically,” he says. “AI fashions have vital worth to organizations, and again and again we observe that something of worth will likely be focused by adversaries.”

Dangerous Backdoors, Good Backdoors
A second paper, titled “Turning Your Weak spot Right into a Energy: Watermarking Deep Neural Networks by Backdooring,” outlined methods to make use of the method to guard proprietary work in neural networks by inserting a watermark that may be triggered with little or no affect on the accuracy of the ML mannequin. IBM created a framework utilizing an identical method and is presently exploring mannequin watermarking as a service, the corporate’s analysis crew said in a weblog submit.

In some ways, backdooring and watermarking differ in simply software and focus, says Beat Buesser, a analysis employees member for safety at IBM Analysis.

“Backdoor poisoning and watermarking ML fashions with embedded patterns within the coaching and enter knowledge will be thought of to be two sides of the identical method, relying primarily on the objectives of the person,” he says. “If the set off sample is launched, aiming to regulate the mannequin after coaching it could be thought of a malicious poisoning assault, whereas whether it is launched to later confirm the possession of the mannequin it’s thought of a benign motion.”

Present analysis focuses on one of the best methods to decide on triggers and outputs for watermarking. As a result of the inputs are completely different for every sort of ML software — pure language versus picture recognition, for instance — the method must be tailor-made to the ML algorithm. As well as, researchers are centered on different fascinating options, similar to robustness — how resistant the watermark is to elimination — and persistence — how effectively the watermark survives coaching.

SAP’s Lounici and his colleagues printed a paper late final yr on tips on how to forestall modification of watermarks in ML as a service environments. In addition they printed an open sourced repository with the code utilized by the group.

“It is extremely laborious to foretell whether or not or not watermarking will turn into widespread sooner or later, however I do suppose the issue of the mental property of fashions will turn into a significant subject within the coming years,” Lounici says. “With the event of ML-based options for automatization and ML fashions turning into vital enterprise property, necessities for IP safety will come up, however will it’s watermarking? I’m not certain.”

Machine-Studying Fashions are Precious
Why all of the fuss over defending the work corporations put into deep neural networks? 

Even for well-understood architectures, the coaching prices for classy ML fashions can run from the tens of hundreds of {dollars} to tens of millions of {dollars}. One mannequin, referred to as XLNet, is estimated to cost $250,000 to train, whereas an evaluation of OpenAI’s GPT-3 mannequin estimates it price $4.6 million to coach.

With such prices, corporations wish to develop quite a lot of instruments to guard their creations, says Mikel Rodriguez, director of the Synthetic Intelligence and Autonomy Innovation Heart at MITRE Corp., a federally funded analysis and growth middle.

“There may be super worth locked into as we speak’s machine-learning fashions, and as corporations expose ML fashions by way of APIs, these threats are usually not hypothetical,” he says. “Not solely do you need to think about the mental property of the fashions and the price to label tens of millions of coaching samples, but additionally the uncooked computing energy represents a big funding.”

Watermarking might permit corporations to make authorized instances in opposition to rivals. That mentioned, different adversarial approaches exist that might be used to reconstitute the coaching knowledge used to create a selected mannequin or the weights assigned to neurons.

For corporations that license such fashions — basically pretrained networks — or machine-learning “blanks” that may be shortly skilled to a selected use case, the specter of an attacker making a backdoor throughout ultimate coaching is extra salient. These fashions solely should be watermarked by the unique creator, however they need to be protected against the embedding of malicious performance by adversaries, says IBM’s Malloy.

In that case, watermarking could be just one potential instrument.

“For extra delicate fashions, we might recommend a holistic method to defending fashions in opposition to theft and never relying solely on one protecting measure alone,” he says. “In that setting, one ought to consider if watermarking enhances different approaches, as it could in defending some other delicate knowledge.”





Source link

Related

Tags: AttackBorrowcompaniesLearningMachinemodelsTechniqueWatermark
RealHacker Staff

RealHacker Staff

Recommended.

Apple makes change to App Store rules allowing subscription apps to auto-renew without permission

Apple makes change to App Store rules allowing subscription apps to auto-renew without permission

May 17, 2022
Daily Horoscope Apps for iOS

Daily Horoscope Apps for iOS

April 13, 2022

Trending.

Hypex Presents New Nilai500 DIY Audio Amplifier Module

Hypex Presents New Nilai500 DIY Audio Amplifier Module

May 16, 2022
NAMM 2022: Audeze partners Manny Marroquin on the Manny MM-500 headphones

NAMM 2022: Audeze partners Manny Marroquin on the Manny MM-500 headphones

June 3, 2022
ADPTR Audio Sculpt review: A must-have dynamics plug-in for mastering and mixing engineers

ADPTR Audio Sculpt review: A must-have dynamics plug-in for mastering and mixing engineers

March 15, 2022
12 best rotary mixers for DJs

12 best rotary mixers for DJs

March 16, 2022
How To Get Into Halo Infinite’s Campaign Co-Op Beta Test

How To Get Into Halo Infinite’s Campaign Co-Op Beta Test

June 8, 2022

Follow Us

Categories

  • Applications
  • Audio
  • Camera
  • Computers
  • Gaming
  • Gear
  • Laptop
  • Metaverse
  • Microsoft
  • Photography
  • Review
  • Security
  • Smartphone
  • Uncategorized

Recent News

Mitek launches MiVIP platform to fight identity theft

Mitek launches MiVIP platform to fight identity theft

June 24, 2022
Spurred by Roe overturn, senators seek FTC probe of iOS and Android tracking

Spurred by Roe overturn, senators seek FTC probe of iOS and Android tracking

June 24, 2022
  • DMCA
  • Disclaimer
  • Terms and Conditions
  • Cookie Privacy Policy
  • Privacy Policy
  • Contact
  • Advertise

© 2019 - theme develop by real hacker news.

No Result
View All Result
  • Home
  • Review
  • Applications
  • Computers
  • Gaming
  • Gear
    • Audio
    • Camera
    • Smartphone
  • Microsoft
  • Photography
  • Security

© 2019 - theme develop by real hacker news.

error: Content is protected !!