Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
Skip to main content

Showing 1–21 of 21 results for author: Rakin, A S

Searching in archive cs. Search in all archives.
.
  1. arXiv:2404.18396  [pdf, other

    cs.CR cs.AR

    DRAM-Profiler: An Experimental DRAM RowHammer Vulnerability Profiling Mechanism

    Authors: Ranyang Zhou, Jacqueline T. Liu, Nakul Kochar, Sabbir Ahmed, Adnan Siraj Rakin, Shaahin Angizi

    Abstract: RowHammer stands out as a prominent example, potentially the pioneering one, showcasing how a failure mechanism at the circuit level can give rise to a significant and pervasive security vulnerability within systems. Prior research has approached RowHammer attacks within a static threat model framework. Nonetheless, it warrants consideration within a more nuanced and dynamic model. This paper pres… ▽ More

    Submitted 28 April, 2024; originally announced April 2024.

    Comments: 6 pages, 6 figures

  2. arXiv:2312.09027  [pdf, other

    cs.AR

    DRAM-Locker: A General-Purpose DRAM Protection Mechanism against Adversarial DNN Weight Attacks

    Authors: Ranyang Zhou, Sabbir Ahmed, Arman Roohi, Adnan Siraj Rakin, Shaahin Angizi

    Abstract: In this work, we propose DRAM-Locker as a robust general-purpose defense mechanism that can protect DRAM against various adversarial Deep Neural Network (DNN) weight attacks affecting data or page tables. DRAM-Locker harnesses the capabilities of in-DRAM swapping combined with a lock-table to prevent attackers from singling out specific DRAM rows to safeguard DNN's weight parameters. Our results i… ▽ More

    Submitted 14 December, 2023; originally announced December 2023.

    Comments: 7 pages. arXiv admin note: text overlap with arXiv:2305.08034

  3. arXiv:2311.16460  [pdf, other

    cs.AR cs.CR

    Threshold Breaker: Can Counter-Based RowHammer Prevention Mechanisms Truly Safeguard DRAM?

    Authors: Ranyang Zhou, Jacqueline Liu, Sabbir Ahmed, Nakul Kochar, Adnan Siraj Rakin, Shaahin Angizi

    Abstract: This paper challenges the existing victim-focused counter-based RowHammer detection mechanisms by experimentally demonstrating a novel multi-sided fault injection attack technique called Threshold Breaker. This mechanism can effectively bypass the most advanced counter-based defense mechanisms by soft-attacking the rows at a farther physical distance from the target rows. While no prior work has d… ▽ More

    Submitted 27 November, 2023; originally announced November 2023.

    Comments: 7 pages, 6 figures

  4. arXiv:2305.08034  [pdf, other

    cs.CR cs.AI

    DNN-Defender: An in-DRAM Deep Neural Network Defense Mechanism for Adversarial Weight Attack

    Authors: Ranyang Zhou, Sabbir Ahmed, Adnan Siraj Rakin, Shaahin Angizi

    Abstract: With deep learning deployed in many security-sensitive areas, machine learning security is becoming progressively important. Recent studies demonstrate attackers can exploit system-level techniques exploiting the RowHammer vulnerability of DRAM to deterministically and precisely flip bits in Deep Neural Networks (DNN) model weights to affect inference accuracy. The existing defense mechanisms are… ▽ More

    Submitted 13 May, 2023; originally announced May 2023.

    Comments: 10 pages, 11 figures

  5. arXiv:2303.08581  [pdf, other

    cs.LG cs.CV

    Model Extraction Attacks on Split Federated Learning

    Authors: Jingtao Li, Adnan Siraj Rakin, Xing Chen, Li Yang, Zhezhi He, Deliang Fan, Chaitali Chakrabarti

    Abstract: Federated Learning (FL) is a popular collaborative learning scheme involving multiple clients and a server. FL focuses on protecting clients' data but turns out to be highly vulnerable to Intellectual Property (IP) threats. Since FL periodically collects and distributes the model parameters, a free-rider can download the latest model and thus steal model IP. Split Federated Learning (SFL), a recen… ▽ More

    Submitted 13 March, 2023; originally announced March 2023.

    Comments: Its Neurips Review is available at https://openreview.net/forum?id=vdxOesWgbyN

  6. arXiv:2205.04007  [pdf, other

    cs.LG

    ResSFL: A Resistance Transfer Framework for Defending Model Inversion Attack in Split Federated Learning

    Authors: Jingtao Li, Adnan Siraj Rakin, Xing Chen, Zhezhi He, Deliang Fan, Chaitali Chakrabarti

    Abstract: This work aims to tackle Model Inversion (MI) attack on Split Federated Learning (SFL). SFL is a recent distributed training scheme where multiple clients send intermediate activations (i.e., feature map), instead of raw data, to a central server. While such a scheme helps reduce the computational load at the client end, it opens itself to reconstruction of raw data from intermediate activation by… ▽ More

    Submitted 8 May, 2022; originally announced May 2022.

    Comments: Accepted to CVPR 2022

  7. arXiv:2111.04625  [pdf, other

    cs.CR cs.AI cs.CV cs.LG

    DeepSteal: Advanced Model Extractions Leveraging Efficient Weight Stealing in Memories

    Authors: Adnan Siraj Rakin, Md Hafizul Islam Chowdhuryy, Fan Yao, Deliang Fan

    Abstract: Recent advancements of Deep Neural Networks (DNNs) have seen widespread deployment in multiple security-sensitive domains. The need of resource-intensive training and use of valuable domain-specific training data have made these models a top intellectual property (IP) for model owners. One of the major threats to the DNN privacy is model extraction attacks where adversaries attempt to steal sensit… ▽ More

    Submitted 8 November, 2021; originally announced November 2021.

  8. NeurObfuscator: A Full-stack Obfuscation Tool to Mitigate Neural Architecture Stealing

    Authors: Jingtao Li, Zhezhi He, Adnan Siraj Rakin, Deliang Fan, Chaitali Chakrabarti

    Abstract: Neural network stealing attacks have posed grave threats to neural network model deployment. Such attacks can be launched by extracting neural architecture information, such as layer sequence and dimension parameters, through leaky side-channels. To mitigate such attacks, we propose NeurObfuscator, a full-stack obfuscation tool to obfuscate the neural network architecture while preserving its func… ▽ More

    Submitted 20 July, 2021; originally announced July 2021.

    Comments: Accepted by HOST 2021

  9. arXiv:2103.13813  [pdf, other

    cs.LG cs.CR cs.CV eess.IV

    RA-BNN: Constructing Robust & Accurate Binary Neural Network to Simultaneously Defend Adversarial Bit-Flip Attack and Improve Accuracy

    Authors: Adnan Siraj Rakin, Li Yang, Jingtao Li, Fan Yao, Chaitali Chakrabarti, Yu Cao, Jae-sun Seo, Deliang Fan

    Abstract: Recently developed adversarial weight attack, a.k.a. bit-flip attack (BFA), has shown enormous success in compromising Deep Neural Network (DNN) performance with an extremely small amount of model parameter perturbation. To defend against this threat, we propose RA-BNN that adopts a complete binary (i.e., for both weights and activation) neural network (BNN) to significantly improve DNN model robu… ▽ More

    Submitted 22 March, 2021; originally announced March 2021.

  10. RADAR: Run-time Adversarial Weight Attack Detection and Accuracy Recovery

    Authors: Jingtao Li, Adnan Siraj Rakin, Zhezhi He, Deliang Fan, Chaitali Chakrabarti

    Abstract: Adversarial attacks on Neural Network weights, such as the progressive bit-flip attack (PBFA), can cause a catastrophic degradation in accuracy by flipping a very small number of bits. Furthermore, PBFA can be conducted at run time on the weights stored in DRAM main memory. In this work, we propose RADAR, a Run-time adversarial weight Attack Detection and Accuracy Recovery scheme to protect DNN we… ▽ More

    Submitted 20 January, 2021; originally announced January 2021.

  11. arXiv:2012.01362  [pdf, other

    cs.CV

    $DA^3$:Dynamic Additive Attention Adaption for Memory-EfficientOn-Device Multi-Domain Learning

    Authors: Li Yang, Adnan Siraj Rakin, Deliang Fan

    Abstract: Nowadays, one practical limitation of deep neural network (DNN) is its high degree of specialization to a single task or domain (e.g., one visual domain). It motivates researchers to develop algorithms that can adapt DNN model to multiple domains sequentially, while still performing well on the past domains, which is known as multi-domain learning. Almost all conventional methods only focus on imp… ▽ More

    Submitted 6 October, 2021; v1 submitted 2 December, 2020; originally announced December 2020.

    Comments: 8 pages

  12. arXiv:2011.03006  [pdf, other

    cs.CR cs.CV

    Deep-Dup: An Adversarial Weight Duplication Attack Framework to Crush Deep Neural Network in Multi-Tenant FPGA

    Authors: Adnan Siraj Rakin, Yukui Luo, Xiaolin Xu, Deliang Fan

    Abstract: The wide deployment of Deep Neural Networks (DNN) in high-performance cloud computing platforms brought to light multi-tenant cloud field-programmable gate arrays (FPGA) as a popular choice of accelerator to boost performance due to its hardware reprogramming flexibility. Such a multi-tenant FPGA setup for DNN acceleration potentially exposes DNN interference tasks under severe threat from malicio… ▽ More

    Submitted 8 October, 2021; v1 submitted 5 November, 2020; originally announced November 2020.

  13. arXiv:2007.12336  [pdf, other

    cs.LG cs.CR stat.ML

    T-BFA: Targeted Bit-Flip Adversarial Weight Attack

    Authors: Adnan Siraj Rakin, Zhezhi He, Jingtao Li, Fan Yao, Chaitali Chakrabarti, Deliang Fan

    Abstract: Traditional Deep Neural Network (DNN) security is mostly related to the well-known adversarial input example attack. Recently, another dimension of adversarial attack, namely, attack on DNN weight parameters, has been shown to be very powerful. As a representative one, the Bit-Flip-based adversarial weight Attack (BFA) injects an extremely small amount of faults into weight parameters to hijack th… ▽ More

    Submitted 7 January, 2021; v1 submitted 23 July, 2020; originally announced July 2020.

  14. arXiv:2007.11693  [pdf, other

    cs.LG cs.CR cs.GT cs.IT stat.ML

    Robust Machine Learning via Privacy/Rate-Distortion Theory

    Authors: Ye Wang, Shuchin Aeron, Adnan Siraj Rakin, Toshiaki Koike-Akino, Pierre Moulin

    Abstract: Robust machine learning formulations have emerged to address the prevalent vulnerability of deep neural networks to adversarial examples. Our work draws the connection between optimal robust learning and the privacy-utility tradeoff problem, which is a generalization of the rate-distortion problem. The saddle point of the game between a robust classifier and an adversarial perturbation can be foun… ▽ More

    Submitted 18 May, 2021; v1 submitted 22 July, 2020; originally announced July 2020.

    Comments: 9 pages, 2 figures, accepted at 2021 IEEE International Symposium on Information Theory

  15. arXiv:2003.13746  [pdf

    cs.CR cs.LG

    DeepHammer: Depleting the Intelligence of Deep Neural Networks through Targeted Chain of Bit Flips

    Authors: Fan Yao, Adnan Siraj Rakin, Deliang Fan

    Abstract: Security of machine learning is increasingly becoming a major concern due to the ubiquitous deployment of deep learning in many security-sensitive domains. Many prior studies have shown external attacks such as adversarial examples that tamper with the integrity of DNNs using maliciously crafted inputs. However, the security implication of internal threats (i.e., hardware vulnerability) to DNN mod… ▽ More

    Submitted 30 March, 2020; originally announced March 2020.

  16. arXiv:1909.05193  [pdf, other

    cs.CR cs.LG cs.NE

    TBT: Targeted Neural Network Attack with Bit Trojan

    Authors: Adnan Siraj Rakin, Zhezhi He, Deliang Fan

    Abstract: Security of modern Deep Neural Networks (DNNs) is under severe scrutiny as the deployment of these models become widespread in many intelligence-based applications. Most recently, DNNs are attacked through Trojan which can effectively infect the model during the training phase and get activated only through specific input patterns (i.e, trigger) during inference. In this work, for the first time,… ▽ More

    Submitted 28 March, 2020; v1 submitted 10 September, 2019; originally announced September 2019.

  17. arXiv:1905.13074  [pdf, other

    cs.CV

    Robust Sparse Regularization: Simultaneously Optimizing Neural Network Robustness and Compactness

    Authors: Adnan Siraj Rakin, Zhezhi He, Li Yang, Yanzhi Wang, Liqiang Wang, Deliang Fan

    Abstract: Deep Neural Network (DNN) trained by the gradient descent method is known to be vulnerable to maliciously perturbed adversarial input, aka. adversarial attack. As one of the countermeasures against adversarial attack, increasing the model capacity for DNN robustness enhancement was discussed and reported as an effective approach by many recent works. In this work, we show that shrinking the model… ▽ More

    Submitted 30 May, 2019; originally announced May 2019.

  18. arXiv:1903.12269  [pdf, other

    cs.CV cs.CR

    Bit-Flip Attack: Crushing Neural Network with Progressive Bit Search

    Authors: Adnan Siraj Rakin, Zhezhi He, Deliang Fan

    Abstract: Several important security issues of Deep Neural Network (DNN) have been raised recently associated with different applications and components. The most widely investigated security concern of DNN is from its malicious input, a.k.a adversarial example. Nevertheless, the security challenge of DNN's parameters is not well explored yet. In this work, we are the first to propose a novel DNN weight att… ▽ More

    Submitted 7 April, 2019; v1 submitted 28 March, 2019; originally announced March 2019.

  19. arXiv:1811.09310  [pdf, other

    cs.LG cs.CR cs.CV

    Parametric Noise Injection: Trainable Randomness to Improve Deep Neural Network Robustness against Adversarial Attack

    Authors: Adnan Siraj Rakin, Zhezhi He, Deliang Fan

    Abstract: Recent development in the field of Deep Learning have exposed the underlying vulnerability of Deep Neural Network (DNN) against adversarial examples. In image classification, an adversarial example is a carefully modified image that is visually imperceptible to the original image but can cause DNN model to misclassify it. Training the network with Gaussian noise is an effective technique to perfor… ▽ More

    Submitted 22 November, 2018; originally announced November 2018.

  20. arXiv:1807.06714  [pdf, other

    cs.LG cs.CR cs.CV

    Defend Deep Neural Networks Against Adversarial Examples via Fixed and Dynamic Quantized Activation Functions

    Authors: Adnan Siraj Rakin, Jinfeng Yi, Boqing Gong, Deliang Fan

    Abstract: Recent studies have shown that deep neural networks (DNNs) are vulnerable to adversarial attacks. To this end, many defense approaches that attempt to improve the robustness of DNNs have been proposed. In a separate and yet related area, recent works have explored to quantize neural network weights and activation functions into low bit-width to compress model size and reduce computational complexi… ▽ More

    Submitted 18 December, 2019; v1 submitted 17 July, 2018; originally announced July 2018.

  21. arXiv:1802.01549  [pdf, other

    cs.LG cs.AI stat.ML

    Blind Pre-Processing: A Robust Defense Method Against Adversarial Examples

    Authors: Adnan Siraj Rakin, Zhezhi He, Boqing Gong, Deliang Fan

    Abstract: Deep learning algorithms and networks are vulnerable to perturbed inputs which is known as the adversarial attack. Many defense methodologies have been investigated to defend against such adversarial attack. In this work, we propose a novel methodology to defend the existing powerful attack model. We for the first time introduce a new attacking scheme for the attacker and set a practical constrain… ▽ More

    Submitted 7 February, 2018; v1 submitted 5 February, 2018; originally announced February 2018.