4.8 Article

T-BFA: Targeted Bit-Flip Adversarial Weight Attack

出版社

IEEE COMPUTER SOC
DOI: 10.1109/TPAMI.2021.3112932

关键词

Computational modeling; Random access memory; Computer security; Training; Quantization (signal); Data models; Memory management; Deep learning; security; targeted weight attack; bit-flip

资金

  1. National Science Foundation [1931871, 2019548, 2019536]
  2. Division Of Computer and Network Systems
  3. Direct For Computer & Info Scie & Enginr [2019548, 2019536] Funding Source: National Science Foundation

向作者/读者索取更多资源

Traditional DNN security has focused on adversarial input example attacks, but this paper introduces a novel adversarial weight attack. By injecting small faults into weight parameters, this attack can intentionally mislead selected inputs to a target output class with high success rate.
Traditional Deep Neural Network (DNN) security is mostly related to the well-known adversarial input example attack. Recently, another dimension of adversarial attack, namely, attack on DNN weight parameters, has been shown to be very powerful. As a representative one, the Bit-Flip-based adversarial weight Attack (BFA) injects an extremely small amount of faults into weight parameters to hijack the executing DNN function. Prior works of BFA focus on un-targeted attack that can hack all inputs into a random output class by flipping a very small number of weight bits stored in computer memory. This paper proposes the first work of targeted BFA based (T-BFA) adversarial weight attack on DNNs, which can intentionally mislead selected inputs to a target output class. The objective is achieved by identifying the weight bits that are highly associated with classification of a targeted output through a class-dependent vulnerable weight bit searching algorithm. Our proposed T-BFA performance is successfully demonstrated on multiple DNN architectures for image classification tasks. For example, by merely flipping 27 out of 88 million weight bits of ResNet-18, our T-BFA can misclassify all the images from 'Hen' class into 'Goose' class (i.e., 100% attack success rate) in ImageNet dataset, while maintaining 59.35% validation accuracy. Moreover, we successfully demonstrate our T-BFA attack in a real computer prototype system running DNN computation, with Ivy Bridge-based Intel i7 CPU and 8GB DDR3 memory.

作者

我是这篇论文的作者
点击您的名字以认领此论文并将其添加到您的个人资料中。

评论

主要评分

4.8
评分不足

次要评分

新颖性
-
重要性
-
科学严谨性
-
评价这篇论文

推荐

暂无数据
暂无数据