Show simple item record

Defending Model Extraction Attacks with Probabilistic Isolation

dc.contributor.advisorLeach, Kevin
dc.contributor.advisorHuang, Yu
dc.creatorBaxter, Hunter Christian
dc.date.accessioned2024-01-26T20:22:04Z
dc.date.available2024-01-26T20:22:04Z
dc.date.created2023-12
dc.date.issued2023-12-01
dc.date.submittedDecember 2023
dc.identifier.urihttp://hdl.handle.net/1803/18554
dc.description.abstractDeep Neural Networks (DNNs) are an essential intellectual property for companies providing Machine Learning as a Service (MLaaS) due to their exceptional capabilities in domains such as text generation, generative graphics, image recognition, and robotics. Due to their often-proprietary nature, the training datasets and model architectures are lucrative targets for malicious actors looking to violate user privacy, gain a competitive market advantage, or generate adversarial examples. This thesis presents Jigsaw, a deep learning defense framework that partitions computation of a DNN to different nodes in a datacenter to provide a moving target defense against model extraction attacks. The defense is based on the insight that partitioning DNN computation can improve latency, that modern large language models require operator parallelism to scale, and that side-channel attacks are already computationally demanding on a singular target, let alone multiple. Jigsaw employs a moving target defense strategy that uses probabilistic pseudo-isolation to decrease the time value of information necessary to launch a model extraction attack. By trading the strong privacy guarantees of trusted execution environments or data-oblivious computation for probabilistic pseudo-isolation, we can secure larger models with less performance sacrifices. We show that with Jigsaw, there is an increase in the resources and time required to successfully complete an attack, which allows time to detect malicious behavior through well-studied anomaly detection systems. To bound the performance impact within the large random partitioning space of a DNN, we use a genetic algorithm to identify candidate partition plans that maintain reasonably strong performance while also providing a sufficient reduction in the attacker's window of opportunity. By balancing security with performance, Jigsaw aims to provide MLaaS providers with a practical security solution that scales to current large models and anticipates the needs of tomorrow's technologies.
dc.format.mimetypeapplication/pdf
dc.language.isoen
dc.subjectComputer Security
dc.subjectDeep Learning
dc.titleDefending Model Extraction Attacks with Probabilistic Isolation
dc.typeThesis
dc.date.updated2024-01-26T20:22:04Z
dc.type.materialtext
thesis.degree.nameMS
thesis.degree.levelMasters
thesis.degree.disciplineComputer Science
thesis.degree.grantorVanderbilt University Graduate School
dc.creator.orcid0009-0006-4390-2364


Files in this item

Icon

This item appears in the following Collection(s)

Show simple item record