Survey of Attacks and Defenses on Edge-Deployed Neural Networks

Deep Neural Network (DNN) workloads are quickly moving from datacenters onto edge devices, for latency, privacy, or energy reasons. While datacenter networks can be protected using conventional cybersecurity measures, edge neural networks bring a host of new security challenges. Unlike classic IoT a...

Full description

Saved in:
Bibliographic Details
Published in:2019 IEEE High Performance Extreme Computing Conference (HPEC) pp. 1 - 8
Main Authors: Isakov, Mihailo, Gadepally, Vijay, Gettings, Karen M., Kinsy, Michel A.
Format: Conference Proceeding
Language:English
Published: IEEE 01-09-2019
Subjects:
Online Access:Get full text
Tags: Add Tag
No Tags, Be the first to tag this record!
Abstract Deep Neural Network (DNN) workloads are quickly moving from datacenters onto edge devices, for latency, privacy, or energy reasons. While datacenter networks can be protected using conventional cybersecurity measures, edge neural networks bring a host of new security challenges. Unlike classic IoT applications, edge neural networks are typically very compute and memory intensive, their execution is data-independent, and they are robust to noise and faults. Neural network models may be very expensive to develop, and can potentially reveal information about the private data they were trained on, requiring special care in distribution. The hidden states and outputs of the network can also be used in reconstructing user inputs, potentially violating users' privacy. Furthermore, neural networks are vulnerable to adversarial attacks, which may cause misclassifications and violate the integrity of the output. These properties add challenges when securing edge-deployed DNNs, requiring new considerations, threat models, priorities, and approaches in securely and privately deploying DNNs to the edge. In this work, we cover the landscape of attacks on, and defenses, of neural networks deployed in edge devices and provide a taxonomy of attacks and defenses targeting edge DNNs.
AbstractList Deep Neural Network (DNN) workloads are quickly moving from datacenters onto edge devices, for latency, privacy, or energy reasons. While datacenter networks can be protected using conventional cybersecurity measures, edge neural networks bring a host of new security challenges. Unlike classic IoT applications, edge neural networks are typically very compute and memory intensive, their execution is data-independent, and they are robust to noise and faults. Neural network models may be very expensive to develop, and can potentially reveal information about the private data they were trained on, requiring special care in distribution. The hidden states and outputs of the network can also be used in reconstructing user inputs, potentially violating users' privacy. Furthermore, neural networks are vulnerable to adversarial attacks, which may cause misclassifications and violate the integrity of the output. These properties add challenges when securing edge-deployed DNNs, requiring new considerations, threat models, priorities, and approaches in securely and privately deploying DNNs to the edge. In this work, we cover the landscape of attacks on, and defenses, of neural networks deployed in edge devices and provide a taxonomy of attacks and defenses targeting edge DNNs.
Author Isakov, Mihailo
Gadepally, Vijay
Kinsy, Michel A.
Gettings, Karen M.
Author_xml – sequence: 1
  givenname: Mihailo
  surname: Isakov
  fullname: Isakov, Mihailo
  organization: Adaptive and Secure Computing Systems (ASCS) Laboratory,Boston,MA
– sequence: 2
  givenname: Vijay
  surname: Gadepally
  fullname: Gadepally, Vijay
  organization: MIT Lincoln Laboratory,Boston,MA
– sequence: 3
  givenname: Karen M.
  surname: Gettings
  fullname: Gettings, Karen M.
  organization: MIT Lincoln Laboratory,Boston,MA
– sequence: 4
  givenname: Michel A.
  surname: Kinsy
  fullname: Kinsy, Michel A.
  organization: Adaptive and Secure Computing Systems (ASCS) Laboratory,Boston,MA
BookMark eNotj8tKw0AUQEdRsK39AHEzP5A4N5N5raS00QpFBXVd5nFHQmNSMqklf2_Brs7mcOBMyVXbtUjIHbAcgJmH9Xu1zAsGJtcGpABzQaagCg2CFUxckkkhS56BUXBD5inVjgmutBbCTMjjx6H_xZF2kS6GwfpdorYNdIUR24SJdi2twjdmK9w33YiBvuKht80Jw7Hrd-mWXEfbJJyfOSNfT9Xncp1t3p5flotNVheMD5m0XmEEq8CVxoBHx8CiAl96FyBGHZkEZ5gsGaBxygUpmPBBI3dwcviM3P93a0Tc7vv6x_bj9vzL_wBOiktF
ContentType Conference Proceeding
DBID 6IE
6IL
CBEJK
RIE
RIL
DOI 10.1109/HPEC.2019.8916519
DatabaseName IEEE Electronic Library (IEL) Conference Proceedings
IEEE Proceedings Order Plan All Online (POP All Online) 1998-present by volume
IEEE Xplore All Conference Proceedings
IEEE Electronic Library Online
IEEE Proceedings Order Plans (POP All) 1998-Present
DatabaseTitleList
Database_xml – sequence: 1
  dbid: RIE
  name: IEEE Electronic Library Online
  url: http://ieeexplore.ieee.org/Xplore/DynWel.jsp
  sourceTypes: Publisher
DeliveryMethod fulltext_linktorsrc
EISBN 1728150205
9781728150208
EISSN 2643-1971
EndPage 8
ExternalDocumentID 8916519
Genre orig-research
GroupedDBID 6IE
6IL
6IN
ABLEC
ADZIZ
BEFXN
BFFAM
BGNUA
BKEBE
BPEOZ
CBEJK
CHZPO
IEGSK
OCL
RIE
RIL
ID FETCH-LOGICAL-i203t-6ac7ef1a71b4991ceb01ae71c4cbd1ff8f061b906401e9b7bd6505cd8e3b14cb3
IEDL.DBID RIE
IngestDate Wed Jun 26 19:27:53 EDT 2024
IsPeerReviewed false
IsScholarly false
Language English
LinkModel DirectLink
MergedId FETCHMERGED-LOGICAL-i203t-6ac7ef1a71b4991ceb01ae71c4cbd1ff8f061b906401e9b7bd6505cd8e3b14cb3
PageCount 8
ParticipantIDs ieee_primary_8916519
PublicationCentury 2000
PublicationDate 2019-Sept.
PublicationDateYYYYMMDD 2019-09-01
PublicationDate_xml – month: 09
  year: 2019
  text: 2019-Sept.
PublicationDecade 2010
PublicationTitle 2019 IEEE High Performance Extreme Computing Conference (HPEC)
PublicationTitleAbbrev HPEC
PublicationYear 2019
Publisher IEEE
Publisher_xml – name: IEEE
SSID ssib053788559
ssib042470034
Score 1.9187148
Snippet Deep Neural Network (DNN) workloads are quickly moving from datacenters onto edge devices, for latency, privacy, or energy reasons. While datacenter networks...
SourceID ieee
SourceType Publisher
StartPage 1
SubjectTerms Data models
Data privacy
Internet of Things
Mathematical model
Neural networks
security
Software
Taxonomy
Training
Title Survey of Attacks and Defenses on Edge-Deployed Neural Networks
URI https://ieeexplore.ieee.org/document/8916519
hasFullText 1
inHoldings 1
isFullTextHit
isPrint
link http://sdu.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwlV3PS8MwFA66kyeVTfxNDh6Na9asSY6ydewkAxW8jaR5EUFa2VrB_9732m0iePHUtITSpAnve3nf-x5jN9YhaAgKN5KBVCiwSlglg0BvyGdBpqQZTkcXj_rhxUxzksm53eXCAEBLPoM7arax_FAVDR2VDQ1imTFpfO5ra7pcre3aUSOlSWtlez8mnXREy5tApkzscL7IJ8TlwsXRvedXQZXWnswO__clR2zwk5jHFzuTc8z2oOwj3m5Wn_DFq8jv65py5rkrA59CRBcV1rwqeR5eQUyhLe4bOAlyuHe8tAzw9YA9z_KnyVxs6iKIt1GS1iJzhYYonZYe_RVZgE-kAy0LVfggYzQRjbS3FKOTYL32AWEYiQBA6iX2SU9Yr6xKOGVcmiwodBJS3MsqZsEQEyYZOefRDbEhOWN9Gvzyo5O-WG7Gff734wt2QPPbUbAuWa9eNXDF9tehuW5_1jctC5Jo
link.rule.ids 310,311,782,786,791,792,798,23939,23940,25149,27934,54767
linkProvider IEEE
linkToHtml http://sdu.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwlV3PS8MwFA46D3pS2cTf5uDRumZNm-YoW8fEOQZO8DaS5lUEaWVrBf9732u3ieDFU9MSSpMmvO_lfe97jF1rg6DBSdxIMQSeBC09LYXz0BuykRMBaYbT0cWTmrzEg4Rkcm42uTAAUJPP4JaadSzfFWlFR2XdGLFMSBqfO6FUkWqytdarR_akIrWV9X1ISumIl1ehTOHr7mia9InNhcujedOvkiq1RRnu_-9bDljnJzWPTzdG55BtQd5GxF0tPuGLFxm_K0vKmucmd3wAGTqpsORFzhP3Ct4A6vK-jpMkh3nHS80BX3bY8zCZ9UfeqjKC99bzg9KLTKogE0YJix6LSMH6woASqUytE1kWZ2imraYonQBtlXUIxEgGAAIrsE9wxFp5kcMx4yKOnEQ3IcDdLLPIxcSF8XvGWHREtPNPWJsGP_9oxC_mq3Gf_v34iu2OZo_j-fh-8nDG9miuG0LWOWuViwou2PbSVZf1j_sGFoqVuQ
openUrl ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=proceeding&rft.title=2019+IEEE+High+Performance+Extreme+Computing+Conference+%28HPEC%29&rft.atitle=Survey+of+Attacks+and+Defenses+on+Edge-Deployed+Neural+Networks&rft.au=Isakov%2C+Mihailo&rft.au=Gadepally%2C+Vijay&rft.au=Gettings%2C+Karen+M.&rft.au=Kinsy%2C+Michel+A.&rft.date=2019-09-01&rft.pub=IEEE&rft.eissn=2643-1971&rft.spage=1&rft.epage=8&rft_id=info:doi/10.1109%2FHPEC.2019.8916519&rft.externalDocID=8916519