Survey of Attacks and Defenses on Edge-Deployed Neural Networks
Deep Neural Network (DNN) workloads are quickly moving from datacenters onto edge devices, for latency, privacy, or energy reasons. While datacenter networks can be protected using conventional cybersecurity measures, edge neural networks bring a host of new security challenges. Unlike classic IoT a...
Saved in:
Published in: | 2019 IEEE High Performance Extreme Computing Conference (HPEC) pp. 1 - 8 |
---|---|
Main Authors: | , , , |
Format: | Conference Proceeding |
Language: | English |
Published: |
IEEE
01-09-2019
|
Subjects: | |
Online Access: | Get full text |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Abstract | Deep Neural Network (DNN) workloads are quickly moving from datacenters onto edge devices, for latency, privacy, or energy reasons. While datacenter networks can be protected using conventional cybersecurity measures, edge neural networks bring a host of new security challenges. Unlike classic IoT applications, edge neural networks are typically very compute and memory intensive, their execution is data-independent, and they are robust to noise and faults. Neural network models may be very expensive to develop, and can potentially reveal information about the private data they were trained on, requiring special care in distribution. The hidden states and outputs of the network can also be used in reconstructing user inputs, potentially violating users' privacy. Furthermore, neural networks are vulnerable to adversarial attacks, which may cause misclassifications and violate the integrity of the output. These properties add challenges when securing edge-deployed DNNs, requiring new considerations, threat models, priorities, and approaches in securely and privately deploying DNNs to the edge. In this work, we cover the landscape of attacks on, and defenses, of neural networks deployed in edge devices and provide a taxonomy of attacks and defenses targeting edge DNNs. |
---|---|
AbstractList | Deep Neural Network (DNN) workloads are quickly moving from datacenters onto edge devices, for latency, privacy, or energy reasons. While datacenter networks can be protected using conventional cybersecurity measures, edge neural networks bring a host of new security challenges. Unlike classic IoT applications, edge neural networks are typically very compute and memory intensive, their execution is data-independent, and they are robust to noise and faults. Neural network models may be very expensive to develop, and can potentially reveal information about the private data they were trained on, requiring special care in distribution. The hidden states and outputs of the network can also be used in reconstructing user inputs, potentially violating users' privacy. Furthermore, neural networks are vulnerable to adversarial attacks, which may cause misclassifications and violate the integrity of the output. These properties add challenges when securing edge-deployed DNNs, requiring new considerations, threat models, priorities, and approaches in securely and privately deploying DNNs to the edge. In this work, we cover the landscape of attacks on, and defenses, of neural networks deployed in edge devices and provide a taxonomy of attacks and defenses targeting edge DNNs. |
Author | Isakov, Mihailo Gadepally, Vijay Kinsy, Michel A. Gettings, Karen M. |
Author_xml | – sequence: 1 givenname: Mihailo surname: Isakov fullname: Isakov, Mihailo organization: Adaptive and Secure Computing Systems (ASCS) Laboratory,Boston,MA – sequence: 2 givenname: Vijay surname: Gadepally fullname: Gadepally, Vijay organization: MIT Lincoln Laboratory,Boston,MA – sequence: 3 givenname: Karen M. surname: Gettings fullname: Gettings, Karen M. organization: MIT Lincoln Laboratory,Boston,MA – sequence: 4 givenname: Michel A. surname: Kinsy fullname: Kinsy, Michel A. organization: Adaptive and Secure Computing Systems (ASCS) Laboratory,Boston,MA |
BookMark | eNotj8tKw0AUQEdRsK39AHEzP5A4N5N5raS00QpFBXVd5nFHQmNSMqklf2_Brs7mcOBMyVXbtUjIHbAcgJmH9Xu1zAsGJtcGpABzQaagCg2CFUxckkkhS56BUXBD5inVjgmutBbCTMjjx6H_xZF2kS6GwfpdorYNdIUR24SJdi2twjdmK9w33YiBvuKht80Jw7Hrd-mWXEfbJJyfOSNfT9Xncp1t3p5flotNVheMD5m0XmEEq8CVxoBHx8CiAl96FyBGHZkEZ5gsGaBxygUpmPBBI3dwcviM3P93a0Tc7vv6x_bj9vzL_wBOiktF |
ContentType | Conference Proceeding |
DBID | 6IE 6IL CBEJK RIE RIL |
DOI | 10.1109/HPEC.2019.8916519 |
DatabaseName | IEEE Electronic Library (IEL) Conference Proceedings IEEE Proceedings Order Plan All Online (POP All Online) 1998-present by volume IEEE Xplore All Conference Proceedings IEEE Electronic Library Online IEEE Proceedings Order Plans (POP All) 1998-Present |
DatabaseTitleList | |
Database_xml | – sequence: 1 dbid: RIE name: IEEE Electronic Library Online url: http://ieeexplore.ieee.org/Xplore/DynWel.jsp sourceTypes: Publisher |
DeliveryMethod | fulltext_linktorsrc |
EISBN | 1728150205 9781728150208 |
EISSN | 2643-1971 |
EndPage | 8 |
ExternalDocumentID | 8916519 |
Genre | orig-research |
GroupedDBID | 6IE 6IL 6IN ABLEC ADZIZ BEFXN BFFAM BGNUA BKEBE BPEOZ CBEJK CHZPO IEGSK OCL RIE RIL |
ID | FETCH-LOGICAL-i203t-6ac7ef1a71b4991ceb01ae71c4cbd1ff8f061b906401e9b7bd6505cd8e3b14cb3 |
IEDL.DBID | RIE |
IngestDate | Wed Jun 26 19:27:53 EDT 2024 |
IsPeerReviewed | false |
IsScholarly | false |
Language | English |
LinkModel | DirectLink |
MergedId | FETCHMERGED-LOGICAL-i203t-6ac7ef1a71b4991ceb01ae71c4cbd1ff8f061b906401e9b7bd6505cd8e3b14cb3 |
PageCount | 8 |
ParticipantIDs | ieee_primary_8916519 |
PublicationCentury | 2000 |
PublicationDate | 2019-Sept. |
PublicationDateYYYYMMDD | 2019-09-01 |
PublicationDate_xml | – month: 09 year: 2019 text: 2019-Sept. |
PublicationDecade | 2010 |
PublicationTitle | 2019 IEEE High Performance Extreme Computing Conference (HPEC) |
PublicationTitleAbbrev | HPEC |
PublicationYear | 2019 |
Publisher | IEEE |
Publisher_xml | – name: IEEE |
SSID | ssib053788559 ssib042470034 |
Score | 1.9187148 |
Snippet | Deep Neural Network (DNN) workloads are quickly moving from datacenters onto edge devices, for latency, privacy, or energy reasons. While datacenter networks... |
SourceID | ieee |
SourceType | Publisher |
StartPage | 1 |
SubjectTerms | Data models Data privacy Internet of Things Mathematical model Neural networks security Software Taxonomy Training |
Title | Survey of Attacks and Defenses on Edge-Deployed Neural Networks |
URI | https://ieeexplore.ieee.org/document/8916519 |
hasFullText | 1 |
inHoldings | 1 |
isFullTextHit | |
isPrint | |
link | http://sdu.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwlV3PS8MwFA66kyeVTfxNDh6Na9asSY6ydewkAxW8jaR5EUFa2VrB_9732m0iePHUtITSpAnve3nf-x5jN9YhaAgKN5KBVCiwSlglg0BvyGdBpqQZTkcXj_rhxUxzksm53eXCAEBLPoM7arax_FAVDR2VDQ1imTFpfO5ra7pcre3aUSOlSWtlez8mnXREy5tApkzscL7IJ8TlwsXRvedXQZXWnswO__clR2zwk5jHFzuTc8z2oOwj3m5Wn_DFq8jv65py5rkrA59CRBcV1rwqeR5eQUyhLe4bOAlyuHe8tAzw9YA9z_KnyVxs6iKIt1GS1iJzhYYonZYe_RVZgE-kAy0LVfggYzQRjbS3FKOTYL32AWEYiQBA6iX2SU9Yr6xKOGVcmiwodBJS3MsqZsEQEyYZOefRDbEhOWN9Gvzyo5O-WG7Gff734wt2QPPbUbAuWa9eNXDF9tehuW5_1jctC5Jo |
link.rule.ids | 310,311,782,786,791,792,798,23939,23940,25149,27934,54767 |
linkProvider | IEEE |
linkToHtml | http://sdu.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwlV3PS8MwFA46D3pS2cTf5uDRumZNm-YoW8fEOQZO8DaS5lUEaWVrBf9732u3ieDFU9MSSpMmvO_lfe97jF1rg6DBSdxIMQSeBC09LYXz0BuykRMBaYbT0cWTmrzEg4Rkcm42uTAAUJPP4JaadSzfFWlFR2XdGLFMSBqfO6FUkWqytdarR_akIrWV9X1ISumIl1ehTOHr7mia9InNhcujedOvkiq1RRnu_-9bDljnJzWPTzdG55BtQd5GxF0tPuGLFxm_K0vKmucmd3wAGTqpsORFzhP3Ct4A6vK-jpMkh3nHS80BX3bY8zCZ9UfeqjKC99bzg9KLTKogE0YJix6LSMH6woASqUytE1kWZ2imraYonQBtlXUIxEgGAAIrsE9wxFp5kcMx4yKOnEQ3IcDdLLPIxcSF8XvGWHREtPNPWJsGP_9oxC_mq3Gf_v34iu2OZo_j-fh-8nDG9miuG0LWOWuViwou2PbSVZf1j_sGFoqVuQ |
openUrl | ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=proceeding&rft.title=2019+IEEE+High+Performance+Extreme+Computing+Conference+%28HPEC%29&rft.atitle=Survey+of+Attacks+and+Defenses+on+Edge-Deployed+Neural+Networks&rft.au=Isakov%2C+Mihailo&rft.au=Gadepally%2C+Vijay&rft.au=Gettings%2C+Karen+M.&rft.au=Kinsy%2C+Michel+A.&rft.date=2019-09-01&rft.pub=IEEE&rft.eissn=2643-1971&rft.spage=1&rft.epage=8&rft_id=info:doi/10.1109%2FHPEC.2019.8916519&rft.externalDocID=8916519 |