obfuscated gradients
play

Obfuscated Gradients Give a False Sense of Security: Circumventing - PowerPoint PPT Presentation

Obfuscated Gradients Give a False Sense of Security: Circumventing Defenses to Adversarial Examples Anish Athalye* 1 , Nicholas Carlini * 2 , and David Wagner 3 1 Massachusetts Institute of Technology 2 University of California, Berkeley (now


  1. Obfuscated Gradients Give a False Sense of Security: Circumventing Defenses to Adversarial Examples Anish Athalye* 1 , Nicholas Carlini * 2 , and David Wagner 3 1 Massachusetts Institute of Technology 2 University of California, Berkeley (now Google Brain) 3 University of California, Berkeley

  2. Or, Advice on performing adversarial example defense evaluations

  3. Adversarial Examples Definition 2: Definition 1: Given an input x, Inputs specifically find an input x' crafted to fool a that is misclassified neural network. such that |x-x'| < 𝜁 Not complete. Correct definition. Hard to formalize. Easy to formalize.

  4. Adversarial Examples Definition 1 Defn. 2

  5. 13 total defense papers at ICLR'18 9 are white-box, non-certified 6 of these are broken 
 (~0% accuracy) 1 of these is partially broken

  6. ~50% of our paper is our attacks

  7. ~50% of our paper is our attacks This talk is about the other 50%.

  8. This Talk: How should we evaluate 
 adversarial example defenses?

  9. 1. A precise threat model 2. A clear defense proposal 3. A thorough evaluation

  10. 1. Threat Model A threat model is a formal statement defining when a system is intended to be secure.

  11. 1. Threat Model What dataset is considered? Adversarial example definition? What does the attacker know? (model architecture? parameters? 
 training data? randomness?) If black-box: are queries allowed?

  12. All Possible Adversaries Threat Model

  13. All Possible Adversaries Threat Model

  14. 
 
 
 
 All Possible Adversaries 
 Threat Model

  15. Good Threat Model: "Robust when L 2 distortion is less than 5, given the attacker has white-box knowledge" Claim: 90% accuracy on ImageNet

  16. 
 2. Defense Proposal Precise proposal of one specific defense 
 (with code and models available)

  17. 3. Defense Evaluation A defense evaluation has one purpose, to answer: 
 "Is the defense secure under the threat model?"

  18. 3. Defense Evaluation acc, loss = model.evaluate( 
 Xtest, Ytest) Is no longer sufficient.

  19. 3. Defense Evaluation This step is why security is hard

  20. Serious effort 
 to evaluate 
 By space, most papers are ½ evaluation

  21. Going through the motions is insufficient to evaluate a defense to adversarial examples

  22. The purpose of a defense evaluation is NOT to show the defense is RIGHT

  23. The purpose of a defense evaluation is to FAIL to show the defense is WRONG

  24. Actionable advice requires specific, concrete examples Everything the following papers do is standard practice

  25. Perform an adaptive attack

  26. A "hold out" set is not an adaptive attack

  27. Stop using FGSM (exclusively)

  28. Use more than 100 (or 1000?) iteration of gradient descent

  29. Iterative attacks should always do better than single step attacks.

  30. Unbounded optimization attacks should eventually reach in 0% accuracy

  31. Unbounded optimization attacks should eventually reach in 0% accuracy

  32. Unbounded optimization attacks should eventually reach in 0% accuracy

  33. Model accuracy should be monotonically decreasing

  34. Model accuracy should be monotonically decreasing

  35. Evaluate against the worst attack

  36. Plot accuracy vs distortion

  37. Verify enough iterations of gradient descent

  38. Try gradient-free attack algorithms

  39. Conclusion The hardest part of a 
 defense is the evaluation

  40. Thank You Please do reach out to us if you have any evaluation questions Anish: aathalye@mit.edu Me: nicholas@carlini.com

Download Presentation
Download Policy: The content available on the website is offered to you 'AS IS' for your personal information and use only. It cannot be commercialized, licensed, or distributed on other websites without prior consent from the author. To download a presentation, simply click this link. If you encounter any difficulties during the download process, it's possible that the publisher has removed the file from their server.

Recommend


More recommend