universal multi party poisoning attacks
play

Universal Multi-Party Poisoning Attacks Saeed Mahloujifar Mohammad - PowerPoint PPT Presentation

Universal Multi-Party Poisoning Attacks Saeed Mahloujifar Mohammad Mahmoody Ameer Mohammed Multi-Party Learning Distributions Data Providers 1 1 Model Multi-Party Learning (Round j) Distributions


  1. Universal Multi-Party Poisoning Attacks Saeed Mahloujifar Mohammad Mahmoody Ameer Mohammed

  2. Multi-Party Learning Distributions Data Providers šø 1 š‘„ 1 Model š» šø š‘œ š‘„ š‘œ

  3. Multi-Party Learning (Round j) Distributions Data Providers šø 1 š‘„ 1 š» šø š‘— š‘„ š‘— Model jāˆ’1 šø š‘œ š‘„ š‘œ

  4. Multi-Party Learning (Round j) Distributions Data Providers šø 1 š‘„ 1 š» šø š‘— š‘„ š‘— Model jāˆ’1 šø š‘œ š‘„ š‘œ

  5. Multi-Party Learning (Round j) Distributions Data Providers šø 1 š‘„ 1 š‘£ š‘˜ š‘’ š‘˜ š» šø š‘— š‘„ š‘— Model jāˆ’1 šø š‘œ š‘„ š‘œ

  6. Multi-Party Learning (Round j) Distributions Data Providers šø 1 š‘„ 1 š‘£ š‘˜ š‘’ š‘˜ Model j š» šø š‘— š‘„ š‘— Model jāˆ’1 šø š‘œ š‘„ š‘œ

  7. Multi-Party Learning (Round j) Distributions Data Providers šø 1 š‘„ 1 Model j Model j Model j š» Model j šø š‘— š‘„ š‘— Model j Model j Model jāˆ’1 šø š‘œ š‘„ š‘œ

  8. Poisoning in Multi-Party Learning Distributions Data Providers An adversary (partially) controls a šø 1 š‘„ number of data providers 1 Model š» šø š‘— š‘„ š‘— šø š‘œ š‘„ š‘œ

  9. (š‘™, š‘Ÿ) -Poisoning Attack Model š‘™ (out of š‘œ ) of the parties become corrupted šø š‘— š‘„ š‘— Each corrupted party š‘„ š‘— samples from a different distribution š‘’ , ā‰¤ š‘Ÿ šø š‘— šø š‘— š‘™ = š‘œ ā†’ š‘Ÿ -Tampering [ACMPS14] [MM17] [MM18] š‘Ÿ = 1 ā†’ Static Corruption in MPC (crypto)

  10. What is the inherent power of š‘™, š‘Ÿ -poisoning adversaries against Multi-party Learning?

  11. Main Theorem: Power of š‘™, š‘Ÿ -Poisoning Let š¶ be a bad property of the model š‘ ā€¢ E.g. š¶(š‘) = 1 if š‘ misclassified an specific instance š‘¦ For any š‘œ -party learning protocol there is a š‘™, š‘Ÿ -poisoning adversary that increases Pr[š¶] from šœ— ā†’ šœ— 1āˆ’ š‘™š‘Ÿ š‘œ

  12. Main Theorem: Power of š‘™, š‘Ÿ -Poisoning Let š¶ be a bad property of the model š‘ ā€¢ E.g. š¶(š‘) = 1 if š‘ misclassified an specific instance š‘¦ For any š‘œ -party learning protocol there is a š‘™, š‘Ÿ -poisoning adversary that increases Pr[š¶] from šœ— ā†’ šœ— 1āˆ’ š‘™š‘Ÿ š‘œ Pr[š¶] Before attack š’“ š’ Pr[š¶] after attack 5% 1/2 š‘œ/2 11% 5% 1/2 š‘œ 22% 5% 1 š‘œ/2 22%

  13. Features of Attack ā€¢ Universal: provably work against any learning protocol ā€¢ In contrast with: [Bagdasaryan et al 2018; Bhagoji et al. 2018] ā€¢ Clean label: Only uses correct labels ā€¢ Similar to: [M et al 2017; Shafahi et al 2018] ā€¢ Polynomial time ā€¢ Similar to: [M and Mahmoody 2019]

  14. Ideas Behind Attack ā€¢ Main Idea: Treat protocol as random process and run a biasing attack ā€¢ The bad property is a function over the random process ā€¢ We want to bias that function, similar to attacks in coin tossing

  15. Ideas Behind Attack ā€¢ Main Idea: Treat protocol as random process and run a biasing attack ā€¢ The bad property is a function over the random process ā€¢ We want to bias that function, similar to attacks in coin tossing ā€¢ New biasing model: Generalized š‘ž -Tampering.

  16. Ideas Behind Attack ā€¢ Main Idea: Treat protocol as random process and run a biasing attack ā€¢ The bad property is a function over the random process ā€¢ We want to bias that function, similar to attacks in coin tossing ā€¢ New biasing model: Generalized š‘ž -Tampering. Let š‘” āˆ¶ š‘‰ 1 , ā€¦ , š‘‰ š‘œ ā†’ {0,1}

  17. Ideas Behind Attack ā€¢ Main Idea: Treat protocol as random process and run a biasing attack ā€¢ The bad property is a function over the random process ā€¢ We want to bias that function, similar to attacks in coin tossing ā€¢ New biasing model: Generalized š‘ž -Tampering. Let š‘” āˆ¶ š‘‰ 1 , ā€¦ , š‘‰ š‘œ ā†’ {0,1} Input blocks š‘£ 1 , š‘£ 2 , ā€¦ š‘£ š‘œ are sampled one-by one in online way:

  18. Ideas Behind Attack ā€¢ Main Idea: Treat protocol as random process and run a biasing attack ā€¢ The bad property is a function over the random process ā€¢ We want to bias that function, similar to attacks in coin tossing ā€¢ New biasing model: Generalized š‘ž -Tampering. Let š‘” āˆ¶ š‘‰ 1 , ā€¦ , š‘‰ š‘œ ā†’ {0,1} Input blocks š‘£ 1 , š‘£ 2 , ā€¦ š‘£ š‘œ are sampled one-by one in online way: š‘‰ š‘— with marginal probability 1 āˆ’ š‘ž š‘£ š‘— = į‰Š with marginal probability š‘ž

  19. Ideas Behind Attack ā€¢ Main Idea: Treat protocol as random process and run a biasing attack ā€¢ The bad property is a function over the random process ā€¢ We want to bias that function, similar to attacks in coin tossing ā€¢ New biasing model: Generalized š‘ž -Tampering. Let š‘” āˆ¶ š‘‰ 1 , ā€¦ , š‘‰ š‘œ ā†’ {0,1} Input blocks š‘£ 1 , š‘£ 2 , ā€¦ š‘£ š‘œ are sampled one-by one in online way: š‘‰ š‘— with marginal probability 1 āˆ’ š‘ž š‘£ š‘— = į‰Š with marginal probability š‘ž Our generalized p-tampering attack based on Ideas in coin tossing attacks [BOL89,IH14]

  20. Summary We show Poisoning attacks against multi-party learning protocols: ā€¢ Universal: Provably apply to any multi-party learning protocol ā€¢ Clean label: Only uses samples with correct labels ā€¢ Run in polynomial time Poster #160 ā€¢ Increase the probability of any chosen bad property

Download Presentation
Download Policy: The content available on the website is offered to you 'AS IS' for your personal information and use only. It cannot be commercialized, licensed, or distributed on other websites without prior consent from the author. To download a presentation, simply click this link. If you encounter any difficulties during the download process, it's possible that the publisher has removed the file from their server.

Recommend


More recommend