the state of physical attacks on deep learning systems · lujo bauer mila jovovich (87%) sharif et...

10
The State of Physical Attacks on Deep Learning Systems Earlence Fernandes Collaborators: Ivan Evtimov, Kevin Eykholt, Chaowei Xiao, Amir Rahmati, Florian Tramer, Bo Li, Atul Prakash, Tadayoshi Kohno, Dawn Song

Upload: others

Post on 06-Jul-2020

1 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: The State of Physical Attacks on Deep Learning Systems · Lujo Bauer Mila Jovovich (87%) Sharif et al., Accessorize to a Crime: Real and Stealthy Attacks on State-of-the-Art Face

TheStateofPhysicalAttacksonDeepLearningSystems

EarlenceFernandes

Collaborators:IvanEvtimov,KevinEykholt,Chaowei Xiao,AmirRahmati,FlorianTramer,BoLi,AtulPrakash,Tadayoshi Kohno,DawnSong

Page 2: The State of Physical Attacks on Deep Learning Systems · Lujo Bauer Mila Jovovich (87%) Sharif et al., Accessorize to a Crime: Real and Stealthy Attacks on State-of-the-Art Face

ImagerecognitionObjectdetection

ScenesegmentationDNAvariantcalling

GameplayingSpeechrecognition

Re-enactingpoliticiansColorizingphotosPoseestimationDescribingphotosGeneratingphotos

TranslationMusiccompositions

CreatingartCreatingDNNs

PredictingearthquakesParticlephysics

QuantumchemistryRecommendationsCreatingfakenewsFightingfakenews

NLPAutomatedSurveillance

Page 3: The State of Physical Attacks on Deep Learning Systems · Lujo Bauer Mila Jovovich (87%) Sharif et al., Accessorize to a Crime: Real and Stealthy Attacks on State-of-the-Art Face

DeepLearning+Cyber-PhysicalSystems

AirborneCollisionAvoidanceSystemXunmanned(ACASXu)

Apollo(Baidu)Self-DrivingCar

Page 4: The State of Physical Attacks on Deep Learning Systems · Lujo Bauer Mila Jovovich (87%) Sharif et al., Accessorize to a Crime: Real and Stealthy Attacks on State-of-the-Art Face

TheGibbon-ImpersonatingPandaaka,AdversarialExamples

“panda”57.7%confidence

“gibbon”99.3%confidence

ImageCredit:OpenAI

=+ ε

ExplainingandHarnessingAdversarialExamples,Goodfellow etal.,arXiv 1412.6572,2015

But,anattackerrequirespixel-leveldigitalaccesstothemodel’sinput

Page 5: The State of Physical Attacks on Deep Learning Systems · Lujo Bauer Mila Jovovich (87%) Sharif et al., Accessorize to a Crime: Real and Stealthy Attacks on State-of-the-Art Face

Howcanattackerscreatephysicalattacks?

Page 6: The State of Physical Attacks on Deep Learning Systems · Lujo Bauer Mila Jovovich (87%) Sharif et al., Accessorize to a Crime: Real and Stealthy Attacks on State-of-the-Art Face

ACompendiumofPhysicalAttacksPrintingoutadigitallycreatedadversarialexampleworks,butislessrobusttoenvironmentalconditions

Printedpatternsoneyeglass-shapedcut-outscancompromisefacerecognition

clean adversarial

Kurakin etal.,AdversarialExamplesinthePhysicalWorld,arXiv 1607.02533,2016

FastGradientSignMethod(FGSM)approach

Lujo Bauer MilaJovovich(87%)

Sharifetal.,AccessorizetoaCrime:RealandStealthyAttacksonState-of-the-ArtFaceRecognition,CCS2016

Optimizationapproach

Page 7: The State of Physical Attacks on Deep Learning Systems · Lujo Bauer Mila Jovovich (87%) Sharif et al., Accessorize to a Crime: Real and Stealthy Attacks on State-of-the-Art Face

ACompendiumofPhysicalAttacksStickersonStopsignscanfoolobjectclassifiersand

detectorsinarangeofphysicalconditions

Optimizationapproach

Eykholt etal.,RobustPhysical-WorldAttacksonDeepLearningVisualClassification,CVPR2018

Eykholt etal.,PhysicalAdversarialExamplesforObjectDetectors,WOOT2018

Mywork

Chenetal.,RobustPhysicalAdversarialAttackonFaster-RCNNObjectDetector,arXiv 1804.05810,2018

AttackerscanbackdoorDNNssothatspecialstickerscausespecificbehavior

Training-timeattack

Guetal.,BadNets:IdentifyingVulnerabilitiesintheMachineLearningModelSupplyChain,arXiv1708.06733,2017

Page 8: The State of Physical Attacks on Deep Learning Systems · Lujo Bauer Mila Jovovich (87%) Sharif et al., Accessorize to a Crime: Real and Stealthy Attacks on State-of-the-Art Face

ACompendiumofPhysicalAttacks3Dprintedturtlescanberiflestoastate-of-the-artclassifier

AdversarialExamplescanhideinmusic

Patchesthatcamouflageanyobjectasatoasterexist

Athalye etal.,SynthesizingRobustAdversarialExamples,ICML2018

Expectation-over-Transformationsapproach(optimization)

Expectation-over-Transformationsapproach(optimization)

Brownetal.,AdversarialPatch,arXiv 1712.09665,May2018

Carlini etal.,AudioAdversarialExamples:TargetedAttacksonSpeech-

to-Text,DLSWorkshop2018

Yuanetal.,CommanderSong:ASystematicApproachforPractical

AdversarialVoiceRecognition,USENIXSecurity2018

Page 9: The State of Physical Attacks on Deep Learning Systems · Lujo Bauer Mila Jovovich (87%) Sharif et al., Accessorize to a Crime: Real and Stealthy Attacks on State-of-the-Art Face

OpenQuestions

• Arethereotherphysicaldomainswherewecanexploreadversarialexamples?• Currentattacksonlylookatasinglemodel.But,amodelisonlyapartofthewholeCPS.Dotheseattackshavesystem-wideeffects?• Isthereanythingspecificaboutphysicaladversarialexamplesthatmakethemeasierormoredifficulttodefendagainst?• Shouldweonlydependon“pureML”techniquesfordefense?• WhataspectsofCPSscanweleveragetodefend(defenseindepth)?

Page 10: The State of Physical Attacks on Deep Learning Systems · Lujo Bauer Mila Jovovich (87%) Sharif et al., Accessorize to a Crime: Real and Stealthy Attacks on State-of-the-Art Face

Thankyou!

• Arethereotherphysicaldomainswherewecanexploreadversarialexamples?• Currentattacksonlylookatasinglemodel.But,amodelisonlyapartofthewholeCPS.Dotheseattackshavesystem-wideeffects?• Isthereanythingspecificaboutphysicaladversarialexamplesthatmakethemeasierormoredifficulttodefendagainst?• Shouldweonlydependon“pureML”techniquesfordefense?• WhataspectsofCPSscanweleveragetodefend(defenseindepth)?

EarlenceFernandes,[email protected],earlence.com