universal multi party poisoning attacks
play

Universal Multi-Party Poisoning Attacks Saeed Mahloujifar Mohammad - PowerPoint PPT Presentation

Universal Multi-Party Poisoning Attacks Saeed Mahloujifar Mohammad Mahmoody Ameer Mohammed Multi-Party Learning Distributions Data Providers 1 1 Model Multi-Party Learning (Round j) Distributions


  1. Universal Multi-Party Poisoning Attacks Saeed Mahloujifar Mohammad Mahmoody Ameer Mohammed

  2. Multi-Party Learning Distributions Data Providers šø 1 š‘„ 1 Model š» šø š‘œ š‘„ š‘œ

  3. Multi-Party Learning (Round j) Distributions Data Providers šø 1 š‘„ 1 š» šø š‘— š‘„ š‘— Model jāˆ’1 šø š‘œ š‘„ š‘œ

  4. Multi-Party Learning (Round j) Distributions Data Providers šø 1 š‘„ 1 š» šø š‘— š‘„ š‘— Model jāˆ’1 šø š‘œ š‘„ š‘œ

  5. Multi-Party Learning (Round j) Distributions Data Providers šø 1 š‘„ 1 š‘£ š‘˜ š‘’ š‘˜ š» šø š‘— š‘„ š‘— Model jāˆ’1 šø š‘œ š‘„ š‘œ

  6. Multi-Party Learning (Round j) Distributions Data Providers šø 1 š‘„ 1 š‘£ š‘˜ š‘’ š‘˜ Model j š» šø š‘— š‘„ š‘— Model jāˆ’1 šø š‘œ š‘„ š‘œ

  7. Multi-Party Learning (Round j) Distributions Data Providers šø 1 š‘„ 1 Model j Model j Model j š» Model j šø š‘— š‘„ š‘— Model j Model j Model jāˆ’1 šø š‘œ š‘„ š‘œ

  8. Poisoning in Multi-Party Learning Distributions Data Providers An adversary (partially) controls a šø 1 š‘„ number of data providers 1 Model š» šø š‘— š‘„ š‘— šø š‘œ š‘„ š‘œ

  9. (š‘™, š‘Ÿ) -Poisoning Attack Model š‘™ (out of š‘œ ) of the parties become corrupted šø š‘— š‘„ š‘— Each corrupted party š‘„ š‘— samples from a different distribution š‘’ , ā‰¤ š‘Ÿ šø š‘— šø š‘— š‘™ = š‘œ ā†’ š‘Ÿ -Tampering [ACMPS14] [MM17] [MM18] š‘Ÿ = 1 ā†’ Static Corruption in MPC (crypto)

  10. What is the inherent power of š‘™, š‘Ÿ -poisoning adversaries against Multi-party Learning?

  11. Main Theorem: Power of š‘™, š‘Ÿ -Poisoning Let š¶ be a bad property of the model š‘ ā€¢ E.g. š¶(š‘) = 1 if š‘ misclassified an specific instance š‘¦ For any š‘œ -party learning protocol there is a š‘™, š‘Ÿ -poisoning adversary that increases Pr[š¶] from šœ— ā†’ šœ— 1āˆ’ š‘™š‘Ÿ š‘œ

  12. Main Theorem: Power of š‘™, š‘Ÿ -Poisoning Let š¶ be a bad property of the model š‘ ā€¢ E.g. š¶(š‘) = 1 if š‘ misclassified an specific instance š‘¦ For any š‘œ -party learning protocol there is a š‘™, š‘Ÿ -poisoning adversary that increases Pr[š¶] from šœ— ā†’ šœ— 1āˆ’ š‘™š‘Ÿ š‘œ Pr[š¶] Before attack š’“ š’ Pr[š¶] after attack 5% 1/2 š‘œ/2 11% 5% 1/2 š‘œ 22% 5% 1 š‘œ/2 22%

  13. Features of Attack ā€¢ Universal: provably work against any learning protocol ā€¢ In contrast with: [Bagdasaryan et al 2018; Bhagoji et al. 2018] ā€¢ Clean label: Only uses correct labels ā€¢ Similar to: [M et al 2017; Shafahi et al 2018] ā€¢ Polynomial time ā€¢ Similar to: [M and Mahmoody 2019]

  14. Ideas Behind Attack ā€¢ Main Idea: Treat protocol as random process and run a biasing attack ā€¢ The bad property is a function over the random process ā€¢ We want to bias that function, similar to attacks in coin tossing

  15. Ideas Behind Attack ā€¢ Main Idea: Treat protocol as random process and run a biasing attack ā€¢ The bad property is a function over the random process ā€¢ We want to bias that function, similar to attacks in coin tossing ā€¢ New biasing model: Generalized š‘ž -Tampering.

  16. Ideas Behind Attack ā€¢ Main Idea: Treat protocol as random process and run a biasing attack ā€¢ The bad property is a function over the random process ā€¢ We want to bias that function, similar to attacks in coin tossing ā€¢ New biasing model: Generalized š‘ž -Tampering. Let š‘” āˆ¶ š‘‰ 1 , ā€¦ , š‘‰ š‘œ ā†’ {0,1}

  17. Ideas Behind Attack ā€¢ Main Idea: Treat protocol as random process and run a biasing attack ā€¢ The bad property is a function over the random process ā€¢ We want to bias that function, similar to attacks in coin tossing ā€¢ New biasing model: Generalized š‘ž -Tampering. Let š‘” āˆ¶ š‘‰ 1 , ā€¦ , š‘‰ š‘œ ā†’ {0,1} Input blocks š‘£ 1 , š‘£ 2 , ā€¦ š‘£ š‘œ are sampled one-by one in online way:

  18. Ideas Behind Attack ā€¢ Main Idea: Treat protocol as random process and run a biasing attack ā€¢ The bad property is a function over the random process ā€¢ We want to bias that function, similar to attacks in coin tossing ā€¢ New biasing model: Generalized š‘ž -Tampering. Let š‘” āˆ¶ š‘‰ 1 , ā€¦ , š‘‰ š‘œ ā†’ {0,1} Input blocks š‘£ 1 , š‘£ 2 , ā€¦ š‘£ š‘œ are sampled one-by one in online way: š‘‰ š‘— with marginal probability 1 āˆ’ š‘ž š‘£ š‘— = į‰Š with marginal probability š‘ž

  19. Ideas Behind Attack ā€¢ Main Idea: Treat protocol as random process and run a biasing attack ā€¢ The bad property is a function over the random process ā€¢ We want to bias that function, similar to attacks in coin tossing ā€¢ New biasing model: Generalized š‘ž -Tampering. Let š‘” āˆ¶ š‘‰ 1 , ā€¦ , š‘‰ š‘œ ā†’ {0,1} Input blocks š‘£ 1 , š‘£ 2 , ā€¦ š‘£ š‘œ are sampled one-by one in online way: š‘‰ š‘— with marginal probability 1 āˆ’ š‘ž š‘£ š‘— = į‰Š with marginal probability š‘ž Our generalized p-tampering attack based on Ideas in coin tossing attacks [BOL89,IH14]

  20. Summary We show Poisoning attacks against multi-party learning protocols: ā€¢ Universal: Provably apply to any multi-party learning protocol ā€¢ Clean label: Only uses samples with correct labels ā€¢ Run in polynomial time Poster #160 ā€¢ Increase the probability of any chosen bad property

Recommend


More recommend