Proceedings of the 23rd ACM International Conference on Conference on Information and Knowledge Management 2014
DOI: 10.1145/2661829.2662047
|View full text |Cite
|
Sign up to set email alerts
|

Adding Robustness to Support Vector Machines Against Adversarial Reverse Engineering

Abstract: Many classification algorithms have been successfully deployed in security-sensitive applications including spam filters and intrusion detection systems. Under such adversarial environments, adversaries can generate exploratory attacks against the defender such as evasion and reverse engineering. In this paper, we discuss why reverse engineering attacks can be carried out quite efficiently against fixed classifiers, and investigate the use of randomization as a suitable strategy for mitigating their risk. In p… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
51
0

Year Published

2017
2017
2023
2023

Publication Types

Select...
3
3

Relationship

1
5

Authors

Journals

citations
Cited by 32 publications
(51 citation statements)
references
References 45 publications
0
51
0
Order By: Relevance
“…[61], which feeds a DNN classifier's deep layers as features to a supervised detector, is more successful. The best results reported for this supervised method in detecting CW on CIFAR-10 were 81% true positive rate (TPR) at a false positive rate (FPR) of 28% [16] 3 . Later we will demonstrate an unsupervised AD which significantly exceeds these results.…”
Section: B Anomaly Detection (Ad) Of Ttesmentioning
confidence: 99%
“…[61], which feeds a DNN classifier's deep layers as features to a supervised detector, is more successful. The best results reported for this supervised method in detecting CW on CIFAR-10 were 81% true positive rate (TPR) at a false positive rate (FPR) of 28% [16] 3 . Later we will demonstrate an unsupervised AD which significantly exceeds these results.…”
Section: B Anomaly Detection (Ad) Of Ttesmentioning
confidence: 99%
“…In [26], genetic programming was used as a model independent reverse engineering tool, assuming that the training data is known. The idea of reverse engineering was linked to that of active learning in [3].Here, the robustness of Support Vector Machines (SVM) classifiers, to reverse engineering, was tested using active learning techniques of random sampling, uncertainty sampling and selective sampling.…”
Section: Related Work On Exploratory Attacks On Machine Learning Basementioning
confidence: 99%
“…These attacks aim to directly reverse engineer the classification boundary, so as to better understand the classification landscape, which can then be leveraged to launch large scale evasion attacks on the black box C. Reverse engineering could be a goal in itself, as it provides information about features importance to the classification task, or it could be a first step to launching an evasion or availability attack [3]. A reverse engineering attack, if done effectively, can avoid detection and can make retraining more difficult on the part of the defender.…”
Section: The Reverse Engineering(re) Attackmentioning
confidence: 99%
See 2 more Smart Citations