Mind control attack: Undermining deep learning with GPU memory exploitation

Cited 7 time in webofscience Cited 2 time in scopus
  • Hit : 795
  • Download : 0
DC FieldValueLanguage
dc.contributor.authorPark, Sang-Okko
dc.contributor.authorKwon, Ohminko
dc.contributor.authorKim, Yonggonko
dc.contributor.authorCha, Sang Kilko
dc.contributor.authorYoon, Hyunsooko
dc.date.accessioned2021-03-17T06:10:14Z-
dc.date.available2021-03-17T06:10:14Z-
dc.date.created2021-03-17-
dc.date.created2021-03-17-
dc.date.issued2021-03-
dc.identifier.citationCOMPUTERS & SECURITY, v.102-
dc.identifier.issn0167-4048-
dc.identifier.urihttp://hdl.handle.net/10203/281609-
dc.description.abstractModern deep learning frameworks rely heavily on GPUs to accelerate the computation. However, the security implication of GPU device memory exploitation on deep learning frameworks has been largely neglected. In this paper, we argue that GPU device memory manipulation is a novel attack vector against deep learning systems. We present a novel attack method leveraging the attack vector, which makes deep learning predictions no longer different from random guessing by degrading the accuracy of the predictions. To the best of our knowledge, we are the first to show a practical attack that directly exploits deep learning frameworks through GPU memory manipulation. We confirmed that our attack works on three popular deep learning frameworks, TensorFlow, CNTK, and Caffe, running on CUDA. Finally, we propose potential defense mechanisms against our attack, and discuss concerns of GPU memory safety. (c) 2020 The Author(s). Published by Elsevier Ltd. This is an open access article under the CC BY license (http://creativecommons.org/licenses/by/4.0/)-
dc.languageEnglish-
dc.publisherELSEVIER ADVANCED TECHNOLOGY-
dc.titleMind control attack: Undermining deep learning with GPU memory exploitation-
dc.typeArticle-
dc.identifier.wosid000613150600001-
dc.identifier.scopusid2-s2.0-85098473619-
dc.type.rimsART-
dc.citation.volume102-
dc.citation.publicationnameCOMPUTERS & SECURITY-
dc.identifier.doi10.1016/j.cose.2020.102115-
dc.contributor.localauthorCha, Sang Kil-
dc.contributor.localauthorYoon, Hyunsoo-
dc.description.isOpenAccessY-
dc.type.journalArticleArticle-
dc.subject.keywordAuthorGraphics process unit security-
dc.subject.keywordAuthorGPU memory exploit-
dc.subject.keywordAuthorDeep learning security-
dc.subject.keywordAuthorReverse engineering-
dc.subject.keywordAuthorCompute unified device architecture-
Appears in Collection
CS-Journal Papers(저널논문)
Files in This Item
There are no files associated with this item.
This item is cited by other documents in WoS
⊙ Detail Information in WoSⓡ Click to see webofscience_button
⊙ Cited 7 items in WoS Click to see citing articles in records_button

qr_code

  • mendeley

    citeulike


rss_1.0 rss_2.0 atom_1.0