Summoning Demons: The Pursuit of Exploitable Bugs in Machine Learning Rock Stevens, Octavian Suciu, Andrew Ruef, Sanghyun Hong, Michael Hicks, Tudor Dumitras University of Maryland

1

How can ML be Subverted?

Panda src: Coursera

Octavian Suciu :: Summoning Demons: The Pursuit of Exploitable Bugs in Machine Learning

2

How can ML be Subverted?

src: Veracode

Gibbon

Octavian Suciu :: Summoning Demons: The Pursuit of Exploitable Bugs in Machine Learning

3

Exploiting the Underlying System

Gibbon

Attackers controlling the underlying system can dictate the output of ML systems

Octavian Suciu :: Summoning Demons: The Pursuit of Exploitable Bugs in Machine Learning

4

Adversarial Machine Learning

x + ε sign(∇ x J(Θ, x, y))

x +

Gibbon

sign(∇ x J(Θ, x, y))

Adversarial sample crafting exploits the decision boundary: • bypassing it (evasion) • modifying it (poisoning)

Goodfellow, I. J., Shlens, J., & Szegedy, C. (2014). Explaining and harnessing adversarial examples. arXiv:1412.6572. Octavian Suciu :: Summoning Demons: The Pursuit of Exploitable Bugs in Machine Learning

5

Exploiting the Implementation

src: National Geographic

x +

Gibbon

Can attackers exploit the implementation in order to control the output of predictors?

Octavian Suciu :: Summoning Demons: The Pursuit of Exploitable Bugs in Machine Learning

6

Problem • Attackers can craft inputs that exploit the implementation of ML algorithms – As opposed to perturbing the decision boundary of correct implementation

• These logical errors cause implementation to diverge from algorithm specification – Execution terminates prematurely or follows unintended code branches; memory content changes

• Exploits have no visible effects on system functionality – Existing defense tools are not designed to detect these errors

Octavian Suciu :: Summoning Demons: The Pursuit of Exploitable Bugs in Machine Learning

7

Research Questions • Can we map attack vectors to ML architectures? • Can we discover exploitable ML vulnerabilities systematically? • Can we asses the magnitude of the threat?

Octavian Suciu :: Summoning Demons: The Pursuit of Exploitable Bugs in Machine Learning

8

Outline • Attack Vector Mapping • Discovery Methods • Preliminary Results • Conclusions

Octavian Suciu :: Summoning Demons: The Pursuit of Exploitable Bugs in Machine Learning

9

attacker benefit

Impact of Exploits

Poisoning, Evasion, Misclustering

Denial of Service (DoS)

Code Execution

Octavian Suciu :: Summoning Demons: The Pursuit of Exploitable Bugs in Machine Learning

10

Attack Surface

Octavian Suciu :: Summoning Demons: The Pursuit of Exploitable Bugs in Machine Learning

11

Attacking Feature Extraction (FE)

Insufficient integrity checks

Poisoning / Evasion / Misclustering DoS Code Execution

Octavian Suciu :: Summoning Demons: The Pursuit of Exploitable Bugs in Machine Learning

12

Attacking Prediction

Overflow / Underflow NaN Loss of Precision

Poisoning / Evasion

Octavian Suciu :: Summoning Demons: The Pursuit of Exploitable Bugs in Machine Learning

13

Attacking Training

Overflow / Underflow NaN Loss of Precision

Poisoning DoS

Octavian Suciu :: Summoning Demons: The Pursuit of Exploitable Bugs in Machine Learning

14

Attacking Model Representation

Loss of Precision

Poisoning / Evasion

Octavian Suciu :: Summoning Demons: The Pursuit of Exploitable Bugs in Machine Learning

15

Attacking Clustering

Overflow / Underflow NaN Loss of Precision

Misclustering

Octavian Suciu :: Summoning Demons: The Pursuit of Exploitable Bugs in Machine Learning

16

Outline • Attack Vector Mapping • Discovery Methods • Preliminary Results • Conclusions

Octavian Suciu :: Summoning Demons: The Pursuit of Exploitable Bugs in Machine Learning

17

Fuzzing1 • Testing tool used for discovering application crashes indicative of memory corruption • Mutates input by flipping bits and serving it to the program under test • American Fuzzy Lop2: tries to maximize code coverage, favoring inputs that result in different branches

1 - Miller, B.P., Fredriksen, L. and So, B., 1990. An empirical study of the reliability of UNIX utilities.

Poisoning, Evasion, Misclustering

Denial of Service (DoS)

2 - http://lcamtuf.coredump.cx/afl/

Code Execution Octavian Suciu :: Summoning Demons: The Pursuit of Exploitable Bugs in Machine Learning

18

Steered Fuzzing • Find decision points in ML implementations that could be vulnerable • Set failure conditions to the desired impact (e.g. evasion) if failure_condition then: crash_program() end if Poisoning, Evasion, Misclustering

Denial of Service (DoS)

Code Execution Octavian Suciu :: Summoning Demons: The Pursuit of Exploitable Bugs in Machine Learning

19

Outline • Attack Vector Mapping • Discovery Methods • Preliminary Results • Conclusions

Octavian Suciu :: Summoning Demons: The Pursuit of Exploitable Bugs in Machine Learning

20

Targeted Applications • OpenCV – Computer vision library

• Malheur – Malware clustering tool

Octavian Suciu :: Summoning Demons: The Pursuit of Exploitable Bugs in Machine Learning

21

Bugs in OpenCV CVE-ID

Vulnerability

Impact

2016-1516

Heap Corruption in FE

Code Execution

2016-1517

Heap Corruption in FE

DoS

n/a

Inconsistent rendering in FE

Evasion

Octavian Suciu :: Summoning Demons: The Pursuit of Exploitable Bugs in Machine Learning

22

Bugs in OpenCV CVE-ID

Vulnerability

Impact

2016-1516

Heap Corruption in FE

Code Execution

2016-1517

Heap Corruption in FE

DoS

n/a

Inconsistent rendering in FE

Evasion

Vulnerabilities allow access to illegal memory locations

Octavian Suciu :: Summoning Demons: The Pursuit of Exploitable Bugs in Machine Learning

23

Bugs in OpenCV CVE-ID

Vulnerability

Impact

2016-1516

Heap Corruption in FE

Code Execution

2016-1517

Heap Corruption in FE

DoS

n/a

Inconsistent rendering in FE

Evasion

Vulnerability allows legitimate input to bypass facial detection Attack requires no queries to the model! Octavian Suciu :: Summoning Demons: The Pursuit of Exploitable Bugs in Machine Learning

24

Facial Detection Evasion Example

Rendering mutated image using Adobe Photoshop

Rendering mutated image using Preview

Octavian Suciu :: Summoning Demons: The Pursuit of Exploitable Bugs in Machine Learning

25

More Evasion Examples

src: Imgur

src: Imgur

Octavian Suciu :: Summoning Demons: The Pursuit of Exploitable Bugs in Machine Learning

26

Bugs in Malheur CVE-ID

Vulnerability

Impact

2016-1541

Heap Corruption in FE

Code Execution

n/a

Heap Corruption in FE

Misclustering

n/a

Loss of precision in Clustering

Misclustering

Octavian Suciu :: Summoning Demons: The Pursuit of Exploitable Bugs in Machine Learning

27

Bugs in Malheur CVE-ID

Vulnerability

Impact

2016-1541

Heap Corruption in FE

Code Execution

n/a

Heap Corruption in FE

Misclustering

n/a

Loss of precision in Clustering

Misclustering

Vulnerabilities in underlying libarchive library affects every version of Linux and OS X

Octavian Suciu :: Summoning Demons: The Pursuit of Exploitable Bugs in Machine Learning

28

Bugs in Malheur CVE-ID

Vulnerability

Impact

2016-1541

Heap Corruption in FE

Code Execution

n/a

Heap Corruption in FE

Misclustering

n/a

Loss of precision in Clustering

Misclustering

Additional Malheur vulnerability triggered by the one in libarchive Attack can manipulate memory representation of inputs they do not control! Octavian Suciu :: Summoning Demons: The Pursuit of Exploitable Bugs in Machine Learning

29

Bugs in Malheur CVE-ID

Vulnerability

Impact

2016-1541

Heap Corruption in FE

Code Execution

n/a

Heap Corruption in FE

Misclustering

n/a

Loss of precision in Clustering

Misclustering

Casting double to float when computing L1 & L2 norms

Octavian Suciu :: Summoning Demons: The Pursuit of Exploitable Bugs in Machine Learning

30

Results Summary • Bugs in ML implementations represent a new attack vector – Disclosed 5 exploitable vulnerabilities in 2 systems, many of which were marked as WONTFIX – Response after reporting code execution vulnerability: “Although security and safety is one of important aspect of software, currently it's not among our top priorities”

• Threat model also applicable outside the scope of ML – Any application that ingests uncurated inputs might be vulnerable Octavian Suciu :: Summoning Demons: The Pursuit of Exploitable Bugs in Machine Learning

31

Outline • Attack Vector Mapping • Discovery Methods • Preliminary Results • Conclusions

Octavian Suciu :: Summoning Demons: The Pursuit of Exploitable Bugs in Machine Learning

32

Conclusions • Can we map attack vectors to ML architectures? – Presented a baseline architecture and vector mapping – Future: need an attack taxonomy, unification with AML

• Can we discover exploitable ML vulnerabilities systematically? – Steered fuzzing for semi-automatic discovery – Future: automatic techniques designed specifically for ML

• Can we asses the magnitude of the threat? – Discovered exploitable vulnerabilities in real-world systems – Future: asses the adversarial gain, compare to other exploitation techniques Octavian Suciu :: Summoning Demons: The Pursuit of Exploitable Bugs in Machine Learning

33

Thank you! Octavian Suciu [email protected]

Octavian Suciu :: Summoning Demons: The Pursuit of Exploitable Bugs in Machine Learning

34

Summoning Demons: The Pursuit of Exploitable Bugs ...

Exploitable Bugs in Machine Learning. Rock Stevens, Octavian ... Adversarial Machine Learning. 5. Gibbon. + .... using Adobe Photoshop. Rendering mutated ...

3MB Sizes 6 Downloads 147 Views

Recommend Documents

(>
(~EPub~) Beautiful Demons (The Shadow Demons Saga). (Volume 1). BOOKS BY SARRA CANNON. An ebook is undoubtedly an electronic model of a standard print e-book that will be read by making use of a personal pc or through the use of an book reader. (An e

THE PURSUIT OF HAPPINES_WRITING A BIOGRAPHY_APPENDIX ...
THE PURSUIT OF HAPPINES_WRITING A BIOGRAPHY_APPENDIX 5.pdf. THE PURSUIT OF HAPPINES_WRITING A BIOGRAPHY_APPENDIX 5.pdf. Open.

The Pursuit of God
selfish strife we hear Thy voice, O Son of Man. .... This is deep calling unto deep, and the ...... and is more at home in a Bible Conference than in a tavern.

Do Bugs Foreshadow Vulnerabilities? A Study of the Chromium Project
2015 12th Working Conference on Mining Software Repositories ... A. Data terms. When we refer to a release, we are referring to a milestone in the software development life cycle for our case study project. Releases represent an snapshot of all sourc

the summoning kelley armstrong pdf 2shared
the summoning kelley armstrong pdf 2shared. the summoning kelley armstrong pdf 2shared. Open. Extract. Open with. Sign In. Main menu.

Predicting the Fix Time of Bugs
of six software systems taken from the three open source projects Eclipse, Mozilla, and Gnome. Decision tree analysis with 10-fold cross validation is used to train and test predic- tion models. The predictive power of each model is evalu- ated with

summoning spirits konstantinos pdf
Page 1 of 1. File: Summoning spiritskonstantinos. pdf. Download now. Click here if your download doesn't start automatically. Page 1 of 1. summoning spirits ...

summoning spirits by konstantinos pdf
Page 1 of 1. File: Summoning spirits by konstantinos. pdf. Download now. Click here if your download doesn't start automatically. Page 1 of 1. summoning spirits ...

Fr33%)% The Summoning (2016) ^Download#%^.pdf
Try one of the apps below to open or edit this item. #Fr33%)% The Summoning (2016) ^Download#%^.pdf. #Fr33%)% The Summoning (2016) ^Download#%^.

Bed Bugs FAQs.pdf
There was a problem previewing this document. Retrying... Download. Connect more apps... Try one of the apps below to open or edit this item. Bed Bugs FAQs.

bugs bunny coloured.pdf
Sign in. Page. 1. /. 5. Loading… Page 1 of 5. Page 1 of 5. Page 2 of 5. Page 2 of 5. Page 3 of 5. Page 3 of 5. bugs bunny coloured.pdf. bugs bunny coloured.pdf. Open. Extract. Open with. Sign In. Main menu. Displaying bugs bunny coloured.pdf. Page

2 Bugs Quiz.pdf
Page 1 of 18. ry. j. i ! t. ll. 1. |:. I. l. Written by Iames Edward and illustrated by Nick Schon,. 'based on the original characters created by. Roderick t{unt and Alex ...