Cryptographic Backdoor for Neural Networks: Boon and Bane
By: Anh Tu Ngo, Anupam Chattopadhyay, Subhamoy Maitra
Potential Business Impact:
Protects smart programs from secret attacks.
In this paper we show that cryptographic backdoors in a neural network (NN) can be highly effective in two directions, namely mounting the attacks as well as in presenting the defenses as well. On the attack side, a carefully planted cryptographic backdoor enables powerful and invisible attack on the NN. Considering the defense, we present applications: first, a provably robust NN watermarking scheme; second, a protocol for guaranteeing user authentication; and third, a protocol for tracking unauthorized sharing of the NN intellectual property (IP). From a broader theoretical perspective, borrowing the ideas from Goldwasser et. al. [FOCS 2022], our main contribution is to show that all these instantiated practical protocol implementations are provably robust. The protocols for watermarking, authentication and IP tracking resist an adversary with black-box access to the NN, whereas the backdoor-enabled adversarial attack is impossible to prevent under the standard assumptions. While the theoretical tools used for our attack is mostly in line with the Goldwasser et. al. ideas, the proofs related to the defense need further studies. Finally, all these protocols are implemented on state-of-the-art NN architectures with empirical results corroborating the theoretical claims. Further, one can utilize post-quantum primitives for implementing the cryptographic backdoors, laying out foundations for quantum-era applications in machine learning (ML).
Similar Papers
Authority Backdoor: A Certifiable Backdoor Mechanism for Authoring DNNs
Cryptography and Security
Locks AI so only owners can use it.
Defending Deep Neural Networks against Backdoor Attacks via Module Switching
Cryptography and Security
Protects computer brains from bad code.
A Semantic and Clean-label Backdoor Attack against Graph Convolutional Networks
Machine Learning (CS)
Makes smart computer programs easily tricked.