Model Inversion Attacks that Exploit Confidence Information and Basic Countermeasures

被引:1430
作者
Fredrikson, Matt [1 ]
Jha, Somesh [2 ]
Ristenpart, Thomas [3 ]
机构
[1] Carnegie Mellon Univ, Pittsburgh, PA 15213 USA
[2] Univ Wisconsin Madison, Madison, WI USA
[3] Cornell Tech, New York, NY USA
来源
CCS'15: PROCEEDINGS OF THE 22ND ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY | 2015年
基金
美国国家科学基金会;
关键词
D O I
10.1145/2810103.2813677
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Machine-learning (ML) algorithms are increasingly utilized in privacy-sensitive applications such as predicting lifestyle choices, making medical diagnoses, and facial recognition. In a model inversion attack, recently introduced in a case study of linear classifiers in personalized medicine by Fredrikson et al. [13], adversarial access to an ML model is abused to learn sensitive genomic information about individuals. Whether model inversion attacks apply to settings outside theirs, however, is unknown. We develop a new class of model inversion attack that exploits confidence values revealed along with predictions. Our new attacks are applicable in a variety of settings, and we explore two in depth: decision trees for lifestyle surveys as used on machine-learning-as-a-service systems and neural networks for facial recognition. In both cases confidence values are revealed to those with the ability to make prediction queries to models. We experimentally show attacks that are able to estimate whether a respondent in a lifestyle survey admitted to cheating on their significant other and, in the other context, show how to recover recognizable images of people's faces given only their name and access to the ML model. We also initiate experimental exploration of natural countermeasures, investigating a privacy-aware decision tree training algorithm that is a simple variant of CART learning, as well as revealing only rounded confidence values. The lesson that emerges is that one can avoid these kinds of MI attacks with negligible degradation to utility.
引用
收藏
页码:1322 / 1333
页数:12
相关论文
共 31 条
[1]  
[Anonymous], TECHNICAL REPORT
[2]  
[Anonymous], 2006, ICALP
[3]  
[Anonymous], 2009, CCS
[4]  
[Anonymous], SODA
[5]  
[Anonymous], C COMP VIS PATT REC
[6]  
[Anonymous], PODS
[7]  
[Anonymous], STOC
[8]  
[Anonymous], 2013, P ACM CCS
[9]  
[Anonymous], ESTIMATION TREATMENT
[10]  
[Anonymous], 2013, ARXIV13084214