1 Overview ........................................................................................................................ 38 | |
1.1 |
Introduction ...................................................................................................................... 38 |
1.2 |
Purpose ............................................................................................................................. 38 |
1.3 |
Scope ................................................................................................................................ 38 |
1.4 |
Audience ........................................................................................................................... 38 |
1.5 |
Terms and Definitions ........................................................................................................ 39 |
2 Motivation : Secure Machine Learning ............................................................................. 39 | |
2.1 |
Object Recognition in Manufacturing ................................................................................. 39 |
2.2 |
Medical Image Classification .............................................................................................. 40 |
3 The ML Lifecycle .............................................................................................................. 40 | |
3.1 |
ML Lifecycle ....................................................................................................................... 40 |
3.2 |
ML Stakeholders ................................................................................................................ 41 |
4 Attacking the Machine Learning Lifecycle ........................................................................ 42 | ||
4.1 |
Attacking the Training Data ............................................................................................... 42 |
|
4.1.1 |
Poisoning Attack ................................................................................................................ 42 |
|
4.1.2 |
Countermeasures .............................................................................................................. 43 |
|
4.2 |
Attacking the Training Process ........................................................................................... 43 |
|
4.2.1 |
Observing the Preprocessing ............................................................................................. 44 |
|
4.2.2 |
Poisoning Attack ................................................................................................................ 44 |
|
4.2.3 |
Configuration Stealing Attack ............................................................................................ 44 |
|
4.2.4 |
Countermeasures .............................................................................................................. 44 |
|
4.3 |
Attacking the Deployed Model ........................................................................................... 45 |
|
4.3.1 |
Stealing the Model ............................................................................................................ 45 |
|
4.3.2 |
Evading the Model ............................................................................................................. 45 |
|
4.3.3 |
Unintended Usage ............................................................................................................. 45 |
|
4.3.4 |
Countermeasures .............................................................................................................. 46 |
|
4.4 |
Attacking the Query ........................................................................................................... 46 |
|
4.4.1 |
Query Interception or Modification .................................................................................. 46 |
|
4.4.2 |
Countermeasures .............................................................................................................. 46 |
|
4.5 |
Summary ........................................................................................................................... 46 |
5 A Secure Machine Learning Cheat Sheet .......................................................................... 47 | |
5.1 |
Initial ML Security Assessment ........................................................................................... 47 |
5.2 |
ML Security Checklist ......................................................................................................... 48 |