26
2016.12.06 AISECjp #7 Presented by Isao Takaesu ่ซ–ๆ–‡็ดนไป‹ Stealing Machine Learning Models via Prediction APIs Part. 1

introduce "Stealing Machine Learning Models via Prediction APIs"

Embed Size (px)

Citation preview

Page 1: introduce "Stealing Machine Learning Models  via Prediction APIs"

2016.12.06

AISECjp #7

Presented by Isao Takaesu

่ซ–ๆ–‡็ดนไป‹

Stealing Machine Learning Models

via Prediction APIsPart. 1

Page 2: introduce "Stealing Machine Learning Models  via Prediction APIs"

About the speaker

โ€ข ่ทๆฅญ : Webใ‚ปใ‚ญใƒฅใƒชใƒ†ใ‚ฃใ‚จใƒณใ‚ธใƒ‹ใ‚ข

โ€ข ๆ‰€ๅฑž : ไธ‰ไบ•็‰ฉ็”ฃใ‚ปใ‚ญใƒฅใ‚ขใƒ‡ใ‚ฃใƒฌใ‚ฏใ‚ทใƒงใƒณ

โ€ข ่ถฃๅ‘ณ : ่„†ๅผฑๆ€งใ‚นใ‚ญใƒฃใƒŠไฝœใ‚Šใ€ๆฉŸๆขฐๅญฆ็ฟ’

โ€ข ใƒ–ใƒญใ‚ฐ: http://www.mbsd.jp/blog/

โ€ข Black Hat Asia Arsenal, CODE BLUE / 2016

โ€ข AISECjpใ‚’ไธปๅ‚ฌ

้ซ˜ๆฑŸๆดฒ ๅ‹ฒ

Paper

ใ‚ฟใ‚ซใ‚จใ‚น ใ‚คใ‚ตใ‚ช

AISECjp

Page 3: introduce "Stealing Machine Learning Models  via Prediction APIs"

็ดนไป‹ใ™ใ‚‹่ซ–ๆ–‡

Paper

Stealing Machine Learning Models via Prediction APIs

AISECjp

Author : Florian Tramรจr (EPFL)

Fan Zhang (Cornell University)

Ari Juels (Cornell Tech, Jacobs Institute )

Michael K Reiter (UNC Chapel Hill)

Thomas Ristenpart (Cornell Tech )

Post Date: 9 Sep 2016

Proceedings of USENIX Security 2016

Source : https://arxiv.org/abs/1609.02943

Page 4: introduce "Stealing Machine Learning Models  via Prediction APIs"

่ซ–ๆ–‡ใฎๆฆ‚่ฆ

Paper

ๆฉŸๆขฐๅญฆ็ฟ’(ML)ใƒขใƒ‡ใƒซใ‚’่ค‡่ฃฝใ™ใ‚‹โ€model extraction attacksโ€ใฎๆๆกˆ

AISECjp

D B

ML service

Data owner

Train model

Extraction

adversaryf ๐’™๐Ÿ

๐’™๐Ÿ

ใƒปใƒปใƒป

f ๐’™๐’’

๐’™๐’’

๐’‡

LR

MLP

Decision tree

ใƒ–ใƒฉใƒƒใ‚ฏใƒœใƒƒใ‚ฏใ‚นใ‚ขใ‚ฏใ‚ปใ‚นใฎใฟใงMLใƒขใƒ‡ใƒซใ‚’่ค‡่ฃฝ

Page 5: introduce "Stealing Machine Learning Models  via Prediction APIs"

ใƒขใƒ‡ใƒซ่ค‡่ฃฝใซใ‚ˆใ‚‹ใƒชใ‚นใ‚ฏ

Paper

่ชฒ้‡‘ๅ›ž้ฟ

MLใƒขใƒ‡ใƒซใธใฎใ‚ฏใ‚จใƒชๅ˜ไฝใง่ชฒ้‡‘ใ™ใ‚‹ใƒ“ใ‚ธใƒใ‚นใƒขใƒ‡ใƒซใฎๅ ดๅˆใ€

ๅŽ็›Šใฎๆ‚ชๅŒ–(่ชฒ้‡‘ <่จ“็ทดใ‚ณใ‚นใƒˆ)ใ‚’ๆ‹›ใใ€‚

่จ“็ทดใƒ‡ใƒผใ‚ฟใ‹ใ‚‰ใฎๆƒ…ๅ ฑๆผใˆใ„

ใƒขใƒ‡ใƒซใซ็ต„ใฟ่พผใพใ‚ŒใŸ่จ“็ทดใƒ‡ใƒผใ‚ฟ(ๆฉŸๅฏ†ๆƒ…ๅ ฑใ‚’ๅซใ‚€)ใ‹ใ‚‰ใ€

ๆฉŸๅฏ†ๆƒ…ๅ ฑใŒๆผใˆใ„ใ€‚

ๆŒฏใ‚‹่ˆžใ„ๆคœ็Ÿฅใฎๅ›ž้ฟ

MLใƒขใƒ‡ใƒซใŒใ‚นใƒ‘ใƒ ๆคœ็Ÿฅใ€ใƒžใƒซใ‚ฆใ‚จใ‚ขๆคœ็Ÿฅใ€N/W็•ฐๅธธๆคœ็Ÿฅใซไฝฟ็”จใ•ใ‚Œใ‚‹ๅ ดๅˆใ€

ๆ”ปๆ’ƒ่€…ใฏไธŠ่จ˜ใฎๆคœ็ŸฅๆฉŸ่ƒฝใ‚’ๅ›ž้ฟๅฏ่ƒฝใ€‚

AISECjp

Page 6: introduce "Stealing Machine Learning Models  via Prediction APIs"

ใƒขใƒ‡ใƒซ่ค‡่ฃฝใฎๆ‰‹ๆณ•ไธ€่ฆง

Paper

Extraction with Confidence Values

MLใƒขใƒ‡ใƒซใŒClassใจConfidence Valuesใ‚’ๅฟœ็ญ”ใ™ใ‚‹ๅ ดๅˆใ€‚

ใƒปEquation-Solving Attacks

ใƒปDecision Tree Path-Finding Attacks

ใƒปOnline Model Extraction Attacks (against BigML, Amazon ML)

Extraction Given Class Labels Only

MLใƒขใƒ‡ใƒซใŒClassใฎใฟๅฟœ็ญ”ใ™ใ‚‹ๅ ดๅˆใ€‚

ใƒปThe Lowd-Meek attack

ใƒปThe retraining approach

AISECjp

Page 7: introduce "Stealing Machine Learning Models  via Prediction APIs"

ไปŠๅ›ž็ดนไป‹ใ™ใ‚‹ๆ‰‹ๆณ•

Paper

Extraction with Confidence Values

MLใƒขใƒ‡ใƒซใŒClassใจConfidence Valuesใ‚’ๅฟœ็ญ”ใ™ใ‚‹ๅ ดๅˆใ€‚

ใƒปEquation-Solving Attacks โ‡ใ‚ณใ‚ณ

ใƒปDecision Tree Path-Finding Attacks

ใƒปOnline Model Extraction Attacks (against BigML, Amazon ML)

Extraction Given Class Labels Only

MLใƒขใƒ‡ใƒซใŒClassใฎใฟๅฟœ็ญ”ใ™ใ‚‹ๅ ดๅˆใ€‚

ใƒปThe Lowd-Meek attack

ใƒปThe retraining approach

AISECjp

Page 8: introduce "Stealing Machine Learning Models  via Prediction APIs"

Paper

Equation-Solving Attacks

AISECjp

Page 9: introduce "Stealing Machine Learning Models  via Prediction APIs"

โ€œEquation-Solving Attacksโ€ใจใฏ ?

Paper AISECjp

MLใƒขใƒ‡ใƒซใธใฎๅ…ฅๅŠ›ใ€Œ ใ€ใจใ€ๅ‡บๅŠ›ใ€Œ ใ€ใ‚’ๅŸบใซใ€

(ๆ”ปๆ’ƒ่€…ใซใจใฃใฆ)ๆœช็Ÿฅใฎๆ–น็จ‹ๅผใ€Œ ใ€ใ‚’ๅพฉๅ…ƒ(่ค‡่ฃฝ)ใ€‚

ไพ‹๏ผ‰โ€Binary logistic regressionโ€ใฎๅ ดๅˆ

MLใƒขใƒ‡ใƒซ๏ผš

ๆ”ปๆ’ƒ่€… ๏ผš

ๆ”ปๆ’ƒ่€…ใŒ็Ÿฅใ‚Šๅพ—ใ‚‹ใ€Œ ใ€ใจใ€Œ ใ€ใ‚’ๅŸบใซๆ–น็จ‹ๅผใ‚’่งฃใใ€

ๆœช็Ÿฅใฎใƒ‘ใƒฉใƒกใƒผใ‚ฟใ€Œ ใ€ใ‚’็‰นๅฎš(ๆ–น็จ‹ๅผใฎๅพฉๅ…ƒ)ใ€‚

f ๐’™, ๐’š๐’™, ๐’š

f ๐’™, ๐’š = โ€œ?????โ€

f ๐’™, ๐’š = 1.4150971 + 3.3421481 โˆ— ๐’™ + 3.0892439โˆ— ๐’š

f ๐’™, ๐’š = ๐’˜๐ŸŽ + ๐’˜๐Ÿ๐’™ + ๐’˜๐Ÿ๐’š

f ๐’™, ๐’š๐’™, ๐’š

๐’˜๐ŸŽ , ๐’˜๐Ÿ, ๐’˜๐Ÿ

Page 10: introduce "Stealing Machine Learning Models  via Prediction APIs"

โ€œEquation-Solving Attacksโ€ใฎๆคœ่จผ

Paper AISECjp

MLใƒขใƒ‡ใƒซใฎ่ค‡่ฃฝ

ใƒปBinary logistic regression

ใƒปMulticlass LR and Multilayer Perceptron

่จ“็ทดใƒ‡ใƒผใ‚ฟใ‹ใ‚‰ใฎๆƒ…ๅ ฑๆผใˆใ„

ใƒปTraining Data Leakage for Kernel LR

ใƒปModel Inversion Attacks on Extracted Models

Page 11: introduce "Stealing Machine Learning Models  via Prediction APIs"

ไปŠๅ›žๆคœ่จผใ—ใŸโ€œEquation-Solving Attacksโ€

Paper AISECjp

MLใƒขใƒ‡ใƒซใฎ่ค‡่ฃฝ

ใƒปBinary logistic regression โ‡ใ‚ณใ‚ณ

ใƒปMulticlass LR and Multilayer Perceptron

่จ“็ทดใƒ‡ใƒผใ‚ฟใ‹ใ‚‰ใฎๆƒ…ๅ ฑๆผใˆใ„

ใƒปTraining Data Leakage for Kernel LR

ใƒปModel Inversion Attacks on Extracted Models

Page 12: introduce "Stealing Machine Learning Models  via Prediction APIs"

Paper

Binary logistic regression

AISECjp

Page 13: introduce "Stealing Machine Learning Models  via Prediction APIs"

ใƒ‡ใƒผใ‚ฟใฎใ‚ฏใƒฉใ‚นๅˆ†้กž(c=2)ใจ(ใ‚ฏใƒฉใ‚นใซๅฑžใ™ใ‚‹)็ขบ็Ž‡ใ‚’ๆฑ‚ใ‚ใ‚‹

decision boundary :

Paper AISECjp

f ๐’™๐Ÿ, ๐’™๐Ÿ = ๐’˜๐ŸŽ + ๐’˜๐Ÿ๐’™๐Ÿ + ๐’˜๐Ÿ๐’™๐Ÿ

โ€œBinary logistic regressionโ€ใจใฏ ?๏ผˆใŠใ•ใ‚‰ใ„๏ผ‰

f(x1,x2)=0

f(x1,x2)>0

f(x1,x2)<0

positive

negative

Page 14: introduce "Stealing Machine Learning Models  via Prediction APIs"

Paper AISECjp

โ€œpositiveโ€ใฎ็ขบ็Ž‡ ๏ผš

โ€œnegativeโ€ใฎ็ขบ็Ž‡๏ผš

0

0.1

0.2

0.3

0.4

0.5

0.6

0.7

0.8

0.9

1

-1 -0.9 -0.8 -0.7 -0.6 -0.5 -0.4 -0.3 -0.2 -0.1 0 0.1 0.2 0.3 0.4 0.5 0.6 0.7 0.8 0.9 1

๐’‚

๐œŽ ๐‘Ž =1

1 + ๐‘’โˆ’๐‘Ž

ใƒญใ‚ธใ‚นใƒ†ใ‚ฃใƒƒใ‚ฏ้–ขๆ•ฐ

โ€œBinary logistic regressionโ€ใจใฏ ?

P ๐’™๐Ÿ, ๐’™๐Ÿ = ๐ˆ(๐’˜๐ŸŽ + ๐’˜๐Ÿ๐’™๐Ÿ + ๐’˜๐Ÿ๐’™๐Ÿ)

1-P ๐’™๐Ÿ, ๐’™๐Ÿ

positive

negative

Page 15: introduce "Stealing Machine Learning Models  via Prediction APIs"

Paper AISECjp

ๆคœ่จผใƒขใƒ‡ใƒซใฎๆง‹็ฏ‰

่จ“็ทดใƒ‡ใƒผใ‚ฟ(ex2data1) : ่ตค = positive, ้’ = negative

โ‡’ decision boundaryใ‚’ๆฑ‚ใ‚ใ‚‹

Page 16: introduce "Stealing Machine Learning Models  via Prediction APIs"

Paper AISECjp

ๆคœ่จผใƒขใƒ‡ใƒซใฎๆง‹็ฏ‰

่จ“็ทด็ตๆžœ

decision boundary : f ๐’™๐Ÿ, ๐’™๐Ÿ = 1.415 + 3.342 โˆ— ๐’™๐Ÿ + 3.089โˆ— ๐’™๐Ÿ

f(x1,x2)=0

f(x1,x2)>0

f(x1,x2)<0

positive

negative

Page 17: introduce "Stealing Machine Learning Models  via Prediction APIs"

Paper AISECjp

ๆคœ่จผใƒขใƒ‡ใƒซใฎๅˆฉ็”จใ‚คใƒกใƒผใ‚ธ

D B

LR model

UserP=0.055, neg

๐’™๐Ÿ, ๐’™๐Ÿ

ใƒปใƒปใƒป

๐’™๐’’๐Ÿ, ๐’™๐’’๐Ÿ

P=0.996, pos

ๅˆ†้กžใ•ใ›ใŸใ„ใƒ‡ใƒผใ‚ฟ(x1, x2)ใ‚’ๅ…ฅๅŠ›ใ—ใ€

ๅˆ†้กž็ตๆžœ(c=pos or neg)ใจ(ใ‚ฏใƒฉใ‚นใซๆ‰€ๅฑžใ™ใ‚‹)็ขบ็Ž‡(P)ใ‚’ๅพ—ใ‚‹ใ€‚

Page 18: introduce "Stealing Machine Learning Models  via Prediction APIs"

Paper AISECjp

ๆคœ่จผใƒขใƒ‡ใƒซใฎๆ‚ช็”จใ‚คใƒกใƒผใ‚ธ

D B

LR model

adversaryP=0.055, neg

๐’™๐Ÿ, ๐’™๐Ÿ

ใƒปใƒปใƒป

๐’™๐’’๐Ÿ, ๐’™๐’’๐Ÿ

P=0.996, pos

ๅ…ฅๅŠ›ใƒ‡ใƒผใ‚ฟ(x1, x2)ใจๅ‡บๅŠ›ใ•ใ‚Œใ‚‹็ขบ็Ž‡(P)ใ‚’ๅˆฉ็”จใ—ใ€

decision boundaryใ‚’็‰นๅฎšใ™ใ‚‹ใ€‚

f ๐’™๐Ÿ, ๐’™๐Ÿ = 1.42 + 3.34 โˆ— ๐’™๐Ÿ + 3.09โˆ— ๐’™๐Ÿ

Page 19: introduce "Stealing Machine Learning Models  via Prediction APIs"

Paper

ใฉใ†ใ‚„ใฃใฆใ‚„ใ‚‹ใฎใ‹๏ผŸ

AISECjp

Page 20: introduce "Stealing Machine Learning Models  via Prediction APIs"

Paper AISECjp

ๆ‰‹้ †๏ผ‘๏ผšๆƒ…ๅ ฑใฎๅŽ้›†

ใƒฆใƒผใ‚ถใฎๅ…ฅๅŠ› ใƒขใƒ‡ใƒซใฎๅ‡บๅŠ›

ใƒ‡ใƒผใ‚ฟ(x1, x2) ใ‚ฏใƒฉใ‚น ็ขบ็Ž‡(P)

-1.602 0.638 negative 0.123

-1.062 -0.536 negative 0.022

-1.539 0.361 negative 0.068

-0.282 1.086 positive 0.979

ใƒปใƒปใƒป ใƒปใƒปใƒป ใƒปใƒปใƒป ใƒปใƒปใƒป

ใƒปใƒขใƒ‡ใƒซใฎๅˆฉ็”จ็ตๆžœ

f ๐’™๐Ÿ, ๐’™๐Ÿ = ๐’˜๐ŸŽ โˆ’ ๐’˜๐Ÿ๐Ÿ. ๐Ÿ”๐ŸŽ๐Ÿ + ๐’˜๐Ÿ๐ŸŽ. ๐Ÿ”๐Ÿ‘๐Ÿ–

f ๐’™๐Ÿ, ๐’™๐Ÿ = ๐’˜๐ŸŽ โˆ’ ๐’˜๐Ÿ๐Ÿ. ๐ŸŽ๐Ÿ”๐Ÿ โˆ’ ๐’˜๐Ÿ๐ŸŽ. ๐Ÿ“๐Ÿ‘๐Ÿ”

f ๐’™๐Ÿ, ๐’™๐Ÿ = ๐’˜๐ŸŽ โˆ’ ๐’˜๐Ÿ๐Ÿ. ๐Ÿ“๐Ÿ‘๐Ÿ— + ๐’˜๐Ÿ๐ŸŽ. ๐Ÿ‘๐Ÿ”๐Ÿ

f ๐’™๐Ÿ, ๐’™๐Ÿ = ๐’˜๐ŸŽ โˆ’ ๐’˜๐Ÿ๐ŸŽ. ๐Ÿ๐Ÿ–๐Ÿ + ๐’˜๐Ÿ๐Ÿ. ๐ŸŽ๐Ÿ–๐Ÿ”

็›ฎ็š„ๅค‰ๆ•ฐใ€Œ ใ€ใฏ๏ผŸ

โ‡’็ขบ็Ž‡(P)ใ‚’ใƒญใ‚ธใƒƒใƒˆ้–ขๆ•ฐใ€Œ ใ€ใซ้€šใ™

f ๐’™๐Ÿ, ๐’™๐Ÿ

๐’๐’๐’ˆ๐’Š๐’• ๐‘ท = ๐’๐’๐’ˆ๐‘ท

๐Ÿ โˆ’ ๐‘ท

Page 21: introduce "Stealing Machine Learning Models  via Prediction APIs"

Paper AISECjp

ใƒฆใƒผใ‚ถใฎๅ…ฅๅŠ› ใƒขใƒ‡ใƒซใฎๅ‡บๅŠ›

ใƒ‡ใƒผใ‚ฟ(x1, x2) ใ‚ฏใƒฉใ‚น ็ขบ็Ž‡(P)

-1.602 0.638 negative 0.123

-1.062 -0.536 negative 0.022

-1.539 0.361 negative 0.068

-0.282 1.086 positive 0.979

ใƒปใƒปใƒป ใƒปใƒปใƒป ใƒปใƒปใƒป ใƒปใƒปใƒป

ใƒปใƒขใƒ‡ใƒซใฎๅˆฉ็”จ็ตๆžœ

โˆ’๐Ÿ. ๐Ÿ–๐Ÿ‘๐Ÿ— = ๐’˜๐ŸŽ โˆ’ ๐’˜๐Ÿ๐Ÿ. ๐Ÿ”๐ŸŽ๐Ÿ + ๐’˜๐Ÿ๐ŸŽ. ๐Ÿ”๐Ÿ‘๐Ÿ–

โˆ’๐Ÿ“. ๐Ÿ’๐Ÿ”๐Ÿ• = ๐’˜๐ŸŽ โˆ’ ๐’˜๐Ÿ๐Ÿ. ๐ŸŽ๐Ÿ”๐Ÿ โˆ’ ๐’˜๐Ÿ๐ŸŽ. ๐Ÿ“๐Ÿ‘๐Ÿ”

โˆ’๐Ÿ‘. ๐Ÿ•๐Ÿ”๐Ÿ— = ๐’˜๐ŸŽ โˆ’ ๐’˜๐Ÿ๐Ÿ. ๐Ÿ“๐Ÿ‘๐Ÿ— + ๐’˜๐Ÿ๐ŸŽ. ๐Ÿ‘๐Ÿ”๐Ÿ

๐Ÿ“. ๐Ÿ“๐Ÿ๐Ÿ‘ = ๐’˜๐ŸŽ โˆ’ ๐’˜๐Ÿ๐ŸŽ. ๐Ÿ๐Ÿ–๐Ÿ + ๐’˜๐Ÿ๐Ÿ. ๐ŸŽ๐Ÿ–๐Ÿ”

ๆ‰‹้ †๏ผ’๏ผšๆ–น็จ‹ๅผใ‚’่งฃใ(Equation-Solving)

ใƒป Equation-Solving ใฎ็ตๆžœ

็‰นๅฎšใ—ใŸไฟ‚ๆ•ฐ๏ผš

่ค‡่ฃฝใ—ใŸ้–ขๆ•ฐ๏ผš

๐’˜๐ŸŽ = 2.042 ๐’˜๐Ÿ = 4.822 ๐’˜๐Ÿ = 4.457

๐’‡ ๐’™๐Ÿ, ๐’™๐Ÿ = 2.042 + 4.822 โˆ— ๐‘ฅ1 + 4.457 โˆ— ๐‘ฅ2

Equation-Solving

Page 22: introduce "Stealing Machine Learning Models  via Prediction APIs"

Paper AISECjp

ใƒปใ‚ชใƒชใ‚ธใƒŠใƒซใฎใƒขใƒ‡ใƒซ

โ€œEquation-Solving Attacksโ€ใฎ็ตๆžœ

f ๐’™๐Ÿ, ๐’™๐Ÿ = 1.415 + 3.342 โˆ— ๐’™๐Ÿ + 3.089 โˆ— ๐’™๐Ÿ

ใƒป่ค‡่ฃฝใ—ใŸใƒขใƒ‡ใƒซ

๐’‡ ๐’™๐Ÿ, ๐’™๐Ÿ = 2.042 + 4.822 โˆ— ๐’™๐Ÿ + 4.457 โˆ— ๐’™๐Ÿ

่ค‡่ฃฝใƒขใƒ‡ใƒซใงๆญฃใ—ใๅˆ†้กžใงใใ‚‹ใฎใ‹๏ผŸ

Page 23: introduce "Stealing Machine Learning Models  via Prediction APIs"

Paper AISECjp

ใ‚ชใƒชใ‚ธใƒŠใƒซใจ่ค‡่ฃฝใƒขใƒ‡ใƒซใฎๆฏ”่ผƒ็ตๆžœ

ใƒฆใƒผใ‚ถใฎๅ…ฅๅŠ› ใ‚ชใƒชใ‚ธใƒŠใƒซใƒขใƒ‡ใƒซ ่ค‡่ฃฝใƒขใƒ‡ใƒซ

ใƒ‡ใƒผใ‚ฟ(x1, x2) ใ‚ฏใƒฉใ‚น ็ขบ็Ž‡(P) ใ‚ฏใƒฉใ‚น ็ขบ็Ž‡(P)

-1.602 0.638 negative 0.123 negative 0.055

-1.062 -0.536 negative 0.022 negative 0.004

-1.539 0.361 negative 0.068 negative 0.023

-0.282 1.086 positive 0.979 positive 0.996

0.692 0.493 positive 0.995 positive 0.999

-0.234 1.638 positive 0.997 positive 0.999

0.485 -1.064 negative 0.437 negative 0.410

0.585 -1.008 positive 0.564 positive 0.591

0.177 -0.729 negative 0.439 negative 0.412

ใƒปใƒปใƒป ใƒปใƒปใƒป ใƒปใƒปใƒป ใƒปใƒปใƒป ใƒปใƒปใƒป ใƒปใƒปใƒป

ใ‚ชใƒชใ‚ธใƒŠใƒซใจ่ค‡่ฃฝใƒขใƒ‡ใƒซใฎๅˆ†้กž็ตๆžœใฏๅฎŒๅ…จไธ€่‡ด๏ผˆn=100๏ผ‰

Page 24: introduce "Stealing Machine Learning Models  via Prediction APIs"

Paper AISECjp

ใƒปRounding confidences

ใƒขใƒ‡ใƒซใŒ่ฟ”ใ™Confidence Valuesใ‚’ไธธใ‚ใ‚‹ใ“ใจใง่ค‡่ฃฝ็ฒพๅบฆใ‚’ไธ‹ใ’ใ‚‹

ไพ‹๏ผ‰P= 0.437401116 โ‡’ P= 0.43

โ€œEquation-Solving Attacksโ€ใฎๅฏพ็ญ–

Effect of rounding on model extraction(็ดนไป‹่ซ–ๆ–‡ใ‹ใ‚‰ใฎๅผ•็”จ).

Page 25: introduce "Stealing Machine Learning Models  via Prediction APIs"

ๆฌกๅ›žใฎไบˆๅฎš (Equation-Solving Attacks)

Paper AISECjp

MLใƒขใƒ‡ใƒซใฎ่ค‡่ฃฝ

ใƒปBinary logistic regression๏ผˆโœ”๏ผ‰

ใƒปMulticlass LR and Multilayer Perceptron

่จ“็ทดใƒ‡ใƒผใ‚ฟใ‹ใ‚‰ใฎๆƒ…ๅ ฑๆผใˆใ„

ใƒปTraining Data Leakage for Kernel LR

ใƒปModel Inversion Attacks on Extracted Models

Page 26: introduce "Stealing Machine Learning Models  via Prediction APIs"

Download โ€œ.PDFโ€ version of this document:

โ‰ซ https://aisecjp.connpass.com/event/44600/