透過您的圖書館登入
IP:3.135.219.166
  • 學位論文

在深度學習模型中隱藏和執行惡意程式的方法論

Methodology of Hiding and Executing Malware in a Deep Learning Model

指導教授 : 黃俊郎
若您是本文的作者,可授權文章由華藝線上圖書館中協助推廣。

摘要


深度神經網絡 (DNN) 因其強大的功能而被廣泛用於構建人工智慧 (AI) 應用程序。 然而,安全問題也同時浮現。 將惡意程式隱藏在深度神經網絡模型中是一個攻擊層面。 同時,模型格式存在不安全的反序列化漏洞。 結合這兩個弱點可以實現攻擊流程。 這種攻擊的挑戰是嵌入率、準確性下降和提取工作的複雜度。 因此,本論文提供了在分類神經網絡模型中嵌入惡意程式的注入規則,並提出了一種使用注入規則的惡意程式注入方法。 提供了一種更全面的方法來實現高嵌入率、低精度下降和低複雜度的提取工作。

並列摘要


Deep Neural Networks (DNNs) are widely used to build artificial intelligence (AI) applications due to their powerful features. However, security concerns are emerging. Hiding malware inside the model is an attack surface. At the same time, the model format has an insecure deserialization vulnerability. Combining these two weaknesses can fulfill an attack flow. The challenges in this attack are the embedding rate, accuracy degradation, and extraction effort. Thus, this thesis provided injecting rules for embedding malware in classification neural network models and proposed a malware injection method using injecting rules. A more comprehensive methodology is offered to achieve a high embedding rate, low accuracy degradation, and less extraction effort.

參考文獻


Y. He, G. Meng, K. Chen, X. Hu, and J. He, “Towards security threats of deep learning systems: A survey,” IEEE Transactions on Software Engineering, 2020.
Q. Xiao, K. Li, D. Zhang, and W. Xu, “Security risks in deep learning implementations,” in 2018 IEEE Security and Privacy Workshops (SPW), pp. 123–128, 2018.
T. Liu, Z. Liu, Q. Liu, W. Wen, W. Xu, and M. Li, “Stegonet: Turn deep neural network into a stegomalware,” in Annual Computer Security Applications Conference, ACSAC ’20, (New York, NY, USA), p. 928–938, Association for Computing Machinery, 2020.
Z. Wang, C. Liu, and X. Cui, “Evilmodel: hiding malware inside of neural network models,” in 2021 IEEE Symposium on Computers and Communications (ISCC), pp. 1–7, IEEE, 2021.
G. Suarez-Tangil, J. E. Tapiador, and P. Peris-López, “Stegomalware: Playing hide and seek with malicious components in smartphone apps,” in Inscrypt, 2014.

延伸閱讀