Skip to main content

Showing 1–3 of 3 results for author: Hackett, W

Searching in archive cs. Search in all archives.
.
  1. arXiv:2309.16577  [pdf, other

    cs.LG cs.CR

    Compilation as a Defense: Enhancing DL Model Attack Robustness via Tensor Optimization

    Authors: Stefan Trawicki, William Hackett, Lewis Birch, Neeraj Suri, Peter Garraghan

    Abstract: Adversarial Machine Learning (AML) is a rapidly growing field of security research, with an often overlooked area being model attacks through side-channels. Previous works show such attacks to be serious threats, though little progress has been made on efficient remediation strategies that avoid costly model re-engineering. This work demonstrates a new defense against AML side-channel attacks usin… ▽ More

    Submitted 20 September, 2023; originally announced September 2023.

    Comments: 2 pages, 1 figure, CAMLIS 2023 Fast Abstract

  2. arXiv:2309.10544  [pdf, other

    cs.LG cs.AI cs.CL cs.CR

    Model Leeching: An Extraction Attack Targeting LLMs

    Authors: Lewis Birch, William Hackett, Stefan Trawicki, Neeraj Suri, Peter Garraghan

    Abstract: Model Leeching is a novel extraction attack targeting Large Language Models (LLMs), capable of distilling task-specific knowledge from a target LLM into a reduced parameter model. We demonstrate the effectiveness of our attack by extracting task capability from ChatGPT-3.5-Turbo, achieving 73% Exact Match (EM) similarity, and SQuAD EM and F1 accuracy scores of 75% and 87%, respectively for only $5… ▽ More

    Submitted 19 September, 2023; originally announced September 2023.

  3. arXiv:2209.06300  [pdf, other

    cs.CR cs.AI cs.LG

    PINCH: An Adversarial Extraction Attack Framework for Deep Learning Models

    Authors: William Hackett, Stefan Trawicki, Zhengxin Yu, Neeraj Suri, Peter Garraghan

    Abstract: Adversarial extraction attacks constitute an insidious threat against Deep Learning (DL) models in-which an adversary aims to steal the architecture, parameters, and hyper-parameters of a targeted DL model. Existing extraction attack literature have observed varying levels of attack success for different DL models and datasets, yet the underlying cause(s) behind their susceptibility often remain u… ▽ More

    Submitted 31 January, 2023; v1 submitted 13 September, 2022; originally announced September 2022.

    Comments: 19 pages, 13 figures, 5 tables