NDSS 2025 – Compiled Models, Built-In Exploits
嗯,用户让我帮忙总结一篇文章的内容,控制在100字以内,而且不需要用特定的开头。首先,我需要仔细阅读文章内容,抓住主要信息。 这篇文章是关于DNN(深度神经网络)的攻击面研究。作者们发现,现有的防御措施主要针对模型权重,但忽略了编译后的DNN可执行文件中的新攻击面。他们通过利用模型结构(通常存储在可执行代码中),展示了即使不知道模型权重,也能进行有效的位翻转攻击。 研究结果表明,这种基于结构的攻击不仅有效,而且需要的位翻转次数很少,甚至比之前针对量化模型的攻击次数减少了23倍。这说明现有的防御机制对这些新攻击面无效。 接下来,我需要将这些要点浓缩到100字以内。确保涵盖主要发现:新攻击面、基于结构的攻击、量化模型的影响以及现有防御的不足。 最后,检查语言是否简洁明了,没有使用复杂的术语,并且符合用户的要求。 </think> 研究揭示了深度神经网络(DNN)可执行文件中被忽视的位翻转攻击面。现有防御主要针对模型权重,但编译后的DNN可执行文件通过利用公开的模型结构即可实现高效率攻击。研究表明,仅需少量位翻转即可显著降低模型准确性,甚至使量化模型性能降至随机猜测水平。此类攻击具有普遍性、可转移性和严重性,并能绕过现有防御机制。 2026-1-18 16:0:0 Author: securityboulevard.com(查看原文) 阅读量:0 收藏

Session 9B: DNN Attack Surfaces

Authors, Creators & Presenters: Yanzuo Chen (The Hong Kong University of Science and Technology), Zhibo Liu (The Hong Kong University of Science and Technology), Yuanyuan Yuan (The Hong Kong University of Science and Technology), Sihang Hu (Huawei Technologies), Tianxiang Li (Huawei Technologies), Shuai Wang (The Hong Kong University of Science and Technology)
PAPER
Compiled Models, Built-In Exploits: Uncovering Pervasive Bit-Flip Attack Surfaces in DNN Executables
Recent research has shown that bit-flip attacks (BFAs) can manipulate deep neural networks (DNNs) via DRAM Rowhammer exploitations. For high-level DNN models running on deep learning (DL) frameworks like PyTorch, extensive BFAs have been conducted to flip bits in model weights and shown effective. Defenses have also been proposed to guard model weights. Nevertheless, DNNs are increasingly compiled into DNN executables by DL compilers to leverage hardware primitives. These executables manifest new and distinct computation paradigms; we find existing research failing to accurately capture and expose the attack surface of BFAs on DNN executables. To this end, we launch the first systematic study of BFAs on DNN executables and reveal new attack surfaces neglected or underestimated in previous work. Specifically, prior BFAs in DL frameworks are limited to attacking model weights and assume a strong whitebox attacker with full knowledge of victim model weights, which is unrealistic as weights are often confidential. In contrast, we find that BFAs on DNN executables can achieve high effectiveness by exploiting the model structure (usually stored in the executable code), which only requires knowing the (often public) model structure. Importantly, such structure-based BFAs are pervasive, transferable, and more severe (e.g., single-bit flips lead to successful attacks) in DNN executables; they also slip past existing defenses. To realistically demonstrate the new attack surfaces, we assume a weak and more realistic attacker with no knowledge of victim model weights. We design an automated tool to identify vulnerable bits in victim executables with high confidence (70% compared to the baseline 2%). Launching this tool on DDR4 DRAM, we show that only 1.4 flips on average are needed to fully downgrade the accuracy of victim executables, including quantized models which could require 23× more flips previously, to random guesses. We comprehensively evaluate 16 DNN executables, covering three large-scale DNN models trained on three commonly-used datasets compiled by the two most popular DL compilers. Our finding calls for incorporating security mechanisms in future DNN compilation toolchains.
ABOUT NDSS
The Network and Distributed System Security Symposium (NDSS) fosters information exchange among researchers and practitioners of network and distributed system security. The target audience includes those interested in practical aspects of network and distributed system security, with a focus on actual system design and implementation. A major goal is to encourage and enable the Internet community to apply, deploy, and advance the state of available security technologies.

Our thanks to the Network and Distributed System Security (NDSS) Symposium for publishing their Creators, Authors and Presenter’s superb NDSS Symposium 2025 Conference content on the Organizations’ YouTube Channel.

Permalink

*** This is a Security Bloggers Network syndicated blog from Infosecurity.US authored by Marc Handelman. Read the original post at: https://www.youtube-nocookie.com/embed/Dg4jzCVpu5Y?si=u4Ei961fMNom1yIz


文章来源: https://securityboulevard.com/2026/01/ndss-2025-compiled-models-built-in-exploits/
如有侵权请联系:admin#unsafe.sh