Machine learning security needs new perspectives and incentives – TechTalks
At this years International Conference on Learning Representations (ICLR), a team of researchers from the University of Maryland presented an attack technique meant to slow down deep learning models that have been optimized for fast and sensitive operations. The attack, aptly named DeepSloth, targets adaptive deep neural networks, a range of deep learning architectures that cut down computations to speed up processing.
Recent years have seen growing interest in the security of machine learning and deep learning, and there are numerous papers and techniques on hacking and defending neural networks. But one thing made DeepSloth particularly interesting: The researchers at the University of Maryland were presenting a vulnerability in a technique they themselves had developed two years earlier.
In some ways, the story of DeepSloth illustrates the challenges that the machine learning community faces. On the one hand, many researchers and developers are racing to make deep learning available to different applications. On the other hand, their innovations cause new challenges of their own. And they need to actively seek out and address those challenges before they cause irreparable damage.
One of the biggest hurdles of deep learning the computational costs of training and running deep neural networks. Many deep learning models require huge amounts of memory and processing power, and therefore they can only run on servers that have abundant resources. This makes them unusable for applications that require all computations and data to remain on edge devices or need real-time inference and cant afford the delay caused by sending their data to a cloud server.
In the past few years, machine learning researchers have developed several techniques to make neural networks less costly. One range of optimization techniques called multi-exit architecture stops computations when a neural network reaches acceptable accuracy. Experiments show that for many inputs, you dont need to go through every layer of the neural network to reach a conclusive decision. Multi-exit neural networks save computation resources and bypass the calculations of the remaining layers when they become confident about their results.
In 2019, Yigitan Kaya, a Ph.D. student in Computer Science at the University of Maryland, developed a multi-exit technique called shallow-deep network, which could reduce the average inference cost of deep neural networks by up to 50 percent. Shallow-deep networks address the problem of overthinking, where deep neural networks start to perform unneeded computations that result in wasteful energy consumption and degrade the models performance. The shallow-deep network was accepted at the 2019 International Conference on Machine Learning (ICML).
Early-exit models are a relatively new concept, but there is a growing interest, Tudor Dumitras, Kayas research advisor and associate professor at the University of Maryland, told TechTalks. This is because deep learning models are getting more and more expensive computationally, and researchers look for ways to make them more efficient.
Dumitras has a background in cybersecurity and is also a member of the Maryland Cybersecurity Center. In the past few years, he has been engaged in research on security threats to machine learning systems. But while a lot of the work in the field focuses on adversarial attacks, Dumitras and his colleagues were interested in finding all possible attack vectors that an adversary might use against machine learning systems. Their work has spanned various fields including hardware faults, cache side-channel attacks, software bugs, and other types of attacks on neural networks.
While working on the deep-shallow network with Kaya, Dumitras and his colleagues started thinking about the harmful ways the technique might be exploited.
We then wondered if an adversary could force the system to overthink; in other words, we wanted to see if the latency and energy savings provided by early exit models like SDN are robust against attacks, he said.
Dumitras started exploring slowdown attacks on shallow-deep networks with Ionut Modoranu, then a cybersecurity research intern at the University of Maryland. When the initial work showed promising results, Kaya and Sanghyun Hong, another Ph.D. student at the University of Maryland, joined the effort. Their research eventually culminated into the DeepSloth attack.
Like adversarial attacks, DeepSloth relies on carefully crafted input that manipulates the behavior of machine learning systems. However, while classic adversarial examples force the target model to make wrong predictions, DeepSloth disrupts computations. The DeepSloth attack slows down shallow-deep networks by preventing them from making early exits and forcing them to carry out the full computations of all layers.
Slowdown attacks have the potential ofnegating the benefits ofmulti-exit architectures, Dumitras said.These architectures can halve the energy consumption of a deep neural network model at inference time, and we showed that for any input we can craft a perturbation that wipes out those savings completely.
The researchers findings show that the DeepSloth attack can reduce the efficacy of the multi-exit neural networks by 90-100 percent. In the simplest scenario, this can cause a deep learning system to bleed memory and compute resources and become inefficient at serving users.
But in some cases, it can cause more serious harm. For example, one use of multi-exit architectures involves splitting a deep learning model between two endpoints. The first few layers of the neural network can be installed on an edge location, such as a wearable or IoT device. The deeper layers of the network are deployed on a cloud server. The edge side of the deep learning model takes care of the simple inputs that can be confidently computed in the first few layers. In cases where the edge side of the model does not reach a conclusive result, it defers further computations to the cloud.
In such a setting, the DeepSloth attack would force the deep learning model to send all inferences to the cloud. Aside from the extra energy and server resources wasted, the attack could have much more destructive impact.
In a scenario typical for IoT deployments, where the model is partitioned between edge devices and the cloud, DeepSloth amplifies the latency by 1.55X, negating the benefits of model partitioning, Dumitras said. This could cause the edge device to miss critical deadlines, for instance in an elderly monitoring program that uses AI to quickly detect accidents and call for help if necessary.
While the researchers made most of their tests on deep-shallow networks, they later found that the same technique would be effective on other types of early-exit models.
As with most works on machine learning security, the researchers first assumed that an attacker has full knowledge of the target model and has unlimited computing resources to craft DeepSloth attacks. But the criticality of an attack also depends on whether it can be staged in practical settings, where the adversary has partial knowledge of the target and limited resources.
In most adversarial attacks, the attacker needs to have full access to the model itself, basically, they have an exact copy of the victim model, Kaya told TechTalks. This, of course, is not practical in many settings where the victim model is protected from outside, for example with an API like Google Vision AI.
To develop a realistic evaluation of the attacker, the researchers simulated an adversary who doesnt have full knowledge of the target deep learning model. Instead, the attacker has asurrogatemodel on which he tests and tunes the attack. The attacker thentransfers the attack to the actual target. The researchers trained surrogate models that have different neural network architectures, different training sets, and even different early-exit mechanisms.
We find that the attacker that uses a surrogate can still cause slowdowns (between 20-50%) in the victim model, Kaya said.
Such transfer attacks are much more realistic than full-knowledge attacks, Kaya said. And as long as the adversary has a reasonable surrogate model, he will be able to attack a black-box model, such as a machine learning system served through a web API.
Attacking a surrogate is effective because neural networks that perform similar tasks (e.g., object classification) tend to learn similar features (e.g., shapes, edges, colors), Kaya said.
Dumitras says DeepSloth is just the first attack that works in this threat model, and he believes more devastating slowdown attacks will be discovered. He also pointed out that, aside from multi-exit architectures, other speed optimization mechanisms are vulnerable to slowdown attacks. His research team tested DeepSloth on SkipNet, a special optimization technique for convolutional neural networks (CNN). Their findings showed that DeepSloth examples crafted for multi-exit architecture also caused slowdowns in SkipNet models.
This suggests thatthe two different mechanisms might share a deeper vulnerability, yet to be characterized rigorously, Dumitras said. I believe that slowdown attacks may become an important threat in the future.
The researchers also believe that security must be baked into the machine learning research process.
I dont think any researcher today who is doing work on machine learning is ignorant of the basic security problems. Nowadays even introductory deep learning courses include recent threat models like adversarial examples, Kaya said.
The problem, Kaya believes, has to do with adjusting incentives. Progress is measured on standardized benchmarks and whoever develops a new technique uses these benchmarks and standard metrics to evaluate their method, he said, adding that reviewers who decide on the fate of a paper also look at whether the method is evaluated according to their claims on suitable benchmarks.
Of course, when a measure becomes a target, it ceases to be a good measure, he said.
Kaya believes there should be a shift in the incentives of publications and academia. Right now, academics have a luxury or burden to make perhaps unrealistic claims about the nature of their work, he says. If machine learning researchers acknowledge that their solution will never see the light of day, their paper might be rejected. But their research might serve other purposes.
For example, adversarial training causes large utility drops, has poor scalability, and is difficult to get right, limitations that are unacceptable for many machine learning applications. But Kaya points out that adversarial training can have benefits that have been overlooked, such as steering models toward becoming more interpretable.
One of the implications of too much focus on benchmarks is that most machine learning researchers dont examine the implications of their work when applied to real-world settings and realistic settings.
Our biggest problem is that we treat machine learning security as an academic problem right now. So the problems we study and the solutions we design are also academic, Kaya says. We dont know if any real-world attacker is interested in using adversarial examples or any real-world practitioner in defending against them.
Kaya believes the machine learning community should promote and encourage research in understanding the actual adversaries of machine learning systems rather than dreaming up our own adversaries.
And finally, he says that authors of machine learning papers should be encouraged to do their homework and find ways to break their own solutions, as he and his colleagues did with the shallow-deep networks. And researchers should be explicit and clear about the limits and potential threats of their machine learning models and techniques.
If we look at the papers proposing early-exit architectures, we see theres no effort to understand security risks although they claim that these solutions are of practical value, he says. If an industry practitioner finds these papers and implements these solutions, they are not warned about what can go wrong. Although groups like ours try to expose potential problems, we are less visible to a practitioner who wants to use an early-exit model. Even including a paragraph about the potential risks involved in a solution goes a long way.
More:
Machine learning security needs new perspectives and incentives - TechTalks
- Portable Electronic Nose with Machine Learning Enhances VOC Detection in Forensic Science - Chromatography Online - September 15th, 2025 [September 15th, 2025]
- Developing a predictive model for breast cancer detection using radiomics-based mammography and machine learning - SpringerOpen - September 13th, 2025 [September 13th, 2025]
- and correlation of drug solubility via hybrid machine learning and gradient based optimization - Nature - September 11th, 2025 [September 11th, 2025]
- Rice-Houston Methodist partnership uses machine learning to reveal hidden patient groups in common heart valve disease - Rice University - September 11th, 2025 [September 11th, 2025]
- Amazon Uses Machine Learning to Tell Sellers if FBA Is a Good Fit - EcommerceBytes - September 11th, 2025 [September 11th, 2025]
- Eli Lilly Launches AI, Machine Learning Platform Called TuneLab For Biotech Companies - Stocktwits - September 11th, 2025 [September 11th, 2025]
- How AI and Machine Learning are Shaping the Future of Mobile Apps - indiatechnologynews.in - September 11th, 2025 [September 11th, 2025]
- Hybrid AI and semiconductor approaches for power quality improvement - Machine Learning Week 2025 - September 9th, 2025 [September 9th, 2025]
- The Predictive Turn | Preparing to Outthink Adversaries Through Predictive Analytics - Machine Learning Week 2025 - September 9th, 2025 [September 9th, 2025]
- NFL player props, odds and bets: Week 1, 2025 NFL picks, SportsLine Machine Learning Model AI predictions, SGP - CBS Sports - September 9th, 2025 [September 9th, 2025]
- Can machine learning forecast Lobo EV Technologies Ltd. recovery - Bear Alert & Daily Price Action Insights - Newser - September 6th, 2025 [September 6th, 2025]
- Generalised Machine Learning Models Outperform Personalised Models For Cognitive Load Classification In Real-Life Settings - Frontiers - September 6th, 2025 [September 6th, 2025]
- Machine learning for the prediction of blood transfusion risk during or after mitral valve surgery: a multicenter retrospective cohort study - Nature - September 6th, 2025 [September 6th, 2025]
- Machine Learning-Driven Exploration of Composition- and Temperature-Dependent Transport and Thermodynamic Properties in LiF-NaF-KF Molten Salts for... - September 6th, 2025 [September 6th, 2025]
- Machine learning analysis reveals tumor heterogeneity and stromal-immune niches in breast cancer - Nature - September 6th, 2025 [September 6th, 2025]
- Identification of Postoperative Weight Loss Trajectories and Development of a Machine Learning-Based Tool for Predicting Malnutrition in Gastric... - September 6th, 2025 [September 6th, 2025]
- The Relationship Between Number of Pregnancies and Serum 25-Hydroxyvitamin D Levels in Women with a Prior Pregnancy: A Cross - Sectional Analysis,... - September 6th, 2025 [September 6th, 2025]
- Tohoku University Researchers Use Machine Learning to Identify Factors Improving Nickel-Based Catalysts for CO Methanation - geneonline.com - September 6th, 2025 [September 6th, 2025]
- Combining machine learning predictions for Galaxy Payroll Group Limited - Quarterly Growth Report & AI Forecast Swing Trade Picks - Newser - September 5th, 2025 [September 5th, 2025]
- Can machine learning forecast CLSKW recovery - 2025 Breakouts & Breakdowns & Daily Profit Maximizing Trade Tips - Newser - September 5th, 2025 [September 5th, 2025]
- Can machine learning forecast Granite Real Estate Investment Trust recovery - July 2025 Spike Watch & Growth Focused Stock Reports - Newser - September 5th, 2025 [September 5th, 2025]
- Can machine learning forecast VERU recovery - July 2025 Intraday Action & AI Forecasted Entry/Exit Points - Newser - September 5th, 2025 [September 5th, 2025]
- Can machine learning forecast VCI Global Limited recovery - Market Rally & Expert-Curated Trade Recommendations - Newser - September 5th, 2025 [September 5th, 2025]
- Combining machine learning predictions for AutoNation Inc. - Weekly Trend Summary & Weekly Breakout Watchlists - Newser - September 5th, 2025 [September 5th, 2025]
- Combining machine learning predictions for PLXS - Options Play & Fast Gain Stock Trading Tips - Newser - September 5th, 2025 [September 5th, 2025]
- Can machine learning forecast Valens Semiconductor Ltd. recovery - July 2025 Action & Free Growth Oriented Trading Recommendations - Newser - September 5th, 2025 [September 5th, 2025]
- Improve cost visibility of Machine Learning workloads on Amazon EKS with AWS Split Cost Allocation Data - Amazon Web Services - September 5th, 2025 [September 5th, 2025]
- Can machine learning forecast LFT.PRA recovery - Weekly Trade Recap & Daily Profit Maximizing Trade Tips - Newser - September 5th, 2025 [September 5th, 2025]
- Can machine learning forecast TEAM recovery - 2025 Pullback Review & Free Weekly Chart Analysis and Trade Guides - Newser - September 5th, 2025 [September 5th, 2025]
- Combining machine learning predictions for MSBIP - Weekly Profit Analysis & AI Powered Market Entry Strategies - Newser - September 5th, 2025 [September 5th, 2025]
- Revolutionizing Antibody Discovery with Machine Learning - BIOENGINEER.ORG - September 5th, 2025 [September 5th, 2025]
- The good and bad of machine learning | Letters - The Guardian - September 3rd, 2025 [September 3rd, 2025]
- I'm a machine learning engineer at Amazon who anticipated the ML boom. Here's my advice for staying ahead. - AOL.com - September 3rd, 2025 [September 3rd, 2025]
- Combining machine learning predictions for Dogwood Therapeutics Inc. - July 2025 Breakouts & Weekly Setup with High ROI Potential - Newser - September 3rd, 2025 [September 3rd, 2025]
- Phenotyping valvular heart diseases using the lens of unsupervised machine learning: a scoping review - Nature - September 3rd, 2025 [September 3rd, 2025]
- Students use machine learning to track and protect whale populations - Technology Org - September 3rd, 2025 [September 3rd, 2025]
- Combining machine learning predictions for Triller Group Inc. Equity Warrant - Gap Up & Weekly High Conviction Ideas - Newser - September 3rd, 2025 [September 3rd, 2025]
- Combining machine learning predictions for DallasNews Corporation - Quarterly Trade Report & Technical Entry and Exit Tips - Newser - September 3rd, 2025 [September 3rd, 2025]
- Combining machine learning predictions for System1 Inc. - Weekly Gains Summary & Risk Adjusted Swing Trade Ideas - Newser - September 3rd, 2025 [September 3rd, 2025]
- Unlocking the impossible without compromising on creative control: iZotope Ozone 12 adds new machine learning modules and a more musician-friendly AI... - September 3rd, 2025 [September 3rd, 2025]
- What machine learning models say about SLND.WS - Quarterly Trade Report & Technical Entry and Exit Tips - Newser - September 3rd, 2025 [September 3rd, 2025]
- Combining machine learning predictions for Chemed Corporation - Weekly Stock Recap & Growth Focused Entry Reports - Newser - September 3rd, 2025 [September 3rd, 2025]
- Combining machine learning predictions for TAP.A - Earnings Growth Report & Entry Point Confirmation Alerts - Newser - September 3rd, 2025 [September 3rd, 2025]
- Bridging known and unknown dynamics by transformer-based machine-learning inference from sparse observations - Nature - September 3rd, 2025 [September 3rd, 2025]
- Combining machine learning predictions for Inseego Corp. - July 2025 Retail & Technical Confirmation Trade Alerts - Newser - September 3rd, 2025 [September 3rd, 2025]
- Can machine learning forecast Aditxt Inc. recovery - July 2025 Update & Expert Curated Trade Ideas - Newser - September 3rd, 2025 [September 3rd, 2025]
- I'm a machine learning engineer at Amazon who anticipated the ML boom. Here's my advice for staying ahead. - Business Insider - September 1st, 2025 [September 1st, 2025]
- Machine learning climbs the Jacobs Ladder of optoelectronic properties - Nature - September 1st, 2025 [September 1st, 2025]
- Predicting factors associated with anxiety by patients undergoing treatment for infectious diseases using a random-forest machine learning approach -... - September 1st, 2025 [September 1st, 2025]
- Hideo Kojima used "an AI machine learning rig" to painstakingly download his celebrity friends to Death Stranding 2, but he wasn't happy... - September 1st, 2025 [September 1st, 2025]
- Fibro predict a machine learning risk score for advanced liver fibrosis in the general population using Israeli electronic health records - Nature - September 1st, 2025 [September 1st, 2025]
- Machine learning for preventing stillbirths: is it possible to transform data into life-saving insights? - BMC Pregnancy and Childbirth - September 1st, 2025 [September 1st, 2025]
- Can machine learning forecast Kura Sushi USA Inc. recovery - 2025 Fundamental Recap & AI Based Buy and Sell Signals - Newser - September 1st, 2025 [September 1st, 2025]
- Combining machine learning predictions for China Liberal Education Holdings Limited - Weekly Profit Recap & Weekly Breakout Watchlists - Newser - September 1st, 2025 [September 1st, 2025]
- Can machine learning forecast Tyson Foods Inc. recovery - 2025 Trade Ideas & Smart Swing Trading Techniques - Newser - September 1st, 2025 [September 1st, 2025]
- Can machine learning forecast GLBZ recovery - July 2025 Movers & AI Based Buy and Sell Signals - Newser - September 1st, 2025 [September 1st, 2025]
- What machine learning models say about Sypris Solutions Inc. - Market Performance Recap & Real-Time Volume Trigger Notifications - Newser - September 1st, 2025 [September 1st, 2025]
- What machine learning models say about Astria Therapeutics Inc. - July 2025 News Drivers & Real-Time Buy Signal Alerts - Newser - September 1st, 2025 [September 1st, 2025]
- Can machine learning forecast CRTO recovery - July 2025 Analyst Calls & Growth Focused Investment Plans - Newser - September 1st, 2025 [September 1st, 2025]
- Can machine learning forecast Exelon Corporation recovery - Exit Point & Pattern Based Trade Signal System - Newser - September 1st, 2025 [September 1st, 2025]
- What machine learning models say about OFIX - Bond Market & Long-Term Safe Investment Plans - Newser - September 1st, 2025 [September 1st, 2025]
- Can machine learning forecast Beneficient recovery - Weekly Trade Recap & Breakout Confirmation Alerts - Newser - September 1st, 2025 [September 1st, 2025]
- Can machine learning forecast BTBDW recovery - 2025 Geopolitical Influence & Weekly High Momentum Picks - Newser - September 1st, 2025 [September 1st, 2025]
- Can machine learning forecast Tri Pointe Homes Inc. recovery - July 2025 WrapUp & Free Long-Term Investment Growth Plans - Newser - September 1st, 2025 [September 1st, 2025]
- Can machine learning forecast TeraWulf Inc. recovery - Market Movement Recap & Community Supported Trade Ideas - Newser - September 1st, 2025 [September 1st, 2025]
- Combining machine learning predictions for Alset Inc. - 2025 Technical Patterns & Precise Buy Zone Identification - Newser - September 1st, 2025 [September 1st, 2025]
- Can machine learning forecast Exelon Corporation recovery - 2025 Bull vs Bear & Smart Allocation Stock Reports - Newser - September 1st, 2025 [September 1st, 2025]
- Can machine learning forecast Token Cat Limited Depositary Receipt recovery - 2025 Price Action Summary & Breakout Confirmation Alerts - Newser - September 1st, 2025 [September 1st, 2025]
- Combining machine learning predictions for BT Brands Inc. - Market Performance Recap & Verified Technical Trade Signals - Newser - September 1st, 2025 [September 1st, 2025]
- 7 Beginner Machine Learning Projects To Complete This Weekend - KDnuggets - August 29th, 2025 [August 29th, 2025]
- Machine learning approaches for predicting the construction time of drill-and-blast tunnels - Nature - August 29th, 2025 [August 29th, 2025]
- Combining machine learning predictions for KKR.PRD - July 2025 Closing Moves & Technical Pattern Recognition Alerts - Newser - August 29th, 2025 [August 29th, 2025]
- Leveraging data analytics to revolutionize cybersecurity with machine learning and deep learning - Nature - August 29th, 2025 [August 29th, 2025]
- Can machine learning forecast Yext Inc. recovery - Earnings Performance Report & Accurate Buy Signal Notifications - Newser - August 29th, 2025 [August 29th, 2025]
- Combining machine learning predictions for Mercer International Inc. - July 2025 Highlights & Real-Time Volume Analysis - Newser - August 29th, 2025 [August 29th, 2025]
- Combining machine learning predictions for Kandal M Venture Limited - Inflation Watch & Verified Technical Signals - Newser - August 29th, 2025 [August 29th, 2025]
- Combining machine learning predictions for Asbury Automotive Group Inc. - July 2025 Intraday Action & Daily Volume Surge Signals - Newser - August 29th, 2025 [August 29th, 2025]
- Can machine learning forecast NINE recovery - Quarterly Performance Summary & Technical Entry and Exit Tips - Newser - August 29th, 2025 [August 29th, 2025]
- IQUP identifies quantitatively unreliable spectra with machine learning for isobaric labeling-based proteomics - Nature - August 29th, 2025 [August 29th, 2025]
- Can machine learning forecast HealthEquity Inc. recovery - Exit Point & High Accuracy Buy Signal Tips - Newser - August 29th, 2025 [August 29th, 2025]