Modular framework to run Property Inference Attacks on Machine Learning models.
Project description
Property Inference Attacks
In this repository, we propose a modular framework to run Property Inference Attacks on Machine Learning models.
Installation
You can get this package directly from pip:
python -m pip install propinfer
Please note that PyTorch is required to run this framework. Please find installation instructions corresponding to you here.
Usage
This framework is made modular for any of your experiments: you simply should define subclasses of Generator
and Model
to represent your data source and your evaluated model respectively.
From these, you can create a specific experiment configuration file. We suggest using hydra for your configurations, but parameters can also be passed in a standard dict
.
Alternatively, you can extend the Experiment class.
Threat models and attacks
White-Box
In this threat model, we have access to the model's parameters directly. In this case, [1] defines three different attacks:
- Simple meta-classifier attack
- Simple meta-classifier attack, with layer weights' sorting
- DeepSets attack
They are respectively designated by the keywords Naive
, Sort
and DeepSets
.
Grey- and Black-Box
In this threat model, we have only query access to the model (we do not know its parameters). In the scope of the Grey-Box threat model, we know the model's architecture and hyperparameters - in the scope of Black-Box we do not.
For the Grey-Box case, [2] describes two simple attacks:
- The Loss Test (represented by the
LossTest
keyword) - The Threshold Test (represented by the
ThresholdTest
keyword)
[3] also proposes a meta-classifier-based attack, that we use for both the Grey-Box and Black-Box cases: these are respectively represented by the GreyBox
and BlackBox
keywords. For the latter case, we simply default on a pre-defined model architecture.
Running an experiment
To run an experiment, you have to instanciate an Experiment
object using a specific Generator
and Model
, and then run both targets and shadows before performing an attack.
It is possible to provide a list as a model hyperparameter: in that case, the framework will automatically optimise between the given options.
References
[1] Karan Ganju, Qi Wang, Wei Yang, Carl A. Gunter, and Nikita Borisov. 2018. Property Inference Attacks on Fully Connected Neural Networks using Permutation Invariant Representations. In Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security (CCS '18). Association for Computing Machinery, New York, NY, USA, 619–633. DOI:https://doi.org/10.1145/3243734.3243834
[2] Anshuman Suri, David Evans. 2021. Formalizing Distribution Inference Risks. 2021 Workshop on Theory and Practice of Differential Privacy, ICML. https://arxiv.org/abs/2106.03699
[3] Wanrong Zhang, Shruti Tople, Olga Ohrimenko. 2021. Leakage of Dataset Properties in Multi-Party Machine Learning. https://arxiv.org/abs/2006.07267
Project details
Download files
Download the file for your platform. If you're not sure which to choose, learn more about installing packages.
Source Distribution
Built Distribution
File details
Details for the file propinfer-1.2.0.tar.gz
.
File metadata
- Download URL: propinfer-1.2.0.tar.gz
- Upload date:
- Size: 14.8 kB
- Tags: Source
- Uploaded using Trusted Publishing? No
- Uploaded via: twine/3.8.0 pkginfo/1.8.2 readme-renderer/32.0 requests/2.27.1 requests-toolbelt/0.9.1 urllib3/1.26.8 tqdm/4.62.3 importlib-metadata/4.11.1 keyring/23.5.0 rfc3986/2.0.0 colorama/0.4.4 CPython/3.9.7
File hashes
Algorithm | Hash digest | |
---|---|---|
SHA256 | 6db8c26eda03e4ceed3b27ac84aa47a6439f1b859eddea346e2a47a5ae9afbd6 |
|
MD5 | ea3a1e77bc556536e7821548e9b172f5 |
|
BLAKE2b-256 | b2348c7e17ead9965ad3ad17b23e1a56ffdf3c62147ad8cb2a97f8bb07807b66 |
File details
Details for the file propinfer-1.2.0-py3-none-any.whl
.
File metadata
- Download URL: propinfer-1.2.0-py3-none-any.whl
- Upload date:
- Size: 15.4 kB
- Tags: Python 3
- Uploaded using Trusted Publishing? No
- Uploaded via: twine/3.8.0 pkginfo/1.8.2 readme-renderer/32.0 requests/2.27.1 requests-toolbelt/0.9.1 urllib3/1.26.8 tqdm/4.62.3 importlib-metadata/4.11.1 keyring/23.5.0 rfc3986/2.0.0 colorama/0.4.4 CPython/3.9.7
File hashes
Algorithm | Hash digest | |
---|---|---|
SHA256 | c4cfb0cec538790c07461fb9db1891584521f5adc31631fd5b17b6e41b1766a1 |
|
MD5 | b7701e9916d998db696884aadf6cbb8e |
|
BLAKE2b-256 | 75e7160e46ef98d3ee99692ed162110d7db2cda807b7e59964dca76eaeb5e4cc |