Access Control and Machine Learning: Evasion and Defenses

Research output: ThesisDoctoral ThesisCollection of Articles

Abstract

Machine learning (ML) and artificial intelligence (AI) systems have experienced significant proliferation during the recent years, for example in the new market of "machine learning as a service". ML is also increasingly being deployed in security-critical applications, such as access control systems. ML can be used to make security systems easier to use, or to defend against specific attacks, such as the "relay attack".  Such ML applications are particularly sensitive to the recent development of  "adversarial machine learning", where weaknesses in machine learning systems are exploited to undermine some security-critical property. For example, "evasion attacks" undermine a ML system's prediction integrity, while "model extraction attacks" undermine the system's confidentiality. It has become increasingly important to evaluate ML applications against such undesired behavior.  The work described in this dissertation is divided into three parts. In the first part, I evaluate how security properties in so-called transparent authentication systems can be improved using machine learning, and describe how to evaluate security against strong adversaries. In the second part, I present state-of-the-art evasion and model extraction attacks against image classification systems. In the third part, I evaluate state-of-the-art hate speech classifiers against evasion attacks, and present a method of artificially creating credible fake restaurant reviews. Finally, I present general observations and conclusions about both transparent authentication, and the feasibility of using ML for purposes such as moderation.
Original languageEnglish
QualificationDoctor's degree
Awarding Institution
  • Aalto University
Supervisors/Advisors
  • Asokan, N., Supervisor
Publisher
Print ISBNs978-952-60-8650-7
Electronic ISBNs978-952-60-8651-4
Publication statusPublished - 2019
MoE publication typeG5 Doctoral dissertation (article)

Keywords

  • access control
  • machine learning
  • evasion
  • defense
  • adversarial machine learning

Fingerprint Dive into the research topics of 'Access Control and Machine Learning: Evasion and Defenses'. Together they form a unique fingerprint.

  • Equipment

    Science-IT

    Mikko Hakala (Manager)

    School of Science

    Facility/equipment: Facility

  • Cite this