Unleashing the Tiger: Inference Attacks on Split Learning

Dario Pasquini, Giuseppe Ateniese, Massimo Bernaschi

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

119 Scopus citations

Abstract

We investigate the security of split learning - -a novel collaborative machine learning framework that enables peak performance by requiring minimal resource consumption. In the present paper, we expose vulnerabilities of the protocol and demonstrate its inherent insecurity by introducing general attack strategies targeting the reconstruction of clients' private training sets. More prominently, we show that a malicious server can actively hijack the learning process of the distributed model and bring it into an insecure state that enables inference attacks on clients' data. We implement different adaptations of the attack and test them on various datasets as well as within realistic threat scenarios. We demonstrate that our attack can overcome recently proposed defensive techniques aimed at enhancing the security of the split learning protocol. Finally, we also illustrate the protocol's insecurity against malicious clients by extending previously devised attacks for Federated Learning.

Original languageEnglish
Title of host publicationCCS 2021 - Proceedings of the 2021 ACM SIGSAC Conference on Computer and Communications Security
Pages2113-2129
Number of pages17
ISBN (Electronic)9781450384544
DOIs
StatePublished - 13 Nov 2021
Event27th ACM Annual Conference on Computer and Communication Security, CCS 2021 - Virtual, Online, Korea, Republic of
Duration: 15 Nov 202119 Nov 2021

Publication series

NameProceedings of the ACM Conference on Computer and Communications Security
ISSN (Print)1543-7221

Conference

Conference27th ACM Annual Conference on Computer and Communication Security, CCS 2021
Country/TerritoryKorea, Republic of
CityVirtual, Online
Period15/11/2119/11/21

Keywords

  • ML security
  • collaborative learning
  • deep learning

Fingerprint

Dive into the research topics of 'Unleashing the Tiger: Inference Attacks on Split Learning'. Together they form a unique fingerprint.

Cite this