{"created":"2025-01-19T01:45:22.614264+00:00","metadata":{"_oai":{"id":"oai:ipsj.ixsq.nii.ac.jp:00240913","sets":["6164:6165:6462:11854"]},"path":["11854"],"owner":"11","recid":"240913","title":["公開されたAIモデルに潜むリスクと新たな攻撃手法"],"pubdate":{"attribute_name":"PubDate","attribute_value":"2024-10-15"},"_buckets":{"deposit":"96db89b6-755d-40be-872b-149d323afe18"},"_deposit":{"id":"240913","pid":{"type":"depid","value":"240913","revision_id":0},"owners":[11],"status":"published","created_by":11},"item_title":"公開されたAIモデルに潜むリスクと新たな攻撃手法","author_link":["662184","662185","662186","662187","662188","662189","662190","662191"],"item_titles":{"attribute_name":"タイトル","attribute_value_mlt":[{"subitem_title":"公開されたAIモデルに潜むリスクと新たな攻撃手法","subitem_title_language":"ja"},{"subitem_title":"On the Risks Inherent in Publicly Released AI Models \\\\\\\\and New Attack Techniques","subitem_title_language":"en"}]},"item_type_id":"18","publish_date":"2024-10-15","item_language":{"attribute_name":"言語","attribute_value_mlt":[{"subitem_language":"jpn"}]},"item_18_text_3":{"attribute_name":"著者所属","attribute_value_mlt":[{"subitem_text_value":"早稲田大学"},{"subitem_text_value":"早稲田大学/理研AIP"},{"subitem_text_value":"NTTコミュニケーションズ株式会社"},{"subitem_text_value":"早稲田大学/NICT/理研AIP"}]},"item_18_text_4":{"attribute_name":"著者所属(英)","attribute_value_mlt":[{"subitem_text_value":"Waseda University","subitem_text_language":"en"},{"subitem_text_value":"Waseda University / RIKEN AIP","subitem_text_language":"en"},{"subitem_text_value":"NTT Communications","subitem_text_language":"en"},{"subitem_text_value":"Waseda University / NICT / RIKEN AIP","subitem_text_language":"en"}]},"item_publisher":{"attribute_name":"出版者","attribute_value_mlt":[{"subitem_publisher":"情報処理学会","subitem_publisher_language":"ja"}]},"publish_status":"0","weko_shared_id":-1,"item_file_price":{"attribute_name":"Billing file","attribute_type":"file","attribute_value_mlt":[{"url":{"url":"https://ipsj.ixsq.nii.ac.jp/record/240913/files/IPSJ-CSS2024167.pdf","label":"IPSJ-CSS2024167.pdf"},"date":[{"dateType":"Available","dateValue":"2026-10-15"}],"format":"application/pdf","billing":["billing_file"],"filename":"IPSJ-CSS2024167.pdf","filesize":[{"value":"891.5 kB"}],"mimetype":"application/pdf","priceinfo":[{"tax":["include_tax"],"price":"660","billingrole":"5"},{"tax":["include_tax"],"price":"330","billingrole":"6"},{"tax":["include_tax"],"price":"0","billingrole":"30"},{"tax":["include_tax"],"price":"0","billingrole":"46"},{"tax":["include_tax"],"price":"0","billingrole":"44"}],"accessrole":"open_date","version_id":"268b40bd-24a4-4d33-9b31-4fc6129fe7af","displaytype":"detail","licensetype":"license_note","license_note":"Copyright (c) 2024 by the Information Processing Society of Japan"}]},"item_18_creator_5":{"attribute_name":"著者名","attribute_type":"creator","attribute_value_mlt":[{"creatorNames":[{"creatorName":"若井, 琢朗"}],"nameIdentifiers":[{}]},{"creatorNames":[{"creatorName":"戸田, 宇亮"}],"nameIdentifiers":[{}]},{"creatorNames":[{"creatorName":"久保, 佑介"}],"nameIdentifiers":[{}]},{"creatorNames":[{"creatorName":"森, 達哉"}],"nameIdentifiers":[{}]}]},"item_18_creator_6":{"attribute_name":"著者名(英)","attribute_type":"creator","attribute_value_mlt":[{"creatorNames":[{"creatorName":"Takuro, Wakai","creatorNameLang":"en"}],"nameIdentifiers":[{}]},{"creatorNames":[{"creatorName":"Takaaki, Toda","creatorNameLang":"en"}],"nameIdentifiers":[{}]},{"creatorNames":[{"creatorName":"Yusuke, Kubo","creatorNameLang":"en"}],"nameIdentifiers":[{}]},{"creatorNames":[{"creatorName":"Tatsuya, Mori","creatorNameLang":"en"}],"nameIdentifiers":[{}]}]},"item_resource_type":{"attribute_name":"資源タイプ","attribute_value_mlt":[{"resourceuri":"http://purl.org/coar/resource_type/c_5794","resourcetype":"conference paper"}]},"item_18_description_7":{"attribute_name":"論文抄録","attribute_value_mlt":[{"subitem_description":"本論文は,公開されることを前提としたAIモデルに対する新たな攻撃手法として,「Weights Injection攻撃」と「Tensor Trigger攻撃」を提案し,その有効性を実証することを狙いとする.\nWeights Injection攻撃は,深層学習モデルの重みに悪意あるコードを埋め込み,推論時にそのコードが実行されるようにする手法であり,具体的には,精度に影響しない範囲でモデルを構成する約120万個のパラメータのうち,わずか36個を書き換えることで攻撃が成功することを明らかにした.一方,Tensor Trigger攻撃は,特定のトリガー画像を入力することで悪意あるコードが実行される攻撃手法であり,生成されたトリガー画像によって攻撃が実行される確率が高かったが,特に24ビット幅のコードを用いた攻撃では成功率が向上することが確認された.体系的な実験評価の結果,これらの攻撃手法が高い確率で成功し,たとえばC2エージェント攻撃では640,000ビットのコード埋め込みにもかかわらず,推論精度に影響を与えずに攻撃が成功することが示された.また,これらの攻撃がアンチウィルスソフトウェアの検知を回避するステルス性も有していることを確認した.最後に,これらの攻撃に対する防御手法や検知手法についても議論する.","subitem_description_type":"Other"}]},"item_18_description_8":{"attribute_name":"論文抄録(英)","attribute_value_mlt":[{"subitem_description":"This paper aims to propose and demonstrate the effectiveness of two novel attack techniques targeting AI models intended for public release: the ``Weights Injection Attack'' and the ``Tensor Trigger Attack.'' The Weights Injection Attack involves embedding malicious code into the weights of a deep neural network model, with the key finding that altering as few as 36 out of approximately 1.2 million parameters can successfully execute the attack without affecting model accuracy. On the other hand, the Tensor Trigger Attack involves executing malicious code through the input of a specific trigger image. It was observed that the attack had a high success rate, particularly when using 24-bit wide code, which further improved the success rate. Systematic experimental evaluation demonstrated that these attack methods are highly effective, as evidenced by the success of the C2 agent attack, which embedded 640,000 bits of code without compromising inference accuracy. Additionally, it was confirmed that these attacks possess stealth capabilities that allow them to evade detection by antivirus software. Finally, the paper discusses potential defense mechanisms and detection methods to counter these attacks.","subitem_description_type":"Other"}]},"item_18_biblio_info_10":{"attribute_name":"書誌情報","attribute_value_mlt":[{"bibliographicPageEnd":"1257","bibliographic_titles":[{"bibliographic_title":"コンピュータセキュリティシンポジウム2024論文集"}],"bibliographicPageStart":"1250","bibliographicIssueDates":{"bibliographicIssueDate":"2024-10-15","bibliographicIssueDateType":"Issued"}}]},"relation_version_is_last":true,"weko_creator_id":"11"},"id":240913,"updated":"2025-03-06T05:56:34.332748+00:00","links":{}}