Annual Computer Security Applications Conference (ACSAC) 2020

Full Program »

StegoNet: Turn Deep Neural Network into a Stegomalware

Deep Neural Networks (DNNs) are now presenting human-level performance on many real-world applications, and DNN-based intelligent services are becoming more and more popular across all aspects of our lives. Unfortunately, the ever-increasing DNN service implies a dangerous feature which has not yet been well studied--allowing the marriage of existing malware and DNN model for any pre-defined malicious purpose. In this paper, we comprehensively investigate how to turn DNN into a new breed evasive self-contained stegomalware, namely StegoNet, using model parameter as a novel payload injection channel, with no service quality degradation (i.e. accuracy) and the triggering event connected to the physical world by specified DNN inputs. A series of payload injection techniques contingent upon unique neural network natures like complex structure, high error resilience and huge parameter size, are developed for both uncompressed models (with redundancy) and deeply compressed models tailored for resource-limited devices (no redundancy), including LSB substitution, resilience training, value mapping, and sign-mapping. We also proposed a set of triggering techniques like logits trigger, rank trigger and fine-tuned rank trigger to trigger StegoNet by specific physical events under realistic environment variations. We implement the StegoNet prototype on Nvidia Jetson TX2 testbed. Extensive experimental results and discussions on the evasiveness, integrity of proposed payload injection techniques, and the reliability and sensitivity of the triggering techniques, well demonstrate the feasibility and practicality of StegoNet.

Tao Liu
Lawrence Technological University

Zihao Liu
Florida International University

Qi Liu
Lehigh University

Wujie Wen
Lehigh University

Wenyao Xu
SUNY Buffalo

Ming Li
University of Arizona

Paper (ACM DL)




Powered by OpenConf®
Copyright©2002-2021 Zakon Group LLC