论文标题
querysnout:自动发现针对基于查询的系统的属性推理攻击
QuerySnout: Automating the Discovery of Attribute Inference Attacks against Query-Based Systems
论文作者
论文摘要
尽管基于查询的系统(QB)已成为匿名共享数据的主要解决方案之一,但构建QBSE可靠地保护个人对数据集贡献的个人的隐私是一个难题。依赖差异隐私保证的理论解决方案很难以合理的精度正确实施,而临时解决方案可能包含未知的漏洞。因此,必须通过评估广泛的隐私攻击的准确性来评估QBSE提供的隐私。但是,现有的攻击需要时间和专业知识才能开发,需要对受攻击的特定系统进行手动量身定制,并且范围有限。在本文中,我们开发了Querysnout(QS),这是第一种自动发现QBSE中漏洞的方法。 QS将目标记录和QB作为黑匣子作为输入,分析其在一个或多个数据集上的行为,并输出多个查询以及一条规则以将答案的答案结合起来,以揭示目标记录的敏感属性。 QS使用基于新型突变操作员的进化搜索技术来查找易于导致攻击的多个查询,然后机器学习分类器从所选查询的答案中推断出敏感属性。我们通过将QS应用于两个攻击场景,三个现实世界数据集和各种保护机制来展示QS的多功能性。我们显示了QS始终如一地等同或跑赢大幅攻击的攻击,有时是很大的边距,这是文献的最佳攻击。我们最终展示了如何将QS扩展到需要预算的QBS,并根据拉普拉斯机制将QS应用于简单的QB。综上所述,我们的结果表明,自动化系统已经可以发现对QBS的强大和准确的攻击,从而可以自动测试“按下按钮”。
Although query-based systems (QBS) have become one of the main solutions to share data anonymously, building QBSes that robustly protect the privacy of individuals contributing to the dataset is a hard problem. Theoretical solutions relying on differential privacy guarantees are difficult to implement correctly with reasonable accuracy, while ad-hoc solutions might contain unknown vulnerabilities. Evaluating the privacy provided by QBSes must thus be done by evaluating the accuracy of a wide range of privacy attacks. However, existing attacks require time and expertise to develop, need to be manually tailored to the specific systems attacked, and are limited in scope. In this paper, we develop QuerySnout (QS), the first method to automatically discover vulnerabilities in QBSes. QS takes as input a target record and the QBS as a black box, analyzes its behavior on one or more datasets, and outputs a multiset of queries together with a rule to combine answers to them in order to reveal the sensitive attribute of the target record. QS uses evolutionary search techniques based on a novel mutation operator to find a multiset of queries susceptible to lead to an attack, and a machine learning classifier to infer the sensitive attribute from answers to the queries selected. We showcase the versatility of QS by applying it to two attack scenarios, three real-world datasets, and a variety of protection mechanisms. We show the attacks found by QS to consistently equate or outperform, sometimes by a large margin, the best attacks from the literature. We finally show how QS can be extended to QBSes that require a budget, and apply QS to a simple QBS based on the Laplace mechanism. Taken together, our results show how powerful and accurate attacks against QBSes can already be found by an automated system, allowing for highly complex QBSes to be automatically tested "at the pressing of a button".