-
Notifications
You must be signed in to change notification settings - Fork 328
Closed
Labels
Description
Is there an existing issue for this?
- I have searched the existing issues
Feature Description
Our proposed approach follows the steps:
- Model Size Optimization: Optimize the model by capturing and storing compressed snapshots, focusing on essential components to reduce size.
- Storage and Decryption: Store the encrypted model in the browser's cache and perform decryption within a Trusted Execution Environment (TEE).
- In-Memory Execution: Execute the decrypted model in-memory, avoiding persistent storage of sensitive data.
- Obfuscation: Use advanced obfuscation techniques to secure the model and decryption process, making reverse engineering more difficult.
- Runtime Integrity Checks: Implement runtime checks with digital signatures or hash functions to continuously verify model authenticity and detect tampering.
Use Case
Consider a scenario where a web application uses a machine learning (ML) model for face authentication or sensitive data analysis. Storing and running the model locally could expose it to tampering or reverse engineering. By using a Trusted Execution and In-Memory Model Protection framework, the model is securely stored and decrypted in a Trusted Execution Environment (TEE) and executed in memory without persisting sensitive information. This ensures the model is protected even in a vulnerable browser environment.
Benefits
- Increased Security: Sensitive ML models are encrypted and decrypted only within a secure TEE, minimizing exposure to attacks.
- Tamper-Resistance: In-memory execution prevents unauthorized access to the decrypted model, as it never gets stored in an unprotected state.
- Reduced Risk of Reverse Engineering: Obfuscation techniques protect the model and decryption logic, making it more difficult for attackers to reverse-engineer or manipulate the ML model.
- Efficient Model Execution: In-memory execution provides faster processing times while maintaining security, improving performance in real-time applications.
Add ScreenShots
No response
Priority
High
Record
- I have read the Contributing Guidelines
- I'm a GSSOC'24 contributor
- I want to work on this issue