{"title":"SLAPP:基于执行状态证明的联邦学习和差分隐私中毒预防","authors":"Norrathep Rattanavipanon;Ivan De Oliveira Nunes","doi":"10.1109/TIFS.2025.3555179","DOIUrl":null,"url":null,"abstract":"The rise of IoT-driven distributed data analytics, coupled with increasing privacy concerns, has led to a demand for effective privacy-preserving and federated data collection/model training mechanisms. In response, approaches such as Federated Learning (FL) and Local Differential Privacy (LDP) have been proposed and attracted much attention over the past few years. However, they still share the common limitation of being vulnerable to poisoning attacks wherein adversaries compromising edge devices feed forged (a.k.a. “poisoned”) data to aggregation back-ends, undermining the integrity of FL/LDP results. In this work, we propose a system-level approach to remedy this issue based on a novel security notion of Proofs of Stateful Execution (<inline-formula> <tex-math>$\\mathsf {PoSX}$ </tex-math></inline-formula>) for IoT/embedded devices’ software. To realize the <inline-formula> <tex-math>$\\mathsf {PoSX}$ </tex-math></inline-formula> concept, we design <inline-formula> <tex-math>$\\mathsf {SLAPP}$ </tex-math></inline-formula>: a System-Level Approach for Poisoning Prevention. <inline-formula> <tex-math>$\\mathsf {SLAPP}$ </tex-math></inline-formula> leverages commodity security features of embedded devices – in particular ARM TrustZone-M security extensions – to verifiably bind raw sensed data to their correct usage as part of FL/LDP edge device routines. As a consequence, it offers robust security guarantees against poisoning. Our evaluation, based on real-world prototypes featuring multiple cryptographic primitives and data collection schemes, showcases <inline-formula> <tex-math>$\\mathsf {SLAPP}$ </tex-math></inline-formula>’s security and low overhead.","PeriodicalId":13492,"journal":{"name":"IEEE Transactions on Information Forensics and Security","volume":"20 ","pages":"4167-4182"},"PeriodicalIF":6.3000,"publicationDate":"2025-03-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"SLAPP: Poisoning Prevention in Federated Learning and Differential Privacy via Stateful Proofs of Execution\",\"authors\":\"Norrathep Rattanavipanon;Ivan De Oliveira Nunes\",\"doi\":\"10.1109/TIFS.2025.3555179\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"The rise of IoT-driven distributed data analytics, coupled with increasing privacy concerns, has led to a demand for effective privacy-preserving and federated data collection/model training mechanisms. In response, approaches such as Federated Learning (FL) and Local Differential Privacy (LDP) have been proposed and attracted much attention over the past few years. However, they still share the common limitation of being vulnerable to poisoning attacks wherein adversaries compromising edge devices feed forged (a.k.a. “poisoned”) data to aggregation back-ends, undermining the integrity of FL/LDP results. In this work, we propose a system-level approach to remedy this issue based on a novel security notion of Proofs of Stateful Execution (<inline-formula> <tex-math>$\\\\mathsf {PoSX}$ </tex-math></inline-formula>) for IoT/embedded devices’ software. To realize the <inline-formula> <tex-math>$\\\\mathsf {PoSX}$ </tex-math></inline-formula> concept, we design <inline-formula> <tex-math>$\\\\mathsf {SLAPP}$ </tex-math></inline-formula>: a System-Level Approach for Poisoning Prevention. <inline-formula> <tex-math>$\\\\mathsf {SLAPP}$ </tex-math></inline-formula> leverages commodity security features of embedded devices – in particular ARM TrustZone-M security extensions – to verifiably bind raw sensed data to their correct usage as part of FL/LDP edge device routines. As a consequence, it offers robust security guarantees against poisoning. Our evaluation, based on real-world prototypes featuring multiple cryptographic primitives and data collection schemes, showcases <inline-formula> <tex-math>$\\\\mathsf {SLAPP}$ </tex-math></inline-formula>’s security and low overhead.\",\"PeriodicalId\":13492,\"journal\":{\"name\":\"IEEE Transactions on Information Forensics and Security\",\"volume\":\"20 \",\"pages\":\"4167-4182\"},\"PeriodicalIF\":6.3000,\"publicationDate\":\"2025-03-26\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"IEEE Transactions on Information Forensics and Security\",\"FirstCategoryId\":\"94\",\"ListUrlMain\":\"https://ieeexplore.ieee.org/document/10942392/\",\"RegionNum\":1,\"RegionCategory\":\"计算机科学\",\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"Q1\",\"JCRName\":\"COMPUTER SCIENCE, THEORY & METHODS\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"IEEE Transactions on Information Forensics and Security","FirstCategoryId":"94","ListUrlMain":"https://ieeexplore.ieee.org/document/10942392/","RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q1","JCRName":"COMPUTER SCIENCE, THEORY & METHODS","Score":null,"Total":0}
SLAPP: Poisoning Prevention in Federated Learning and Differential Privacy via Stateful Proofs of Execution
The rise of IoT-driven distributed data analytics, coupled with increasing privacy concerns, has led to a demand for effective privacy-preserving and federated data collection/model training mechanisms. In response, approaches such as Federated Learning (FL) and Local Differential Privacy (LDP) have been proposed and attracted much attention over the past few years. However, they still share the common limitation of being vulnerable to poisoning attacks wherein adversaries compromising edge devices feed forged (a.k.a. “poisoned”) data to aggregation back-ends, undermining the integrity of FL/LDP results. In this work, we propose a system-level approach to remedy this issue based on a novel security notion of Proofs of Stateful Execution ($\mathsf {PoSX}$ ) for IoT/embedded devices’ software. To realize the $\mathsf {PoSX}$ concept, we design $\mathsf {SLAPP}$ : a System-Level Approach for Poisoning Prevention. $\mathsf {SLAPP}$ leverages commodity security features of embedded devices – in particular ARM TrustZone-M security extensions – to verifiably bind raw sensed data to their correct usage as part of FL/LDP edge device routines. As a consequence, it offers robust security guarantees against poisoning. Our evaluation, based on real-world prototypes featuring multiple cryptographic primitives and data collection schemes, showcases $\mathsf {SLAPP}$ ’s security and low overhead.
期刊介绍:
The IEEE Transactions on Information Forensics and Security covers the sciences, technologies, and applications relating to information forensics, information security, biometrics, surveillance and systems applications that incorporate these features