[[TOC(Other/Summer/2023/SecurityAI/*, depth=1, heading=Security in Aritificial Intelligence)]] = Security in Artificial Intelligence = **WINLAB Summer Internship 2023** **Advisors:** Yingying Chen, Tianfang Zhang, Changming Li, Honglu Li **Group Members:** Rut Mehta, Jacob Morin, Ethan Lung, Damon Lin == Project Objective == Artificial intelligence techniques have been widely integrated into mobile and IoT devices, enabling various functionalities based on vision (e.g., face recognition, speech recognition, and speaker identification). The extended pipeline of building deep neural networks (DNN) produces new attack surfaces, such as attacks during the data collection, model training, and model update stages. Recent research studies discovered an effective yet stealthy attack, called a backdoor attack, which trains a hidden trigger pattern into the DNNs. The backdoored DNNs will misclassify an input as an adversary-specified label if the trigger pattern appears, behaving normally otherwise, making it difficult to be detected. This project focuses on improving the security behind user authentication through conventional means (e.g., passwords and facial detection) by replacing it with a biometric signature in the form of daily activities. Following this implementation, the project aims to study the vulnerabilities of backdoor attacks on such a system and develop techniques for attack mitigation. == Week 1 == **[https://docs.google.com/presentation/d/18lbTII8Xomo438rRxyvVWpK0Pbii22hXWpwpsiD9umg/edit?usp=sharing, Week 1 Presentation]** **Summary** * Established project objectives * Covered and reviewed background information on topics (adversarial attacks, backdoor attacks, etc.) * [https://acrobat.adobe.com/id/urn:aaid:sc:US:abef282d-0f73-4532-8339-23a159f6977f, Explaining and Harnassing Adversarial Examples] * [https://acrobat.adobe.com/link/review?uri=urn:aaid:scds:US:d9846055-1135-4ab8-b88e-c361e4faf259​ Targeted Backdoor Attacks on Deep Learning Systems Using Data Poisoning] * Developed a plan of action for the upcoming weeks [[Image({C52B7779-4CD1-40A3-9938-9711E34DFB86}.png, 200px)]] [[Image({C5E828CF-69BF-4DB6-9960-6A1E754AC68B}.png​)]] **Resources**\\ [https://venturebeat.com/security/adversarial-attacks-in-machine-learning-what-they-are-and-how-to-stop-them/, Adversarial Attacks in Machine Learning: What They Are and How to Stop them]\\ [https://www.engati.com/blog/ai-for-cybersecurity#:~:text=AI%20in%20cybersecurity%20eliminates%20time,on%20more%20critical%20security%20tasks., Utilizing AI in Cybersecurity] == Week 2 == **[https://docs.google.com/presentation/d/1_AcSWM-E6Nis0Qbj_dGKczmLceWf7QZA7Ns7aiDd7OY/edit?usp=sharing, Week 2 Presentation]** **Summary** * Familiarized ourselves with !PyTorch * Started researching papers about Smart User Authentication (!WiFi-enabled IOT) * Explored attack mitigation [[Image({30880812-ECF5-4090-B6C4-E00FFA0DF872}.png, 400px)]] [[Image({038A11F1-8AFA-4FD5-ACAA-462CE34D7381}.png, 400px)]] **Resources**\\ [https://pytorch.org/tutorials/beginner/basics/intro.html, Intro to PyTorch]\\ [https://www.hypr.com/security-encyclopedia/iot-authentication#:~:text=IoT%20(Internet%20of%20Things)%20Authentication,%2C%20transportation%20hubs%2C%20and%20workplaces, IoT Authentication] == Week 3 == **[https://docs.google.com/presentation/d/1jcCTAUZoF2SYnIF5DmKVFrw4B-6vBf2iVctVPpGsVaQ/edit?usp=sharing, Week 3 Presentation]** **Summary** * Continued learning advanced !PyTorch functions for IoT interference data. * Set up experiments to collect interference data from mobile devices * Examined Channel State Information (CSI) Amplitudes [[Image(Screenshot 2023-07-06 110736.png)]] **Resources**\\ [http://tns.thss.tsinghua.edu.cn/wst/docs/pre/, Understanding CSI]\\ [https://www.mdpi.com/1099-4300/23/9/1164#:~:text=The%20physical%20meaning%20of%20CSI,fading%20%5B26%2C27%5D, CSI Amplitude Fingerprinting for Indoor Localization with Dictionary Learning] == Week 4 + Week 5 == **[https://docs.google.com/presentation/d/1WUO4OprJ1lBU_hO3Bfrm4_HGDd0NP-gsw8KZTxlexiY/edit?usp=sharing, Week 4 Presentation]** **[https://docs.google.com/presentation/d/1sEM5vHSctXe8tencoEoQXpkJZDkqgDOdVkugxwExX5s/edit?usp=sharing, Week 5 Presentation]** **Summary** * Set up Linux virtual machine through !VirtualBox (Ubuntu) * Familiarized ourselves with Linux Terminal * Installed Nexmon (Channel State Information tool, Extract CSI from phone) * Used Android Phones (Nexus 5 & Nexus 6) to perform experiments [[Image(Screenshot 2023-07-06 110340.png)]] **Resources**\\ [https://github.com/seemoo-lab/nexmon_csi#getting-started, Channel State Information Extraction on Various Broadcom Wi-Fi Chips] == Week 6 == **[https://docs.google.com/presentation/d/1vQaX7w2CodJPkitd_4oJDNBem12KAL4A4KluPhbvojY/edit?usp=sharing, Week 6 Presentation]** **Summary** * Installed custom ROMs on both the Nexus 5 and Nexus 6 * Resolved Nexus 5 !WiFi bug * Installed suggested Android version for Nexus 6 to fix the issue with Nexmon firmware [[Image(Screenshot 2023-07-13 100935.png, 550px)]] [[Image(nexus 6 error.jpg, 420px)]] **Resources**\\ [https://forum.xda-developers.com/t/paranoid-android-7-3-0-aospa-google-nexus-5.3639696/, Download Paranoid Android, Disclaimers, and Steps] [https://androidflagship.com/11587-install-paranoidandroid-on-any-android-device/, How to Install Paranoid Android] == Week 7 == **[https://docs.google.com/presentation/d/18BPnY4tXNWqYcWBTpK5GZ_iONBcFofTQ6rBvuYI5jHY/edit?usp=sharing, Week 7 Presentation]** **Summary** * Obtained two extra Android phones (Nexus 4 + Nexus 5) through the courtesy of Ivan * Determined that the Nexus 4 for incompatible with the Nexmon firmware * Nexus 5 was incredibly buggy (i.e, the screen flickers and turns black when opening the home screen, successfully booting up every ~30 attempts) * Setup up experiments with both Nexus 5's * Ran into issues with buggy data collection == Week 8 == **[https://docs.google.com/presentation/d/1Boj0uDYV1SItf3P2QIvtDQlkqbWvN1zLcKBCht8_NRI/edit?usp=sharing, Week 8 Presentation (skipped)]** **Summary** * Configured one Nexus 5 as a receiver for !WiFi packets * Setup an experiment with this phone and router [[Image(csi_test_results.png, 600px)]] * Met with one of our mentors and received sample CSI data + more guidance on experimentation * Received functioning Nexus 5 from Professor Chen * Working on configuring this phone as a transmitter * Participated in an experiment conducted by one of our mentors [[Image(id_confusion_matrix.png, 500px)]] == Week 9 == **[https://docs.google.com/presentation/d/11rNv-o6pgmb9YEXn0J_e76ZuYW1Fl7VBZqcqGjWmeZU/edit?usp=sharing, Week 9 Presentation]** **Summary** * Completed participation in mentor's experiment [[Image(jacob_kick (1).gif, 500px)]] * Started designing a final poster * Successfully configured transmitter phone and received sample packets [[Image(transmitted_packets.png, 450px)]] == Week 10 == **[https://docs.google.com/presentation/d/1sIpjiJvmHV4mYzmseBlEPNqwch_5h6qQMo9TJ6ClcLE/edit?usp=sharing, Week 10 Presentation]** **Summary** * Finalized the poster and presentation slides * Created flow chart [[Image(securityai_flowchart2.png​, 600px)]] * Rehearsed presenting the slides * Wrapped up experiments [[Image(securityai_experiment_setup.png, 600px)]]