SlideShare a Scribd company logo
1 of 29
Axel Engelmann
Architect Protection Technologies – Wibu-Systems
Andreas Schaad
Professor of IT Security – University of Applied Sciences Offenburg
Security and Protection for
Machine Learning
2022-05-11 © WIBU-SYSTEMS AG 2022 - Security and Protection for Machine Learning 1
Where to find the accompanying audio
To access the on-demand replay of this masterclass, please visit
www.wibu.com/wibu-systems-webinars/security-and-protection-for-machine-
learning/access.html
2022-05-11 © WIBU-SYSTEMS AG 2022 - Security and Protection for Machine Learning 2
Introduction to
Machine Learning
2022-05-11 © WIBU-SYSTEMS AG 2022 - Security and Protection for Machine Learning 3
Machine Learning in a Nutshell
2022-05-11 © WIBU-SYSTEMS AG 2022 - Security and Protection for Machine Learning 4
 In the widest sense, a specific field of Artificial Intelligence.
 Machine Learning comprises a set of techniques / tools that
now complement our software development lifecycle.
 Why?
 Can replace hard to maintain rulesets / imperative programming
 Widely available computational frameworks
 CPU power / Cloud platforms / Data
 Available skillset increasing / part of Comp. Science curriculum
 But: Securing the ML Lifecycle is important!
Machine Learning in a Nutshell
2022-05-11 © WIBU-SYSTEMS AG 2022 - Security and Protection for Machine Learning 5
 Making predictions based on already known data
 Classifying new data based on known data
y
x
x2
x1
Examples
2022-05-11 © WIBU-SYSTEMS AG 2022 - Security and Protection for Machine Learning 6
y
x
x1
 Making predictions based on already known data
 Financial Forecasting
 Maintenance Prediction
 Network Analysis
 ….
 Classifying new data based on known data
 Spam Filtering
 Image Recognition
 Intrusion Detection
 … x2
Example
2022-05-11 © WIBU-SYSTEMS AG 2022 - Security and Protection for Machine Learning 7
The Machine Learning Lifecycle
2022-05-11 © WIBU-SYSTEMS AG 2022 - Security and Protection for Machine Learning 8
1. Training Phase
Trained model is created.
 Data collection
 Pre-processing & Feature engineering
 Training process using a framework
code
 Outcome: Trained model
2. Inference Phase
Trained model is used to predict results from
new data. Cloud or offline usage.
 Input
 Pre-processing
 Prediction using trained model
 Outcome: Output (Prediction)
raw data preprocessing training model
query
result
Data Collection Pre-processing & Training Deployed & Operational Model
The Machine Learning Lifecyle
2022-05-11 © WIBU-SYSTEMS AG 2022 - Security and Protection for Machine Learning 9
configuration
raw data preprocessing training model
algorithms
query
result
Data Collection Pre-processing & Training Deployed & Operational Model
The Machine Learning Lifecycle
2022-05-11 © WIBU-SYSTEMS AG 2022 - Security and Protection for Machine Learning 10
configuration
raw data preprocessing training model
algorithms
query
result
Data Collection Pre-processing & Training Deployed & Operational Model
The Machine Learning Lifecycle
2022-05-11 © WIBU-SYSTEMS AG 2022 - Security and Protection for Machine Learning 11
configuration
raw data preprocessing training model
algorithms
query
result
Data Collection Pre-processing & Training Deployed & Operational Model
Data Owner Cloud Operator
ML Engineers Model Owner
Customer
The Machine Learning Lifecycle
2022-05-11 © WIBU-SYSTEMS AG 2022 - Security and Protection for Machine Learning 12
Summary
2022-05-11 © WIBU-SYSTEMS AG 2022 - Security and Protection for Machine Learning 13
 What are the assets we need to protect?
 Source / Training data
 Training configuration
 Licensed access to our trained model
 Secure delivery of results
 …and many stakeholders with different
access or licensing requirements
Attacking the ML Lifecycle
2022-05-11 © WIBU-SYSTEMS AG 2022 - Security and Protection for Machine Learning 14
Data Poisoning
Model Stealing
Configuration
Stealing Unlicensed
querying
Model Extraction
Data Leakage
Framework
Backdoors
Data Collection Pre-processing & Training Deployed & Operational Model
More Details
2022-05-11 © WIBU-SYSTEMS AG 2022 - Security and Protection for Machine Learning 15
What do I need to
consider to secure
my ML pipeline?
What are known
real-world attacks?
https://joom.ag/gdpd/p40
Threats
2022-05-11 © WIBU-SYSTEMS AG 2022 - Security and Protection for Machine Learning 16
Phase Description Category (CIA) Access needed
Training Data Poisoning Integrity no
Training Model Poisoning Integrity yes
Inference Model Stealing Confidentiality yes
Inference Model Replacement Integrity, Availability yes
Inference Model Extraction Confidentiality no
Inference Inference/Exfiltration Attacks Confidentiality no
Inference Perturbation Attacks Integrity no
Both
Software Dependencies of ML System
Exploit
Confidentiality, Integrity, Availiability no
Proof of Concept
 Medical ML project
 3500 x-ray pictures
 Data transfer from source to
ML environment already secured
using CodeMeter
 Protection against data
poisoning
 Today’s Demo: Protecting the training model against stealing
2022-05-11 © WIBU-SYSTEMS AG 2022 - Security and Protection for Machine Learning 17
CodeMeter
at a Glance
2022-05-11 © WIBU-SYSTEMS AG 2022 - Security and Protection for Machine Learning 18
CodeMeter Licensing Systems
2022-05-11 © WIBU-SYSTEMS AG 2022 - Security and Protection for Machine Learning 19
CmCloudContainer
License container
in the WIBU cloud
Bound to a user
CmDongle
License container
in a secure hw element
Bound to a smart card chip
License Server
License Server in LAN / WAN
CmActLicense
License container
in an encrypted file
Bound to an endpoint
License Entries
2022-05-11 © WIBU-SYSTEMS AG 2022 - Security and Protection for Machine Learning 20
 License entry = Firm Code | Product Code
 Firm Code: issued by Wibu-Systems
 Product Code:
 Defined by the software vendor
 Per Option / Module / Feature
 4 bn. Product Codes (UInt32)
 Up to 2,000 Product Items per CmContainer
 Product Item Options: Each license can include
combinable options
Firm Code: 6.000.010
…
Product Code: 201.000
Product Code: 201.001
Product Code: 201.002
Product Item Options
Product Item Options
Product Item Options
CodeMeter
Protection Suite
2022-05-11 © WIBU-SYSTEMS AG 2022 - Security and Protection for Machine Learning 21
Overview CodeMeter Protection Suite
2022-05-11 © WIBU-SYSTEMS AG 2022 - Security and Protection for Machine Learning 22
Windows macOS Linux .NET Python JavaScript Java Android
Automatic Protection 1336-1000 1336-1200 1336-1300 1336-2000 1336-1700 1336-1800 1336-3000 1336-1500
Modular Licensing 1336-1001 1336-1201 1336-1301 1336-2001 1336-1701 1336-1801 1336-3001 1336-1501
IP Protection 1336-1002 1336-1202 1336-1302 1336-2002 1336-1702 1336-1802 1336-3002 1336-1502
CodeMoving 1336-1003 1336-1203 1336-1303 planned 1336-1703 1336-1803 1336-3003 1336-1503
File Encryption planned planned planned planned 1336-1704 1336-1804 planned planned
Additional Targets - - 1336-135x 1336-205x 1336-175x 136-185x planned -
Modules of AxProtector
2022-05-11 © WIBU-SYSTEMS AG 2022 - Security and Protection for Machine Learning 23
 Basic
 Protection with one license list (0)
 Encryption on method level
 Modular Licensing
 Use of more than 1 license list out of
license lists other than (0)
 IP Protection
 Encryption without using CodeMeter
licensing capabilities (fixed key)
 CodeMoving
 Use of CodeMoving (CmDongle and
CmCloudContainer)
 File Encryption
 File encryption modus (AI models)
IL-Mode AxProtector
Binary-Mode AxProtector
AxProtector Technologies – Overview
2022-05-11 © WIBU-SYSTEMS AG 2022 - Security and Protection for Machine Learning 24
 AxProtector Windows
 AxProtector macOS
 AxProtector Linux
 AxProtector Android
 AxProtector .NET
 AxProtector Python
 AxProtector JavaScript
 AxProtector Java
IL-Mode AxProtector
Binary-Mode AxProtector
AxProtector Technologies – Functionality
2022-05-11 © WIBU-SYSTEMS AG 2022 - Security and Protection for Machine Learning 25
 Encryption of the entire application as
one blob
 Encryption on method level requires
manual integration
 Complete decryption during startup
(except for individual defined
methods)
 No unpredictable performance impact
during runtime
 Encryption of individual methods /
classes as individual blobs
 Automatic encryption on method level
 Highest security thanks to on-demand
decryption of every method
 Very small performance impact during
runtime thanks to intelligent caching
Compiled Executable Protected Executable
Operating Principle of IL-based AxProtector
2022-05-11 © WIBU-SYSTEMS AG 2022 - Security and Protection for Machine Learning 26
Header Header
AxProtector …
AxEngine
(Security Engine)
2 33 E8 E1 CA
59 16 4B 75 53
E 24 C5 30 D8 85
C7 15 C2
C E6 7E 87 1B A8
9 81 53 62 DE A6 F4 AF
8 D1 D9 6D DD 1B 4 CB 82 63 82
F BD 5D 71
Start(arg) pi = (double) (2*y)
y = x * (2 + x) + 1 y = sin(x)
z = Math.Pow(10, prec) inc(ab)
if (CheckVal(x)) call (fit(y))
i += 10 for(i = 0; i < z; i++)
Picture:BM P0 FF
Icon:01 FF
String:Viewer
Picture:PN G0 FF 00
String:Open File Data:01 FF FF
Code (Methods)
Resources
9 6F F6 48 22 E7 B0 DA D1 4F 3E
2 59 D0 BD A A9 DD F4 67 44 DB
8 35 60 C3 50 C3
A8
6 4A 63 4C FE
5 9C B2 1E FA D3 DD 10 DD E0
3 8F EF C4 4C F0 79
A 5F E9 DC C5 2E C A2 3B 5D 7E
Encrypted Methods
Encrypted Resources
 Firm Code
 Product Code
 …
Demo
2022-05-11 © WIBU-SYSTEMS AG 2022 - Security and Protection for Machine Learning 27
Demo - Recap
 Client / Server application
 Image classification using a trained model
 Prediction of a tuberculosis desease
 AxProtector Python
 YAML files for encryption specification
 Protection of Python server scripts
 Protection of a trained h5 model
 Application only works with valid licenses
2022-05-11 © WIBU-SYSTEMS AG 2022 - Security and Protection for Machine Learning 28
https://www.wibu.com
info@wibu.com
Europe: +49-721-931720
USA: +1-425-7756900
China: +86-21-55661790
Japan: +81-45-5659710
Many thanks for your kind attention
2022-05-11 © WIBU-SYSTEMS AG 2022 - Security and Protection for Machine Learning 29

More Related Content

What's hot

Splunk Enterprise Security
Splunk Enterprise Security Splunk Enterprise Security
Splunk Enterprise Security Md Mofijul Haque
 
Google cloud computing
Google cloud computingGoogle cloud computing
Google cloud computingBrian Pichman
 
Insight into SOAR
Insight into SOARInsight into SOAR
Insight into SOARDNIF
 
Aws seminar report
Aws seminar report Aws seminar report
Aws seminar report Rahul Kumar
 
2022 APIsecure_Monitoring your APIs for Attacks Using SIEM versus XDR
2022 APIsecure_Monitoring your APIs for Attacks Using SIEM versus XDR2022 APIsecure_Monitoring your APIs for Attacks Using SIEM versus XDR
2022 APIsecure_Monitoring your APIs for Attacks Using SIEM versus XDRAPIsecure_ Official
 
Identity and Access Management (IAM)
Identity and Access Management (IAM)Identity and Access Management (IAM)
Identity and Access Management (IAM)Identacor
 
Cloud computing and data security
Cloud computing and data securityCloud computing and data security
Cloud computing and data securityMohammed Fazuluddin
 
AWS Training For Beginners | AWS Certified Solutions Architect Tutorial | AWS...
AWS Training For Beginners | AWS Certified Solutions Architect Tutorial | AWS...AWS Training For Beginners | AWS Certified Solutions Architect Tutorial | AWS...
AWS Training For Beginners | AWS Certified Solutions Architect Tutorial | AWS...Simplilearn
 
Identity and Access Management Introduction
Identity and Access Management IntroductionIdentity and Access Management Introduction
Identity and Access Management IntroductionAidy Tificate
 
The rise of “Big Data” on cloud computing
The rise of “Big Data” on cloud computingThe rise of “Big Data” on cloud computing
The rise of “Big Data” on cloud computingMinhazul Arefin
 
Qradar - Reports.pdf
Qradar - Reports.pdfQradar - Reports.pdf
Qradar - Reports.pdfPencilData
 
IBM InfoSphere Guardium overview
IBM InfoSphere Guardium overviewIBM InfoSphere Guardium overview
IBM InfoSphere Guardium overviewnazeer325
 

What's hot (20)

Distributed Computing
Distributed ComputingDistributed Computing
Distributed Computing
 
Ab initio training Ab-initio Architecture
Ab initio training Ab-initio ArchitectureAb initio training Ab-initio Architecture
Ab initio training Ab-initio Architecture
 
Dmz
Dmz Dmz
Dmz
 
Splunk Enterprise Security
Splunk Enterprise Security Splunk Enterprise Security
Splunk Enterprise Security
 
Google cloud computing
Google cloud computingGoogle cloud computing
Google cloud computing
 
Insight into SOAR
Insight into SOARInsight into SOAR
Insight into SOAR
 
Aws seminar report
Aws seminar report Aws seminar report
Aws seminar report
 
2022 APIsecure_Monitoring your APIs for Attacks Using SIEM versus XDR
2022 APIsecure_Monitoring your APIs for Attacks Using SIEM versus XDR2022 APIsecure_Monitoring your APIs for Attacks Using SIEM versus XDR
2022 APIsecure_Monitoring your APIs for Attacks Using SIEM versus XDR
 
Threat Hunting on AWS using Azure Sentinel
Threat Hunting on AWS using Azure SentinelThreat Hunting on AWS using Azure Sentinel
Threat Hunting on AWS using Azure Sentinel
 
Identity and Access Management (IAM)
Identity and Access Management (IAM)Identity and Access Management (IAM)
Identity and Access Management (IAM)
 
Cloud computing and data security
Cloud computing and data securityCloud computing and data security
Cloud computing and data security
 
Serverless computing
Serverless computingServerless computing
Serverless computing
 
AWS Training For Beginners | AWS Certified Solutions Architect Tutorial | AWS...
AWS Training For Beginners | AWS Certified Solutions Architect Tutorial | AWS...AWS Training For Beginners | AWS Certified Solutions Architect Tutorial | AWS...
AWS Training For Beginners | AWS Certified Solutions Architect Tutorial | AWS...
 
Identity and Access Management Introduction
Identity and Access Management IntroductionIdentity and Access Management Introduction
Identity and Access Management Introduction
 
The rise of “Big Data” on cloud computing
The rise of “Big Data” on cloud computingThe rise of “Big Data” on cloud computing
The rise of “Big Data” on cloud computing
 
Qradar - Reports.pdf
Qradar - Reports.pdfQradar - Reports.pdf
Qradar - Reports.pdf
 
IBM InfoSphere Guardium overview
IBM InfoSphere Guardium overviewIBM InfoSphere Guardium overview
IBM InfoSphere Guardium overview
 
Fundamentals of AWS Security
Fundamentals of AWS SecurityFundamentals of AWS Security
Fundamentals of AWS Security
 
Introduction to Amazon EC2
Introduction to Amazon EC2Introduction to Amazon EC2
Introduction to Amazon EC2
 
Kali linux.ppt
Kali linux.pptKali linux.ppt
Kali linux.ppt
 

Similar to Security and Protection for Machine Learning.pptx

Protecting and Licensing .NET Applications
Protecting and Licensing .NET ApplicationsProtecting and Licensing .NET Applications
Protecting and Licensing .NET Applicationsteam-WIBU
 
Running code in secure hardware or cloud environments
Running code in secure hardware or cloud environmentsRunning code in secure hardware or cloud environments
Running code in secure hardware or cloud environmentsteam-WIBU
 
SECURITY IN COULD DATA STORAGE USING SOFT COMPUTING TECHNIQUES AND ELGAMAL CR...
SECURITY IN COULD DATA STORAGE USING SOFT COMPUTING TECHNIQUES AND ELGAMAL CR...SECURITY IN COULD DATA STORAGE USING SOFT COMPUTING TECHNIQUES AND ELGAMAL CR...
SECURITY IN COULD DATA STORAGE USING SOFT COMPUTING TECHNIQUES AND ELGAMAL CR...IRJET Journal
 
The fastest way to protect your know-how
The fastest way to protect your know-howThe fastest way to protect your know-how
The fastest way to protect your know-howteam-WIBU
 
Advance security in cloud computing for military weapons
Advance security in cloud computing for military weaponsAdvance security in cloud computing for military weapons
Advance security in cloud computing for military weaponsIRJET Journal
 
cloud security unit 2 notes (ppt) UNIT 2 PPT.pptx
cloud security unit 2 notes (ppt) UNIT 2 PPT.pptxcloud security unit 2 notes (ppt) UNIT 2 PPT.pptx
cloud security unit 2 notes (ppt) UNIT 2 PPT.pptxPriyadharshiniMuruge10
 
TMS320F28335 security
TMS320F28335 securityTMS320F28335 security
TMS320F28335 securityraje21
 
Leveraging Artificial Intelligence Processing on Edge Devices
Leveraging Artificial Intelligence Processing on Edge DevicesLeveraging Artificial Intelligence Processing on Edge Devices
Leveraging Artificial Intelligence Processing on Edge DevicesICS
 
CLASS 2016 - Palestra José Antunes
CLASS 2016 - Palestra José AntunesCLASS 2016 - Palestra José Antunes
CLASS 2016 - Palestra José AntunesTI Safe
 
02_D03_Basic funtion of SIPROTEC 5_2012.ppt
02_D03_Basic funtion of SIPROTEC 5_2012.ppt02_D03_Basic funtion of SIPROTEC 5_2012.ppt
02_D03_Basic funtion of SIPROTEC 5_2012.pptLeo Pastrana
 
Become a cloud security expert
Become a cloud security expertBecome a cloud security expert
Become a cloud security expertbillysmit3
 
Towards 0-bug software in the automotive industry
Towards 0-bug software in the automotive industryTowards 0-bug software in the automotive industry
Towards 0-bug software in the automotive industryAshley Zupkus
 
Protecting Node.js-based JavaScript Applications
Protecting Node.js-based JavaScript ApplicationsProtecting Node.js-based JavaScript Applications
Protecting Node.js-based JavaScript Applicationsteam-WIBU
 
Network and Computer security
Network and Computer securityNetwork and Computer security
Network and Computer securityDeepak John
 
CLASS 2018 - Palestra de Julio Oliveira (Gerente de Tecnologia, Power Grids G...
CLASS 2018 - Palestra de Julio Oliveira (Gerente de Tecnologia, Power Grids G...CLASS 2018 - Palestra de Julio Oliveira (Gerente de Tecnologia, Power Grids G...
CLASS 2018 - Palestra de Julio Oliveira (Gerente de Tecnologia, Power Grids G...TI Safe
 
A Secure and Dynamic Multi Keyword Ranked Search over Encrypted Cloud Data
A Secure and Dynamic Multi Keyword Ranked Search over Encrypted Cloud DataA Secure and Dynamic Multi Keyword Ranked Search over Encrypted Cloud Data
A Secure and Dynamic Multi Keyword Ranked Search over Encrypted Cloud DataIRJET Journal
 
Your CODESYS Applications, Protected and Licensed
Your CODESYS Applications, Protected and LicensedYour CODESYS Applications, Protected and Licensed
Your CODESYS Applications, Protected and Licensedteam-WIBU
 
5 benefits that ai gives to cloud security venkat k - medium
5 benefits that ai gives to cloud security   venkat k - medium5 benefits that ai gives to cloud security   venkat k - medium
5 benefits that ai gives to cloud security venkat k - mediumusmsystem
 
IRJET- Image Steganography using Pixel Pattern Matching in Cloud Data Sto...
IRJET-  	  Image Steganography using Pixel Pattern Matching in Cloud Data Sto...IRJET-  	  Image Steganography using Pixel Pattern Matching in Cloud Data Sto...
IRJET- Image Steganography using Pixel Pattern Matching in Cloud Data Sto...IRJET Journal
 

Similar to Security and Protection for Machine Learning.pptx (20)

Protecting and Licensing .NET Applications
Protecting and Licensing .NET ApplicationsProtecting and Licensing .NET Applications
Protecting and Licensing .NET Applications
 
Running code in secure hardware or cloud environments
Running code in secure hardware or cloud environmentsRunning code in secure hardware or cloud environments
Running code in secure hardware or cloud environments
 
SECURITY IN COULD DATA STORAGE USING SOFT COMPUTING TECHNIQUES AND ELGAMAL CR...
SECURITY IN COULD DATA STORAGE USING SOFT COMPUTING TECHNIQUES AND ELGAMAL CR...SECURITY IN COULD DATA STORAGE USING SOFT COMPUTING TECHNIQUES AND ELGAMAL CR...
SECURITY IN COULD DATA STORAGE USING SOFT COMPUTING TECHNIQUES AND ELGAMAL CR...
 
The fastest way to protect your know-how
The fastest way to protect your know-howThe fastest way to protect your know-how
The fastest way to protect your know-how
 
Advance security in cloud computing for military weapons
Advance security in cloud computing for military weaponsAdvance security in cloud computing for military weapons
Advance security in cloud computing for military weapons
 
cloud security unit 2 notes (ppt) UNIT 2 PPT.pptx
cloud security unit 2 notes (ppt) UNIT 2 PPT.pptxcloud security unit 2 notes (ppt) UNIT 2 PPT.pptx
cloud security unit 2 notes (ppt) UNIT 2 PPT.pptx
 
PSOIOT-1151.pdf
PSOIOT-1151.pdfPSOIOT-1151.pdf
PSOIOT-1151.pdf
 
TMS320F28335 security
TMS320F28335 securityTMS320F28335 security
TMS320F28335 security
 
Leveraging Artificial Intelligence Processing on Edge Devices
Leveraging Artificial Intelligence Processing on Edge DevicesLeveraging Artificial Intelligence Processing on Edge Devices
Leveraging Artificial Intelligence Processing on Edge Devices
 
CLASS 2016 - Palestra José Antunes
CLASS 2016 - Palestra José AntunesCLASS 2016 - Palestra José Antunes
CLASS 2016 - Palestra José Antunes
 
02_D03_Basic funtion of SIPROTEC 5_2012.ppt
02_D03_Basic funtion of SIPROTEC 5_2012.ppt02_D03_Basic funtion of SIPROTEC 5_2012.ppt
02_D03_Basic funtion of SIPROTEC 5_2012.ppt
 
Become a cloud security expert
Become a cloud security expertBecome a cloud security expert
Become a cloud security expert
 
Towards 0-bug software in the automotive industry
Towards 0-bug software in the automotive industryTowards 0-bug software in the automotive industry
Towards 0-bug software in the automotive industry
 
Protecting Node.js-based JavaScript Applications
Protecting Node.js-based JavaScript ApplicationsProtecting Node.js-based JavaScript Applications
Protecting Node.js-based JavaScript Applications
 
Network and Computer security
Network and Computer securityNetwork and Computer security
Network and Computer security
 
CLASS 2018 - Palestra de Julio Oliveira (Gerente de Tecnologia, Power Grids G...
CLASS 2018 - Palestra de Julio Oliveira (Gerente de Tecnologia, Power Grids G...CLASS 2018 - Palestra de Julio Oliveira (Gerente de Tecnologia, Power Grids G...
CLASS 2018 - Palestra de Julio Oliveira (Gerente de Tecnologia, Power Grids G...
 
A Secure and Dynamic Multi Keyword Ranked Search over Encrypted Cloud Data
A Secure and Dynamic Multi Keyword Ranked Search over Encrypted Cloud DataA Secure and Dynamic Multi Keyword Ranked Search over Encrypted Cloud Data
A Secure and Dynamic Multi Keyword Ranked Search over Encrypted Cloud Data
 
Your CODESYS Applications, Protected and Licensed
Your CODESYS Applications, Protected and LicensedYour CODESYS Applications, Protected and Licensed
Your CODESYS Applications, Protected and Licensed
 
5 benefits that ai gives to cloud security venkat k - medium
5 benefits that ai gives to cloud security   venkat k - medium5 benefits that ai gives to cloud security   venkat k - medium
5 benefits that ai gives to cloud security venkat k - medium
 
IRJET- Image Steganography using Pixel Pattern Matching in Cloud Data Sto...
IRJET-  	  Image Steganography using Pixel Pattern Matching in Cloud Data Sto...IRJET-  	  Image Steganography using Pixel Pattern Matching in Cloud Data Sto...
IRJET- Image Steganography using Pixel Pattern Matching in Cloud Data Sto...
 

More from team-WIBU

Post Quantum Cryptography – The Impact on Identity
Post Quantum Cryptography – The Impact on IdentityPost Quantum Cryptography – The Impact on Identity
Post Quantum Cryptography – The Impact on Identityteam-WIBU
 
Unlocking the Future: Empowering Industrial Security
Unlocking the Future: Empowering Industrial SecurityUnlocking the Future: Empowering Industrial Security
Unlocking the Future: Empowering Industrial Securityteam-WIBU
 
The Power of Partnership: Enabling Success Together
The Power of Partnership: Enabling Success TogetherThe Power of Partnership: Enabling Success Together
The Power of Partnership: Enabling Success Togetherteam-WIBU
 
Unleash the Power of CodeMeter - CodeMeter Basics
Unleash the Power of CodeMeter - CodeMeter BasicsUnleash the Power of CodeMeter - CodeMeter Basics
Unleash the Power of CodeMeter - CodeMeter Basicsteam-WIBU
 
Keine Zeit für Leerlauf – Lizenzverfügbarkeit für Geschäftskontinuität
Keine Zeit für Leerlauf – Lizenzverfügbarkeit für GeschäftskontinuitätKeine Zeit für Leerlauf – Lizenzverfügbarkeit für Geschäftskontinuität
Keine Zeit für Leerlauf – Lizenzverfügbarkeit für Geschäftskontinuitätteam-WIBU
 
No Time to Idle – License availability for business continuity
No Time to Idle – License availability for business continuityNo Time to Idle – License availability for business continuity
No Time to Idle – License availability for business continuityteam-WIBU
 
Cloud-Based Licensing in Offline Scenarios
Cloud-Based Licensing in Offline ScenariosCloud-Based Licensing in Offline Scenarios
Cloud-Based Licensing in Offline Scenariosteam-WIBU
 
Optimizing Cloud Licensing: Strategies and Best Practices
Optimizing Cloud Licensing: Strategies and Best PracticesOptimizing Cloud Licensing: Strategies and Best Practices
Optimizing Cloud Licensing: Strategies and Best Practicesteam-WIBU
 
For a Few Licenses More
For a Few Licenses MoreFor a Few Licenses More
For a Few Licenses Moreteam-WIBU
 
App Management on the Edge
App Management on the EdgeApp Management on the Edge
App Management on the Edgeteam-WIBU
 
A Bit of License Management Magic
A Bit of License Management MagicA Bit of License Management Magic
A Bit of License Management Magicteam-WIBU
 
The first step is always the most decisive
The first step is always the most decisiveThe first step is always the most decisive
The first step is always the most decisiveteam-WIBU
 
Protection and monetization of 3D printed objects in the spare parts business...
Protection and monetization of 3D printed objects in the spare parts business...Protection and monetization of 3D printed objects in the spare parts business...
Protection and monetization of 3D printed objects in the spare parts business...team-WIBU
 
Authenticate and authorize your IIoTdevices
Authenticate and authorize your IIoTdevicesAuthenticate and authorize your IIoTdevices
Authenticate and authorize your IIoTdevicesteam-WIBU
 
How and Why to Create and Sell Consumption-Based Licenses
How and Why to Create and Sell Consumption-Based LicensesHow and Why to Create and Sell Consumption-Based Licenses
How and Why to Create and Sell Consumption-Based Licensesteam-WIBU
 
Serving Up Features-on-Demand for Every Appetite
Serving Up Features-on-Demand for Every AppetiteServing Up Features-on-Demand for Every Appetite
Serving Up Features-on-Demand for Every Appetiteteam-WIBU
 
License Portal - The DIY Solution
License Portal - The DIY SolutionLicense Portal - The DIY Solution
License Portal - The DIY Solutionteam-WIBU
 
Subscriptions - Relationships built to last
Subscriptions - Relationships built to lastSubscriptions - Relationships built to last
Subscriptions - Relationships built to lastteam-WIBU
 
Safer to market: Licensing and e-commerce integrated
Safer to market: Licensing and e-commerce integratedSafer to market: Licensing and e-commerce integrated
Safer to market: Licensing and e-commerce integratedteam-WIBU
 
Managing entitlements through the product lifecycle
Managing entitlements through the product lifecycleManaging entitlements through the product lifecycle
Managing entitlements through the product lifecycleteam-WIBU
 

More from team-WIBU (20)

Post Quantum Cryptography – The Impact on Identity
Post Quantum Cryptography – The Impact on IdentityPost Quantum Cryptography – The Impact on Identity
Post Quantum Cryptography – The Impact on Identity
 
Unlocking the Future: Empowering Industrial Security
Unlocking the Future: Empowering Industrial SecurityUnlocking the Future: Empowering Industrial Security
Unlocking the Future: Empowering Industrial Security
 
The Power of Partnership: Enabling Success Together
The Power of Partnership: Enabling Success TogetherThe Power of Partnership: Enabling Success Together
The Power of Partnership: Enabling Success Together
 
Unleash the Power of CodeMeter - CodeMeter Basics
Unleash the Power of CodeMeter - CodeMeter BasicsUnleash the Power of CodeMeter - CodeMeter Basics
Unleash the Power of CodeMeter - CodeMeter Basics
 
Keine Zeit für Leerlauf – Lizenzverfügbarkeit für Geschäftskontinuität
Keine Zeit für Leerlauf – Lizenzverfügbarkeit für GeschäftskontinuitätKeine Zeit für Leerlauf – Lizenzverfügbarkeit für Geschäftskontinuität
Keine Zeit für Leerlauf – Lizenzverfügbarkeit für Geschäftskontinuität
 
No Time to Idle – License availability for business continuity
No Time to Idle – License availability for business continuityNo Time to Idle – License availability for business continuity
No Time to Idle – License availability for business continuity
 
Cloud-Based Licensing in Offline Scenarios
Cloud-Based Licensing in Offline ScenariosCloud-Based Licensing in Offline Scenarios
Cloud-Based Licensing in Offline Scenarios
 
Optimizing Cloud Licensing: Strategies and Best Practices
Optimizing Cloud Licensing: Strategies and Best PracticesOptimizing Cloud Licensing: Strategies and Best Practices
Optimizing Cloud Licensing: Strategies and Best Practices
 
For a Few Licenses More
For a Few Licenses MoreFor a Few Licenses More
For a Few Licenses More
 
App Management on the Edge
App Management on the EdgeApp Management on the Edge
App Management on the Edge
 
A Bit of License Management Magic
A Bit of License Management MagicA Bit of License Management Magic
A Bit of License Management Magic
 
The first step is always the most decisive
The first step is always the most decisiveThe first step is always the most decisive
The first step is always the most decisive
 
Protection and monetization of 3D printed objects in the spare parts business...
Protection and monetization of 3D printed objects in the spare parts business...Protection and monetization of 3D printed objects in the spare parts business...
Protection and monetization of 3D printed objects in the spare parts business...
 
Authenticate and authorize your IIoTdevices
Authenticate and authorize your IIoTdevicesAuthenticate and authorize your IIoTdevices
Authenticate and authorize your IIoTdevices
 
How and Why to Create and Sell Consumption-Based Licenses
How and Why to Create and Sell Consumption-Based LicensesHow and Why to Create and Sell Consumption-Based Licenses
How and Why to Create and Sell Consumption-Based Licenses
 
Serving Up Features-on-Demand for Every Appetite
Serving Up Features-on-Demand for Every AppetiteServing Up Features-on-Demand for Every Appetite
Serving Up Features-on-Demand for Every Appetite
 
License Portal - The DIY Solution
License Portal - The DIY SolutionLicense Portal - The DIY Solution
License Portal - The DIY Solution
 
Subscriptions - Relationships built to last
Subscriptions - Relationships built to lastSubscriptions - Relationships built to last
Subscriptions - Relationships built to last
 
Safer to market: Licensing and e-commerce integrated
Safer to market: Licensing and e-commerce integratedSafer to market: Licensing and e-commerce integrated
Safer to market: Licensing and e-commerce integrated
 
Managing entitlements through the product lifecycle
Managing entitlements through the product lifecycleManaging entitlements through the product lifecycle
Managing entitlements through the product lifecycle
 

Recently uploaded

The Zero-ETL Approach: Enhancing Data Agility and Insight
The Zero-ETL Approach: Enhancing Data Agility and InsightThe Zero-ETL Approach: Enhancing Data Agility and Insight
The Zero-ETL Approach: Enhancing Data Agility and InsightSafe Software
 
Long journey of Ruby Standard library at RubyKaigi 2024
Long journey of Ruby Standard library at RubyKaigi 2024Long journey of Ruby Standard library at RubyKaigi 2024
Long journey of Ruby Standard library at RubyKaigi 2024Hiroshi SHIBATA
 
TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...
TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...
TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...TrustArc
 
Top 10 CodeIgniter Development Companies
Top 10 CodeIgniter Development CompaniesTop 10 CodeIgniter Development Companies
Top 10 CodeIgniter Development CompaniesTopCSSGallery
 
How we scaled to 80K users by doing nothing!.pdf
How we scaled to 80K users by doing nothing!.pdfHow we scaled to 80K users by doing nothing!.pdf
How we scaled to 80K users by doing nothing!.pdfSrushith Repakula
 
WebRTC and SIP not just audio and video @ OpenSIPS 2024
WebRTC and SIP not just audio and video @ OpenSIPS 2024WebRTC and SIP not just audio and video @ OpenSIPS 2024
WebRTC and SIP not just audio and video @ OpenSIPS 2024Lorenzo Miniero
 
Design Guidelines for Passkeys 2024.pptx
Design Guidelines for Passkeys 2024.pptxDesign Guidelines for Passkeys 2024.pptx
Design Guidelines for Passkeys 2024.pptxFIDO Alliance
 
Event-Driven Architecture Masterclass: Integrating Distributed Data Stores Ac...
Event-Driven Architecture Masterclass: Integrating Distributed Data Stores Ac...Event-Driven Architecture Masterclass: Integrating Distributed Data Stores Ac...
Event-Driven Architecture Masterclass: Integrating Distributed Data Stores Ac...ScyllaDB
 
Simplified FDO Manufacturing Flow with TPMs _ Liam at Infineon.pdf
Simplified FDO Manufacturing Flow with TPMs _ Liam at Infineon.pdfSimplified FDO Manufacturing Flow with TPMs _ Liam at Infineon.pdf
Simplified FDO Manufacturing Flow with TPMs _ Liam at Infineon.pdfFIDO Alliance
 
Where to Learn More About FDO _ Richard at FIDO Alliance.pdf
Where to Learn More About FDO _ Richard at FIDO Alliance.pdfWhere to Learn More About FDO _ Richard at FIDO Alliance.pdf
Where to Learn More About FDO _ Richard at FIDO Alliance.pdfFIDO Alliance
 
Human Expert Website Manual WCAG 2.0 2.1 2.2 Audit - Digital Accessibility Au...
Human Expert Website Manual WCAG 2.0 2.1 2.2 Audit - Digital Accessibility Au...Human Expert Website Manual WCAG 2.0 2.1 2.2 Audit - Digital Accessibility Au...
Human Expert Website Manual WCAG 2.0 2.1 2.2 Audit - Digital Accessibility Au...Skynet Technologies
 
Choosing the Right FDO Deployment Model for Your Application _ Geoffrey at In...
Choosing the Right FDO Deployment Model for Your Application _ Geoffrey at In...Choosing the Right FDO Deployment Model for Your Application _ Geoffrey at In...
Choosing the Right FDO Deployment Model for Your Application _ Geoffrey at In...FIDO Alliance
 
ASRock Industrial FDO Solutions in Action for Industrial Edge AI _ Kenny at A...
ASRock Industrial FDO Solutions in Action for Industrial Edge AI _ Kenny at A...ASRock Industrial FDO Solutions in Action for Industrial Edge AI _ Kenny at A...
ASRock Industrial FDO Solutions in Action for Industrial Edge AI _ Kenny at A...FIDO Alliance
 
Linux Foundation Edge _ Overview of FDO Software Components _ Randy at Intel.pdf
Linux Foundation Edge _ Overview of FDO Software Components _ Randy at Intel.pdfLinux Foundation Edge _ Overview of FDO Software Components _ Randy at Intel.pdf
Linux Foundation Edge _ Overview of FDO Software Components _ Randy at Intel.pdfFIDO Alliance
 
Tales from a Passkey Provider Progress from Awareness to Implementation.pptx
Tales from a Passkey Provider  Progress from Awareness to Implementation.pptxTales from a Passkey Provider  Progress from Awareness to Implementation.pptx
Tales from a Passkey Provider Progress from Awareness to Implementation.pptxFIDO Alliance
 
Introduction to FDO and How It works Applications _ Richard at FIDO Alliance.pdf
Introduction to FDO and How It works Applications _ Richard at FIDO Alliance.pdfIntroduction to FDO and How It works Applications _ Richard at FIDO Alliance.pdf
Introduction to FDO and How It works Applications _ Richard at FIDO Alliance.pdfFIDO Alliance
 
ADP Passwordless Journey Case Study.pptx
ADP Passwordless Journey Case Study.pptxADP Passwordless Journey Case Study.pptx
ADP Passwordless Journey Case Study.pptxFIDO Alliance
 
TopCryptoSupers 12thReport OrionX May2024
TopCryptoSupers 12thReport OrionX May2024TopCryptoSupers 12thReport OrionX May2024
TopCryptoSupers 12thReport OrionX May2024Stephen Perrenod
 
Event-Driven Architecture Masterclass: Engineering a Robust, High-performance...
Event-Driven Architecture Masterclass: Engineering a Robust, High-performance...Event-Driven Architecture Masterclass: Engineering a Robust, High-performance...
Event-Driven Architecture Masterclass: Engineering a Robust, High-performance...ScyllaDB
 

Recently uploaded (20)

The Zero-ETL Approach: Enhancing Data Agility and Insight
The Zero-ETL Approach: Enhancing Data Agility and InsightThe Zero-ETL Approach: Enhancing Data Agility and Insight
The Zero-ETL Approach: Enhancing Data Agility and Insight
 
Long journey of Ruby Standard library at RubyKaigi 2024
Long journey of Ruby Standard library at RubyKaigi 2024Long journey of Ruby Standard library at RubyKaigi 2024
Long journey of Ruby Standard library at RubyKaigi 2024
 
TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...
TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...
TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...
 
Top 10 CodeIgniter Development Companies
Top 10 CodeIgniter Development CompaniesTop 10 CodeIgniter Development Companies
Top 10 CodeIgniter Development Companies
 
How we scaled to 80K users by doing nothing!.pdf
How we scaled to 80K users by doing nothing!.pdfHow we scaled to 80K users by doing nothing!.pdf
How we scaled to 80K users by doing nothing!.pdf
 
WebRTC and SIP not just audio and video @ OpenSIPS 2024
WebRTC and SIP not just audio and video @ OpenSIPS 2024WebRTC and SIP not just audio and video @ OpenSIPS 2024
WebRTC and SIP not just audio and video @ OpenSIPS 2024
 
Design Guidelines for Passkeys 2024.pptx
Design Guidelines for Passkeys 2024.pptxDesign Guidelines for Passkeys 2024.pptx
Design Guidelines for Passkeys 2024.pptx
 
Overview of Hyperledger Foundation
Overview of Hyperledger FoundationOverview of Hyperledger Foundation
Overview of Hyperledger Foundation
 
Event-Driven Architecture Masterclass: Integrating Distributed Data Stores Ac...
Event-Driven Architecture Masterclass: Integrating Distributed Data Stores Ac...Event-Driven Architecture Masterclass: Integrating Distributed Data Stores Ac...
Event-Driven Architecture Masterclass: Integrating Distributed Data Stores Ac...
 
Simplified FDO Manufacturing Flow with TPMs _ Liam at Infineon.pdf
Simplified FDO Manufacturing Flow with TPMs _ Liam at Infineon.pdfSimplified FDO Manufacturing Flow with TPMs _ Liam at Infineon.pdf
Simplified FDO Manufacturing Flow with TPMs _ Liam at Infineon.pdf
 
Where to Learn More About FDO _ Richard at FIDO Alliance.pdf
Where to Learn More About FDO _ Richard at FIDO Alliance.pdfWhere to Learn More About FDO _ Richard at FIDO Alliance.pdf
Where to Learn More About FDO _ Richard at FIDO Alliance.pdf
 
Human Expert Website Manual WCAG 2.0 2.1 2.2 Audit - Digital Accessibility Au...
Human Expert Website Manual WCAG 2.0 2.1 2.2 Audit - Digital Accessibility Au...Human Expert Website Manual WCAG 2.0 2.1 2.2 Audit - Digital Accessibility Au...
Human Expert Website Manual WCAG 2.0 2.1 2.2 Audit - Digital Accessibility Au...
 
Choosing the Right FDO Deployment Model for Your Application _ Geoffrey at In...
Choosing the Right FDO Deployment Model for Your Application _ Geoffrey at In...Choosing the Right FDO Deployment Model for Your Application _ Geoffrey at In...
Choosing the Right FDO Deployment Model for Your Application _ Geoffrey at In...
 
ASRock Industrial FDO Solutions in Action for Industrial Edge AI _ Kenny at A...
ASRock Industrial FDO Solutions in Action for Industrial Edge AI _ Kenny at A...ASRock Industrial FDO Solutions in Action for Industrial Edge AI _ Kenny at A...
ASRock Industrial FDO Solutions in Action for Industrial Edge AI _ Kenny at A...
 
Linux Foundation Edge _ Overview of FDO Software Components _ Randy at Intel.pdf
Linux Foundation Edge _ Overview of FDO Software Components _ Randy at Intel.pdfLinux Foundation Edge _ Overview of FDO Software Components _ Randy at Intel.pdf
Linux Foundation Edge _ Overview of FDO Software Components _ Randy at Intel.pdf
 
Tales from a Passkey Provider Progress from Awareness to Implementation.pptx
Tales from a Passkey Provider  Progress from Awareness to Implementation.pptxTales from a Passkey Provider  Progress from Awareness to Implementation.pptx
Tales from a Passkey Provider Progress from Awareness to Implementation.pptx
 
Introduction to FDO and How It works Applications _ Richard at FIDO Alliance.pdf
Introduction to FDO and How It works Applications _ Richard at FIDO Alliance.pdfIntroduction to FDO and How It works Applications _ Richard at FIDO Alliance.pdf
Introduction to FDO and How It works Applications _ Richard at FIDO Alliance.pdf
 
ADP Passwordless Journey Case Study.pptx
ADP Passwordless Journey Case Study.pptxADP Passwordless Journey Case Study.pptx
ADP Passwordless Journey Case Study.pptx
 
TopCryptoSupers 12thReport OrionX May2024
TopCryptoSupers 12thReport OrionX May2024TopCryptoSupers 12thReport OrionX May2024
TopCryptoSupers 12thReport OrionX May2024
 
Event-Driven Architecture Masterclass: Engineering a Robust, High-performance...
Event-Driven Architecture Masterclass: Engineering a Robust, High-performance...Event-Driven Architecture Masterclass: Engineering a Robust, High-performance...
Event-Driven Architecture Masterclass: Engineering a Robust, High-performance...
 

Security and Protection for Machine Learning.pptx

  • 1. Axel Engelmann Architect Protection Technologies – Wibu-Systems Andreas Schaad Professor of IT Security – University of Applied Sciences Offenburg Security and Protection for Machine Learning 2022-05-11 © WIBU-SYSTEMS AG 2022 - Security and Protection for Machine Learning 1
  • 2. Where to find the accompanying audio To access the on-demand replay of this masterclass, please visit www.wibu.com/wibu-systems-webinars/security-and-protection-for-machine- learning/access.html 2022-05-11 © WIBU-SYSTEMS AG 2022 - Security and Protection for Machine Learning 2
  • 3. Introduction to Machine Learning 2022-05-11 © WIBU-SYSTEMS AG 2022 - Security and Protection for Machine Learning 3
  • 4. Machine Learning in a Nutshell 2022-05-11 © WIBU-SYSTEMS AG 2022 - Security and Protection for Machine Learning 4  In the widest sense, a specific field of Artificial Intelligence.  Machine Learning comprises a set of techniques / tools that now complement our software development lifecycle.  Why?  Can replace hard to maintain rulesets / imperative programming  Widely available computational frameworks  CPU power / Cloud platforms / Data  Available skillset increasing / part of Comp. Science curriculum  But: Securing the ML Lifecycle is important!
  • 5. Machine Learning in a Nutshell 2022-05-11 © WIBU-SYSTEMS AG 2022 - Security and Protection for Machine Learning 5  Making predictions based on already known data  Classifying new data based on known data y x x2 x1
  • 6. Examples 2022-05-11 © WIBU-SYSTEMS AG 2022 - Security and Protection for Machine Learning 6 y x x1  Making predictions based on already known data  Financial Forecasting  Maintenance Prediction  Network Analysis  ….  Classifying new data based on known data  Spam Filtering  Image Recognition  Intrusion Detection  … x2
  • 7. Example 2022-05-11 © WIBU-SYSTEMS AG 2022 - Security and Protection for Machine Learning 7
  • 8. The Machine Learning Lifecycle 2022-05-11 © WIBU-SYSTEMS AG 2022 - Security and Protection for Machine Learning 8 1. Training Phase Trained model is created.  Data collection  Pre-processing & Feature engineering  Training process using a framework code  Outcome: Trained model 2. Inference Phase Trained model is used to predict results from new data. Cloud or offline usage.  Input  Pre-processing  Prediction using trained model  Outcome: Output (Prediction)
  • 9. raw data preprocessing training model query result Data Collection Pre-processing & Training Deployed & Operational Model The Machine Learning Lifecyle 2022-05-11 © WIBU-SYSTEMS AG 2022 - Security and Protection for Machine Learning 9
  • 10. configuration raw data preprocessing training model algorithms query result Data Collection Pre-processing & Training Deployed & Operational Model The Machine Learning Lifecycle 2022-05-11 © WIBU-SYSTEMS AG 2022 - Security and Protection for Machine Learning 10
  • 11. configuration raw data preprocessing training model algorithms query result Data Collection Pre-processing & Training Deployed & Operational Model The Machine Learning Lifecycle 2022-05-11 © WIBU-SYSTEMS AG 2022 - Security and Protection for Machine Learning 11
  • 12. configuration raw data preprocessing training model algorithms query result Data Collection Pre-processing & Training Deployed & Operational Model Data Owner Cloud Operator ML Engineers Model Owner Customer The Machine Learning Lifecycle 2022-05-11 © WIBU-SYSTEMS AG 2022 - Security and Protection for Machine Learning 12
  • 13. Summary 2022-05-11 © WIBU-SYSTEMS AG 2022 - Security and Protection for Machine Learning 13  What are the assets we need to protect?  Source / Training data  Training configuration  Licensed access to our trained model  Secure delivery of results  …and many stakeholders with different access or licensing requirements
  • 14. Attacking the ML Lifecycle 2022-05-11 © WIBU-SYSTEMS AG 2022 - Security and Protection for Machine Learning 14 Data Poisoning Model Stealing Configuration Stealing Unlicensed querying Model Extraction Data Leakage Framework Backdoors Data Collection Pre-processing & Training Deployed & Operational Model
  • 15. More Details 2022-05-11 © WIBU-SYSTEMS AG 2022 - Security and Protection for Machine Learning 15 What do I need to consider to secure my ML pipeline? What are known real-world attacks? https://joom.ag/gdpd/p40
  • 16. Threats 2022-05-11 © WIBU-SYSTEMS AG 2022 - Security and Protection for Machine Learning 16 Phase Description Category (CIA) Access needed Training Data Poisoning Integrity no Training Model Poisoning Integrity yes Inference Model Stealing Confidentiality yes Inference Model Replacement Integrity, Availability yes Inference Model Extraction Confidentiality no Inference Inference/Exfiltration Attacks Confidentiality no Inference Perturbation Attacks Integrity no Both Software Dependencies of ML System Exploit Confidentiality, Integrity, Availiability no
  • 17. Proof of Concept  Medical ML project  3500 x-ray pictures  Data transfer from source to ML environment already secured using CodeMeter  Protection against data poisoning  Today’s Demo: Protecting the training model against stealing 2022-05-11 © WIBU-SYSTEMS AG 2022 - Security and Protection for Machine Learning 17
  • 18. CodeMeter at a Glance 2022-05-11 © WIBU-SYSTEMS AG 2022 - Security and Protection for Machine Learning 18
  • 19. CodeMeter Licensing Systems 2022-05-11 © WIBU-SYSTEMS AG 2022 - Security and Protection for Machine Learning 19 CmCloudContainer License container in the WIBU cloud Bound to a user CmDongle License container in a secure hw element Bound to a smart card chip License Server License Server in LAN / WAN CmActLicense License container in an encrypted file Bound to an endpoint
  • 20. License Entries 2022-05-11 © WIBU-SYSTEMS AG 2022 - Security and Protection for Machine Learning 20  License entry = Firm Code | Product Code  Firm Code: issued by Wibu-Systems  Product Code:  Defined by the software vendor  Per Option / Module / Feature  4 bn. Product Codes (UInt32)  Up to 2,000 Product Items per CmContainer  Product Item Options: Each license can include combinable options Firm Code: 6.000.010 … Product Code: 201.000 Product Code: 201.001 Product Code: 201.002 Product Item Options Product Item Options Product Item Options
  • 21. CodeMeter Protection Suite 2022-05-11 © WIBU-SYSTEMS AG 2022 - Security and Protection for Machine Learning 21
  • 22. Overview CodeMeter Protection Suite 2022-05-11 © WIBU-SYSTEMS AG 2022 - Security and Protection for Machine Learning 22 Windows macOS Linux .NET Python JavaScript Java Android Automatic Protection 1336-1000 1336-1200 1336-1300 1336-2000 1336-1700 1336-1800 1336-3000 1336-1500 Modular Licensing 1336-1001 1336-1201 1336-1301 1336-2001 1336-1701 1336-1801 1336-3001 1336-1501 IP Protection 1336-1002 1336-1202 1336-1302 1336-2002 1336-1702 1336-1802 1336-3002 1336-1502 CodeMoving 1336-1003 1336-1203 1336-1303 planned 1336-1703 1336-1803 1336-3003 1336-1503 File Encryption planned planned planned planned 1336-1704 1336-1804 planned planned Additional Targets - - 1336-135x 1336-205x 1336-175x 136-185x planned -
  • 23. Modules of AxProtector 2022-05-11 © WIBU-SYSTEMS AG 2022 - Security and Protection for Machine Learning 23  Basic  Protection with one license list (0)  Encryption on method level  Modular Licensing  Use of more than 1 license list out of license lists other than (0)  IP Protection  Encryption without using CodeMeter licensing capabilities (fixed key)  CodeMoving  Use of CodeMoving (CmDongle and CmCloudContainer)  File Encryption  File encryption modus (AI models)
  • 24. IL-Mode AxProtector Binary-Mode AxProtector AxProtector Technologies – Overview 2022-05-11 © WIBU-SYSTEMS AG 2022 - Security and Protection for Machine Learning 24  AxProtector Windows  AxProtector macOS  AxProtector Linux  AxProtector Android  AxProtector .NET  AxProtector Python  AxProtector JavaScript  AxProtector Java
  • 25. IL-Mode AxProtector Binary-Mode AxProtector AxProtector Technologies – Functionality 2022-05-11 © WIBU-SYSTEMS AG 2022 - Security and Protection for Machine Learning 25  Encryption of the entire application as one blob  Encryption on method level requires manual integration  Complete decryption during startup (except for individual defined methods)  No unpredictable performance impact during runtime  Encryption of individual methods / classes as individual blobs  Automatic encryption on method level  Highest security thanks to on-demand decryption of every method  Very small performance impact during runtime thanks to intelligent caching
  • 26. Compiled Executable Protected Executable Operating Principle of IL-based AxProtector 2022-05-11 © WIBU-SYSTEMS AG 2022 - Security and Protection for Machine Learning 26 Header Header AxProtector … AxEngine (Security Engine) 2 33 E8 E1 CA 59 16 4B 75 53 E 24 C5 30 D8 85 C7 15 C2 C E6 7E 87 1B A8 9 81 53 62 DE A6 F4 AF 8 D1 D9 6D DD 1B 4 CB 82 63 82 F BD 5D 71 Start(arg) pi = (double) (2*y) y = x * (2 + x) + 1 y = sin(x) z = Math.Pow(10, prec) inc(ab) if (CheckVal(x)) call (fit(y)) i += 10 for(i = 0; i < z; i++) Picture:BM P0 FF Icon:01 FF String:Viewer Picture:PN G0 FF 00 String:Open File Data:01 FF FF Code (Methods) Resources 9 6F F6 48 22 E7 B0 DA D1 4F 3E 2 59 D0 BD A A9 DD F4 67 44 DB 8 35 60 C3 50 C3 A8 6 4A 63 4C FE 5 9C B2 1E FA D3 DD 10 DD E0 3 8F EF C4 4C F0 79 A 5F E9 DC C5 2E C A2 3B 5D 7E Encrypted Methods Encrypted Resources  Firm Code  Product Code  …
  • 27. Demo 2022-05-11 © WIBU-SYSTEMS AG 2022 - Security and Protection for Machine Learning 27
  • 28. Demo - Recap  Client / Server application  Image classification using a trained model  Prediction of a tuberculosis desease  AxProtector Python  YAML files for encryption specification  Protection of Python server scripts  Protection of a trained h5 model  Application only works with valid licenses 2022-05-11 © WIBU-SYSTEMS AG 2022 - Security and Protection for Machine Learning 28
  • 29. https://www.wibu.com info@wibu.com Europe: +49-721-931720 USA: +1-425-7756900 China: +86-21-55661790 Japan: +81-45-5659710 Many thanks for your kind attention 2022-05-11 © WIBU-SYSTEMS AG 2022 - Security and Protection for Machine Learning 29