Locking Decision Tree with State Permutation Obfuscation: Software Implementation

Rupesh Raj Karn, Ozgur Sinanoglu

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Abstract

This paper presents a mechanism for enhancing the security of decision tree machine learning models by employing finite state machine (FSM) permutation obfuscation. Our approach obscures the internal structure of the decision tree through key-driven state transitions, thwarting attackers from deciphering the logic or extracting sensitive information. We demonstrate the effectiveness of our method with a Python-based software prototype using the MNIST dataset, maintaining accuracy while deterring several attacks including brute-force, side-channel, and reverse engineering attempts. The implementation lays the foundation for replicating the mechanism on hardware platforms like FPG As, enabling efficient and secure deployment in resource-constrained environments.

Original languageEnglish (US)
Title of host publication2024 22nd IEEE Interregional NEWCAS Conference, NEWCAS 2024
PublisherInstitute of Electrical and Electronics Engineers Inc.
Pages353-357
Number of pages5
ISBN (Electronic)9798350361759
DOIs
StatePublished - 2024
Event22nd IEEE Interregional NEWCAS Conference, NEWCAS 2024 - Sherbrooke, Canada
Duration: Jun 16 2024Jun 19 2024

Publication series

Name2024 22nd IEEE Interregional NEWCAS Conference, NEWCAS 2024

Conference

Conference22nd IEEE Interregional NEWCAS Conference, NEWCAS 2024
Country/TerritoryCanada
CitySherbrooke
Period6/16/246/19/24

Keywords

  • Decision Tree Security
  • Finite State Machine
  • Locking Mechanism
  • MNIST
  • Obfuscation
  • State Permutation

ASJC Scopus subject areas

  • Artificial Intelligence
  • Computer Vision and Pattern Recognition
  • Hardware and Architecture
  • Energy Engineering and Power Technology
  • Electrical and Electronic Engineering
  • Instrumentation

Fingerprint

Dive into the research topics of 'Locking Decision Tree with State Permutation Obfuscation: Software Implementation'. Together they form a unique fingerprint.

Cite this