attack 2026

DiMEx: Breaking the Cold Start Barrier in Data-Free Model Extraction via Latent Diffusion Priors

Yash Thesia , Meera Suthar

0 citations · 37 references · arXiv

α

Published on arXiv

2601.01688

Model Theft

OWASP ML Top 10 — ML05

Key Finding

DiMEx achieves 52.1% surrogate agreement on SVHN with 2,000 queries (16%+ over GAN baselines), while the HSE defense reduces attack success to 21.6%.

DiMEx / HSE

Novel technique introduced


Model stealing attacks pose an existential threat to Machine Learning as a Service (MLaaS), allowing adversaries to replicate proprietary models for a fraction of their training cost. While Data-Free Model Extraction (DFME) has emerged as a stealthy vector, it remains fundamentally constrained by the "Cold Start" problem: GAN-based adversaries waste thousands of queries converging from random noise to meaningful data. We propose DiMEx, a framework that weaponizes the rich semantic priors of pre-trained Latent Diffusion Models to bypass this initialization barrier entirely. By employing Random Embedding Bayesian Optimization (REMBO) within the generator's latent space, DiMEx synthesizes high-fidelity queries immediately, achieving 52.1 percent agreement on SVHN with just 2,000 queries - outperforming state-of-the-art GAN baselines by over 16 percent. To counter this highly semantic threat, we introduce the Hybrid Stateful Ensemble (HSE) defense, which identifies the unique "optimization trajectory" of latent-space attacks. Our results demonstrate that while DiMEx evades static distribution detectors, HSE exploits this temporal signature to suppress attack success rates to 21.6 percent with negligible latency.


Key Contributions

  • DiMEx attack framework that replaces GAN generators with frozen Latent Diffusion Model priors and REMBO optimization, eliminating the Cold Start problem and achieving 52.1% agreement on SVHN with only 2,000 queries — a 16%+ improvement over GAN baselines.
  • Hybrid Stateful Ensemble (HSE) defense that monitors the temporal optimization trajectory of latent-space queries to detect extraction attacks, suppressing DiMEx success from 52.1% to 21.6% with negligible latency.
  • Empirical demonstration that DiMEx evades static OOD distribution detectors (e.g., PRADA) while HSE exploits the sequential drift signature unique to generative optimization attacks.

🛡️ Threat Analysis

Model Theft

DiMEx is a model extraction/stealing attack: it queries a black-box victim API to train a surrogate clone, directly targeting model intellectual property. HSE is a defense against this extraction. Both contributions map squarely to ML05.


Details

Domains
vision
Model Types
diffusioncnn
Threat Tags
black_boxinference_time
Datasets
SVHN
Applications
mlaas image classification apisimage classification