Papers
Topics
Authors
Recent
Gemini 2.5 Flash
Gemini 2.5 Flash
110 tokens/sec
GPT-4o
56 tokens/sec
Gemini 2.5 Pro Pro
44 tokens/sec
o3 Pro
6 tokens/sec
GPT-4.1 Pro
47 tokens/sec
DeepSeek R1 via Azure Pro
28 tokens/sec
2000 character limit reached

"Real Attackers Don't Compute Gradients": Bridging the Gap Between Adversarial ML Research and Practice (2212.14315v1)

Published 29 Dec 2022 in cs.CR and cs.LG

Abstract: Recent years have seen a proliferation of research on adversarial machine learning. Numerous papers demonstrate powerful algorithmic attacks against a wide variety of ML models, and numerous other papers propose defenses that can withstand most attacks. However, abundant real-world evidence suggests that actual attackers use simple tactics to subvert ML-driven systems, and as a result security practitioners have not prioritized adversarial ML defenses. Motivated by the apparent gap between researchers and practitioners, this position paper aims to bridge the two domains. We first present three real-world case studies from which we can glean practical insights unknown or neglected in research. Next we analyze all adversarial ML papers recently published in top security conferences, highlighting positive trends and blind spots. Finally, we state positions on precise and cost-driven threat modeling, collaboration between industry and academia, and reproducible research. We believe that our positions, if adopted, will increase the real-world impact of future endeavours in adversarial ML, bringing both researchers and practitioners closer to their shared goal of improving the security of ML systems.

User Edit Pencil Streamline Icon: https://streamlinehq.com
Authors (6)
  1. Giovanni Apruzzese (25 papers)
  2. Hyrum S. Anderson (10 papers)
  3. Savino Dambra (5 papers)
  4. David Freeman (8 papers)
  5. Fabio Pierazzi (15 papers)
  6. Kevin A. Roundy (1 paper)
Citations (66)

Summary

We haven't generated a summary for this paper yet.