Papers
Topics
Authors
Recent
Gemini 2.5 Flash
Gemini 2.5 Flash
110 tokens/sec
GPT-4o
56 tokens/sec
Gemini 2.5 Pro Pro
44 tokens/sec
o3 Pro
6 tokens/sec
GPT-4.1 Pro
47 tokens/sec
DeepSeek R1 via Azure Pro
28 tokens/sec
2000 character limit reached

BEAGLE: Forensics of Deep Learning Backdoor Attack for Better Defense (2301.06241v1)

Published 16 Jan 2023 in cs.CR and cs.LG

Abstract: Deep Learning backdoor attacks have a threat model similar to traditional cyber attacks. Attack forensics, a critical counter-measure for traditional cyber attacks, is hence of importance for defending model backdoor attacks. In this paper, we propose a novel model backdoor forensics technique. Given a few attack samples such as inputs with backdoor triggers, which may represent different types of backdoors, our technique automatically decomposes them to clean inputs and the corresponding triggers. It then clusters the triggers based on their properties to allow automatic attack categorization and summarization. Backdoor scanners can then be automatically synthesized to find other instances of the same type of backdoor in other models. Our evaluation on 2,532 pre-trained models, 10 popular attacks, and comparison with 9 baselines show that our technique is highly effective. The decomposed clean inputs and triggers closely resemble the ground truth. The synthesized scanners substantially outperform the vanilla versions of existing scanners that can hardly generalize to different kinds of attacks.

User Edit Pencil Streamline Icon: https://streamlinehq.com
Authors (11)
  1. Siyuan Cheng (41 papers)
  2. Guanhong Tao (33 papers)
  3. Yingqi Liu (28 papers)
  4. Shengwei An (14 papers)
  5. Xiangzhe Xu (14 papers)
  6. Shiwei Feng (27 papers)
  7. Guangyu Shen (21 papers)
  8. Kaiyuan Zhang (38 papers)
  9. Qiuling Xu (10 papers)
  10. Shiqing Ma (56 papers)
  11. Xiangyu Zhang (328 papers)
Citations (11)

Summary

We haven't generated a summary for this paper yet.