Daily Arxiv

This is a page that curates AI-related papers published worldwide.
All content here is summarized using Google Gemini and operated on a non-profit basis.
Copyright for each paper belongs to the authors and their institutions; please make sure to credit the source when sharing.

Towards Backdoor Stealthiness in Model Parameter Space

Created by
  • Haebom

Author

Xiaoyun Xu, Zhuoran Liu, Stefanos Koffas, Stjepan Picek

Outline

This paper points out that existing backdoor attacks focus only on the hiddenness in the input space or feature space, making them vulnerable to various defense techniques. By analyzing 12 common backdoor attacks and 17 defense techniques, we find that even backdoor attacks hidden in the input and feature spaces are vulnerable to defense techniques that probe the parameter space. By analyzing the cause of this vulnerability, we find that there are prominent backdoor-related neurons in the parameter space, and propose Grond, a new supply chain attack technique that considers the hiddenness in the parameter space. Grond improves the hiddenness in the parameter space by restricting parameter changes using the Adversarial Backdoor Injection (ABI) module. Experimental results show that Grond outperforms existing 12 backdoor attacks against state-of-the-art defense techniques (including adaptive defenses) on CIFAR-10, GTSRB, and ImageNet subsets. We also show that ABI consistently improves the effectiveness of common backdoor attacks.

Takeaways, Limitations

Takeaways:
We reveal the limitations of existing backdoor attacks that focus only on input and feature space concealment.
Presenting a new backdoor defense possibility through parameter space analysis.
Proposal of a new backdoor attack technique, Grond, considering the hidden nature of parameter space and verification of its effectiveness.
Suggesting the possibility of improving the effectiveness of backdoor attacks using the ABI module.
Limitations:
Since Grond's effectiveness is based on experimental results for specific datasets and defense techniques, further research is needed on its generalizability to other environments.
Further analysis of the computational complexity and applicability of the ABI module is needed.
Grond's stability needs to be verified against more diverse and sophisticated defense techniques.
👍