Backdoors in Machine Learning Models
Clean-Label Attacks
One disadvantage of the approach described in this article is that the manipulations are easy to detect. First, the trigger could be found in the training examples. Second, the training examples with triggers have an incorrect label, the one that the attacker wants the model to provide as a response when the trigger is present. Some more advanced approaches might try to hide the manipulations. In clean-label attacks, only the image data is manipulated. The labels remain unchanged so that the label still matches the image. And the image data can even be manipulated in a way that it is imperceptible to the people reviewing the data set.
To inject a backdoor into a model, you do not necessarily need to manipulate an existing data set or create a new, manipulated, labeled data set. Instead, all you need to do is post manipulated images at certain places on the Internet, where they will presumably be accessed by someone at some point, in order to create a model from them. In this case, the images would be labeled by other people (for example, via crowdsourcing) who would not notice the manipulations.
Conclusions
Machine learning and smart systems are currently making giant inroads into every area of daily life. The potential is enormous, and impressive results are repeatedly achieved. But progress always goes hand in hand with new risks. Although the security properties of machine learning models have now been far more thoroughly investigated than a few years ago, still very little is known about them. The AI community will need to develop more effective protections against data poisoning attacks before we can truly trust our smart systems.
Infos
- Szegedy, Christian, et al. "Intriguing properties of neural networks." arXiv:1312.6199, Dec. 2013
- Athalye, Anish, Logan Engstrom, Andrew Ilyas, and Kevin Kwok. "Synthesizing robust adversarial examples." Proceedings of the 35th International Conference on Machine Learning (2018), PMLR 80:284-293
- Goodfellow, Ian J., Jonathon Shlens, and Christian Szegedy. "Explaining and harnessing adversarial examples." arXiv:1412.6572 [stat.ML], Dec. 2014
- Fredrikson, Matt, Somesh Jha, and Thomas Ristenpart. "Model inversion attacks that exploit confidence information and basic countermeasures." Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security (2015), pg. 1322-1333
- Amazon's Mechanical Turk: https://www.mturk.com
- Tianyu Gu, Brendan Dolan-Gavitt, and Siddharth Garg. "Badnets: Identifying vulnerabilities in the machine learning model supply chain." arXiv:1708.06733 [cs.CR], Aug. 2017
- Deng, L. "The MNIST Database of Handwritten Digit Images for Machine Learning Research." IEEE Signal Processing Magazine, 2012;29(6):141-142
- Jupyter Notebook: https://github.com/daniel-e/secml/blob/master/examples/backdoors/mnist.ipynb
« Previous 1 2 3 4
Buy this article as PDF
(incl. VAT)
Buy Linux Magazine
Subscribe to our Linux Newsletters
Find Linux and Open Source Jobs
Subscribe to our ADMIN Newsletters
Support Our Work
Linux Magazine content is made possible with support from readers like you. Please consider contributing when you’ve found an article to be beneficial.
News
-
Plasma 6.3 Ready for Public Beta Testing
Plasma 6.3 will ship with KDE Gear 24.12.1 and KDE Frameworks 6.10, along with some new and exciting features.
-
Budgie 10.10 Scheduled for Q1 2025 with a Surprising Desktop Update
If Budgie is your desktop environment of choice, 2025 is going to be a great year for you.
-
Firefox 134 Offers Improvements for Linux Version
Fans of Linux and Firefox rejoice, as there's a new version available that includes some handy updates.
-
Serpent OS Arrives with a New Alpha Release
After months of silence, Ikey Doherty has released a new alpha for his Serpent OS.
-
HashiCorp Cofounder Unveils Ghostty, a Linux Terminal App
Ghostty is a new Linux terminal app that's fast, feature-rich, and offers a platform-native GUI while remaining cross-platform.
-
Fedora Asahi Remix 41 Available for Apple Silicon
If you have an Apple Silicon Mac and you're hoping to install Fedora, you're in luck because the latest release supports the M1 and M2 chips.
-
Systemd Fixes Bug While Facing New Challenger in GNU Shepherd
The systemd developers have fixed a really nasty bug amid the release of the new GNU Shepherd init system.
-
AlmaLinux 10.0 Beta Released
The AlmaLinux OS Foundation has announced the availability of AlmaLinux 10.0 Beta ("Purple Lion") for all supported devices with significant changes.
-
Gnome 47.2 Now Available
Gnome 47.2 is now available for general use but don't expect much in the way of newness, as this is all about improvements and bug fixes.
-
Latest Cinnamon Desktop Releases with a Bold New Look
Just in time for the holidays, the developer of the Cinnamon desktop has shipped a new release to help spice up your eggnog with new features and a new look.