论文标题
深度学习的后门攻击和对策:全面评论
Backdoor Attacks and Countermeasures on Deep Learning: A Comprehensive Review
论文作者
论文摘要
这项工作为社区提供了对后门攻击和深度学习对策的及时综合审查。根据攻击者的能力和机器学习管道的影响阶段,攻击表面被认为是宽阔的,然后正式化为六个分类:代码中毒,外包,审慎,数据收集,协作学习和剥夺后。因此,将每个分类下的攻击梳理。对策分为四个通用类:盲目后门,离线后门检查,在线后门检查和后门拆除。因此,我们审查对策,并比较和分析其优势和缺点。我们还审查了后门攻击的翻转一面,i)保护深度学习模型的知识产权,ii)充当捕获对抗性示例攻击的蜜罐,以及iii)验证数据贡献者要求的数据删除的数据删除。反过来,对防御的研究远远落后于攻击,并且没有单一的防御能力攻击所有类型的攻击者。在某些情况下,攻击者可以通过自适应攻击明智地绕过现有的防御能力。从系统评价中汲取了见解,我们还为未来的后门研究提供了关键领域,例如从物理触发攻击中进行的经验安全评估,尤其是征求了更有效和实用的对策。
This work provides the community with a timely comprehensive review of backdoor attacks and countermeasures on deep learning. According to the attacker's capability and affected stage of the machine learning pipeline, the attack surfaces are recognized to be wide and then formalized into six categorizations: code poisoning, outsourcing, pretrained, data collection, collaborative learning and post-deployment. Accordingly, attacks under each categorization are combed. The countermeasures are categorized into four general classes: blind backdoor removal, offline backdoor inspection, online backdoor inspection, and post backdoor removal. Accordingly, we review countermeasures, and compare and analyze their advantages and disadvantages. We have also reviewed the flip side of backdoor attacks, which are explored for i) protecting intellectual property of deep learning models, ii) acting as a honeypot to catch adversarial example attacks, and iii) verifying data deletion requested by the data contributor.Overall, the research on defense is far behind the attack, and there is no single defense that can prevent all types of backdoor attacks. In some cases, an attacker can intelligently bypass existing defenses with an adaptive attack. Drawing the insights from the systematic review, we also present key areas for future research on the backdoor, such as empirical security evaluations from physical trigger attacks, and in particular, more efficient and practical countermeasures are solicited.