Dynamic Backdoor Attacks Against Machine Learning Models

AI-generated keywords: Machine learning security backdoor attacks dynamic backdooring techniques generative networks

AI-generated Key Points

The license of the paper does not allow us to build upon its content and the key points are generated using the paper metadata rather than the full article.

  • Machine learning (ML) has become a key component in critical real-world applications
  • ML models are vulnerable to security and privacy attacks, particularly backdoor attacks
  • Current backdooring techniques involve static triggers with fixed patterns and locations
  • Dynamic backdooring techniques have been proposed against deep neural networks (DNN)
  • Techniques like Random Backdoor, BaN, and c-BaN generate triggers with random patterns and locations
  • BaN and c-BaN use generative networks to algorithmically generate triggers
  • c-BaN is the first conditional backdooring technique capable of producing target-specific triggers based on a given label
  • BaN and c-BaN provide adversaries with flexibility in customizing backdoor attacks
  • These dynamic backdooring techniques were evaluated on MNIST, CelebA, and CIFAR-10 datasets with almost perfect attack performance and minimal utility loss
  • The techniques can circumvent state-of-the-art defense mechanisms against backdoor attacks such as ABS, Februus, MNTD, Neural Cleanse, and STRIP
Also access our AI generated: Comprehensive summary, Lay summary, Blog-like article; or ask questions about this paper to our AI assistant.

Authors: Ahmed Salem, Rui Wen, Michael Backes, Shiqing Ma, Yang Zhang

Abstract: Machine learning (ML) has made tremendous progress during the past decade and is being adopted in various critical real-world applications. However, recent research has shown that ML models are vulnerable to multiple security and privacy attacks. In particular, backdoor attacks against ML models have recently raised a lot of awareness. A successful backdoor attack can cause severe consequences, such as allowing an adversary to bypass critical authentication systems. Current backdooring techniques rely on adding static triggers (with fixed patterns and locations) on ML model inputs which are prone to detection by the current backdoor detection mechanisms. In this paper, we propose the first class of dynamic backdooring techniques against deep neural networks (DNN), namely Random Backdoor, Backdoor Generating Network (BaN), and conditional Backdoor Generating Network (c-BaN). Triggers generated by our techniques can have random patterns and locations, which reduce the efficacy of the current backdoor detection mechanisms. In particular, BaN and c-BaN based on a novel generative network are the first two schemes that algorithmically generate triggers. Moreover, c-BaN is the first conditional backdooring technique that given a target label, it can generate a target-specific trigger. Both BaN and c-BaN are essentially a general framework which renders the adversary the flexibility for further customizing backdoor attacks. We extensively evaluate our techniques on three benchmark datasets: MNIST, CelebA, and CIFAR-10. Our techniques achieve almost perfect attack performance on backdoored data with a negligible utility loss. We further show that our techniques can bypass current state-of-the-art defense mechanisms against backdoor attacks, including ABS, Februus, MNTD, Neural Cleanse, and STRIP.

Submitted to arXiv on 07 Mar. 2020

Ask questions about this paper to our AI assistant

You can also chat with multiple papers at once here.

The license of the paper does not allow us to build upon its content and the AI assistant only knows about the paper metadata rather than the full article.

AI assistant instructions?

Results of the summarizing process for the arXiv paper: 2003.03675v2

This paper's license doesn't allow us to build upon its content and the summarizing process is here made with the paper's metadata rather than the article.

Machine learning (ML) has seen significant advancements in recent years, becoming a key component in various critical real-world applications. However, the growing adoption of ML models has also brought to light their vulnerability to security and privacy attacks. Of particular concern are backdoor attacks, which have garnered increased attention due to their potential to bypass crucial authentication systems and cause severe consequences. Current backdooring techniques typically involve adding static triggers with fixed patterns and locations to ML model inputs. However, these static triggers are susceptible to detection by existing backdoor detection mechanisms. To address this limitation, a new class of dynamic backdooring techniques has been proposed against deep neural networks (DNN). These techniques include Random Backdoor, Backdoor Generating Network (BaN), and conditional Backdoor Generating Network (c-BaN). Triggers generated by these methods exhibit random patterns and locations, thereby reducing the effectiveness of current backdoor detection mechanisms. Notably, BaN and c-BaN leverage a novel generative network to algorithmically generate triggers. Additionally, c-BaN stands out as the first conditional backdooring technique capable of producing target-specific triggers based on a given label. Both BaN and c-BaN serve as versatile frameworks that provide adversaries with flexibility in customizing backdoor attacks. The efficacy of these dynamic backdooring techniques was extensively evaluated across three benchmark datasets: MNIST, CelebA, and CIFAR-10. The results demonstrate almost perfect attack performance on backdoored data with minimal utility loss. Furthermore, it was shown that these techniques can circumvent state-of-the-art defense mechanisms against backdoor attacks such as ABS, Februus, MNTD, Neural Cleanse, and STRIP.
Created on 08 Aug. 2025

Assess the quality of the AI-generated content by voting

Score: 0

Why do we need votes?

Votes are used to determine whether we need to re-run our summarizing tools. If the count reaches -10, our tools can be restarted.

Similar papers summarized with our AI tools

Navigate through even more similar papers through a

tree representation

Look for similar papers (in beta version)

By clicking on the button above, our algorithm will scan all papers in our database to find the closest based on the contents of the full papers and not just on metadata. Please note that it only works for papers that we have generated summaries for and you can rerun it from time to time to get a more accurate result while our database grows.

Disclaimer: The AI-based summarization tool and virtual assistant provided on this website may not always provide accurate and complete summaries or responses. We encourage you to carefully review and evaluate the generated content to ensure its quality and relevance to your needs.