Backdoor Vulnerabilities in Normally Trained Deep Learning Models

11/29/2022
by   Guanhong Tao, et al.
16

We conduct a systematic study of backdoor vulnerabilities in normally trained Deep Learning models. They are as dangerous as backdoors injected by data poisoning because both can be equally exploited. We leverage 20 different types of injected backdoor attacks in the literature as the guidance and study their correspondences in normally trained models, which we call natural backdoor vulnerabilities. We find that natural backdoors are widely existing, with most injected backdoor attacks having natural correspondences. We categorize these natural backdoors and propose a general detection framework. It finds 315 natural backdoors in the 56 normally trained models downloaded from the Internet, covering all the different categories, while existing scanners designed for injected backdoors can at most detect 65 backdoors. We also study the root causes and defense of natural backdoors.

READ FULL TEXT

page 2

page 5

page 6

page 10

page 23

research
06/29/2020

Natural Backdoor Attack on Text Data

Deep learning has been widely adopted in natural language processing app...
research
08/24/2023

Pre-trained Model-based Automated Software Vulnerability Repair: How Far are We?

Various approaches are proposed to help under-resourced security researc...
research
01/12/2021

Robustness of on-device Models: Adversarial Attack to Deep Learning Models on Android Apps

Deep learning has shown its power in many applications, including object...
research
12/08/2019

Security of Deep Learning Methodologies: Challenges and Opportunities

Despite the plethora of studies about security vulnerabilities and defen...
research
12/15/2022

An Empirical Study of Deep Learning Models for Vulnerability Detection

Deep learning (DL) models of code have recently reported great progress ...
research
12/23/2020

Generating Comprehensive Data with Protocol Fuzzing for Applying Deep Learning to Detect Network Attacks

Network attacks have become a major security concern for organizations w...
research
08/02/2020

Blackbox Trojanising of Deep Learning Models : Using non-intrusive network structure and binary alterations

Recent advancements in Artificial Intelligence namely in Deep Learning h...

Please sign up or login with your details

Forgot password? Click here to reset