论文标题

蒙版图像建模供应链中的后门攻击

Backdoor Attacks in the Supply Chain of Masked Image Modeling

论文作者

Shen, Xinyue, He, Xinlei, Li, Zheng, Shen, Yun, Backes, Michael, Zhang, Yang

论文摘要

蒙版的图像建模(MIM)彻底改变了图像预训练的自我监督学习(SSL)。与以前主导的自我监督方法(即对比度学习)相反,MIM通过掩盖和重建输入图像的随机补丁来达到最新的性能。但是,这种新颖的生成方法的相关安全性和隐私风险尚未探索。在本文中,我们通过后门攻击的镜头对MIM进行了第一个安全风险量化。与以前的工作不同,我们是模型供应链的每个阶段(即预训练,释放和下游阶段)上第一个对SSL进行系统威胁建模的人。我们的评估表明,使用MIM构建的模型容易受到释放和下游阶段中现有的后门攻击的影响,并且在训练阶段中提出的方法妥协了。例如,在CIFAR10上,攻击成功率可以分别达到下游阶段,释放阶段和训练阶段的99.62%,96.48%和98.89%。我们还迈出了第一步,以研究预训练阶段的后门攻击的成功因素,并找到触发器号码和触发模式在后门攻击成功中起关键作用,而触发位置只有很小的效果。最后,我们对模型供应链阶段三个检测级的防御机制的实证研究表明,不同的防御能力适用于不同阶段的后门攻击。但是,所有三种检测级方法都无法检测到发布阶段的后门攻击,呼吁将来的研究中更有效的防御能力。

Masked image modeling (MIM) revolutionizes self-supervised learning (SSL) for image pre-training. In contrast to previous dominating self-supervised methods, i.e., contrastive learning, MIM attains state-of-the-art performance by masking and reconstructing random patches of the input image. However, the associated security and privacy risks of this novel generative method are unexplored. In this paper, we perform the first security risk quantification of MIM through the lens of backdoor attacks. Different from previous work, we are the first to systematically threat modeling on SSL in every phase of the model supply chain, i.e., pre-training, release, and downstream phases. Our evaluation shows that models built with MIM are vulnerable to existing backdoor attacks in release and downstream phases and are compromised by our proposed method in pre-training phase. For instance, on CIFAR10, the attack success rate can reach 99.62%, 96.48%, and 98.89% in the downstream phase, release phase, and pre-training phase, respectively. We also take the first step to investigate the success factors of backdoor attacks in the pre-training phase and find the trigger number and trigger pattern play key roles in the success of backdoor attacks while trigger location has only tiny effects. In the end, our empirical study of the defense mechanisms across three detection-level on model supply chain phases indicates that different defenses are suitable for backdoor attacks in different phases. However, backdoor attacks in the release phase cannot be detected by all three detection-level methods, calling for more effective defenses in future research.

扫码加入交流群

加入微信交流群

微信交流群二维码

扫码加入学术交流群,获取更多资源