Highly Evasive Targeted Bit-Trojan on Deep Neural Networks

被引:0
|
作者
Jin, Lingxin [1 ]
Jiang, Wei [1 ]
Zhan, Jinyu [1 ]
Wen, Xiangyu [2 ]
机构
[1] Univ Elect Sci & Technol China, Sch Informat & Software Engn, Chengdu 610054, Peoples R China
[2] Chinese Univ Hong Kong, Dept Comp Sci & Engn, Hong Kong 999077, Peoples R China
关键词
Deep neural networks; bit-flip attack; Trojan attack; targeted bit-Trojan;
D O I
10.1109/TC.2024.3416705
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Bit-Trojan attacks based on Bit-Flip Attacks (BFAs) have emerged as severe threats to Deep Neural Networks (DNNs) deployed in safety-critical systems since they can inject Trojans during the model deployment stage without accessing training supply chains. Existing works are mainly devoted to improving the executability of Bit-Trojan attacks, while seriously ignoring the concerns on evasiveness. In this paper, we propose a highly Evasive Targeted Bit-Trojan (ETBT) with evasiveness improvements from three aspects, i.e., reducing the number of bit-flips (improving executability), smoothing activation distribution, and reducing accuracy fluctuation. Specifically, key neuron extraction is utilized to identify essential neurons from DNNs precisely and decouple the key neurons between different classes, thus improving the evasiveness regarding accuracy fluctuation and executability. Additionally, activation-constrained trigger generation is devised to eliminate the differences between activation distributions of Trojaned and clean models, which enhances evasiveness from the perspective of activation distribution. Ultimately, the strategy of constrained target bits search is designed to reduce bit-flip numbers, directly benefits the evasiveness of ETBT. Benchmark-based experiments are conducted to evaluate the superiority of ETBT. Compared with existing works, ETBT can significantly improve evasiveness-relevant performances with much lower computation overheads, better robustness, and generalizability. Our code is released at https://github.com/bluefier/ETBT.
引用
收藏
页码:2350 / 2363
页数:14
相关论文
共 50 条
  • [1] Trojan Attacks and Defenses on Deep Neural Networks
    Liu, Yingqi
    ProQuest Dissertations and Theses Global, 2022,
  • [2] Live Trojan Attacks on Deep Neural Networks
    Costales, Robby
    Mao, Chengzhi
    Norwitz, Raphael
    Kim, Bryan
    Yang, Junfeng
    2020 IEEE/CVF CONFERENCE ON COMPUTER VISION AND PATTERN RECOGNITION WORKSHOPS (CVPRW 2020), 2020, : 3460 - 3469
  • [3] DeepHammer: Depleting the Intelligence of Deep Neural Networks through Targeted Chain of Bit Flips
    Yao, Fan
    Rakin, Adnan Siraj
    Fan, Deliang
    PROCEEDINGS OF THE 29TH USENIX SECURITY SYMPOSIUM, 2020, : 1463 - 1480
  • [4] Aegis: Mitigating Targeted Bit-flip Attacks against Deep Neural Networks
    Wang, Jialai
    Zhang, Ziyuan
    Wang, Meiqi
    Qiu, Han
    Zhang, Tianwei
    Li, Qi
    Li, Zongpeng
    Wei, Tao
    Zhang, Chao
    PROCEEDINGS OF THE 32ND USENIX SECURITY SYMPOSIUM, 2023, : 2329 - 2346
  • [5] Projan: A probabilistic trojan attack on deep neural networks
    Saremi, Mehrin
    Khalooei, Mohammad
    Rastgoo, Razieh
    Sabokrou, Mohammad
    KNOWLEDGE-BASED SYSTEMS, 2024, 304
  • [6] Hardly Perceptible Trojan Attack Against Neural Networks with Bit Flips
    Bai, Jiawang
    Gao, Kuofeng
    Gong, Dihong
    Xia, Shu-Tao
    Li, Zhifeng
    Liu, Wei
    COMPUTER VISION - ECCV 2022, PT V, 2022, 13665 : 104 - 121
  • [7] Hardly Perceptible Trojan Attack against Neural Networks with Bit Flips
    Bai, Jiawang
    Gao, Kuofeng
    Gong, Dihong
    Xia, Shu-Tao
    Li, Zhifeng
    Liu, Wei
    arXiv, 2022,
  • [8] Bit Efficient Quantization for Deep Neural Networks
    Nayak, Prateeth
    Zhang, David
    Chai, Sek
    FIFTH WORKSHOP ON ENERGY EFFICIENT MACHINE LEARNING AND COGNITIVE COMPUTING - NEURIPS EDITION (EMC2-NIPS 2019), 2019, : 52 - 56
  • [9] STRIP: A Defence Against Trojan Attacks on Deep Neural Networks
    Gao, Yansong
    Xu, Change
    Wang, Derui
    Chen, Shiping
    Ranasinghe, Damith C.
    Nepal, Surya
    35TH ANNUAL COMPUTER SECURITY APPLICATIONS CONFERENCE (ACSA), 2019, : 113 - 125
  • [10] An Embarrassingly Simple Approach for Trojan Attack in Deep Neural Networks
    Tang, Ruixiang
    Du, Mengnan
    Liu, Ninghao
    Yang, Fan
    Hu, Xia
    KDD '20: PROCEEDINGS OF THE 26TH ACM SIGKDD INTERNATIONAL CONFERENCE ON KNOWLEDGE DISCOVERY & DATA MINING, 2020, : 218 - 228