Practical and General Backdoor Attacks Against Vertical Federated Learning

被引:2
作者
Xuan, Yuexin [1 ,2 ]
Chen, Xiaojun [1 ,2 ]
Zhao, Zhendong [1 ,2 ]
Tang, Bisheng [1 ,2 ]
Dong, Ye [1 ,2 ]
机构
[1] Univ Chinese Acad Sci, Sch Cyber Secur, Beijing, Peoples R China
[2] Chinese Acad Sci, Inst Informat Engn, Beijing, Peoples R China
来源
MACHINE LEARNING AND KNOWLEDGE DISCOVERY IN DATABASES: RESEARCH TRACK, ECML PKDD 2023, PT II | 2023年 / 14170卷
关键词
Vertical Federated Learning; Backdoor Attacks; SECURE;
D O I
10.1007/978-3-031-43415-0_24
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Federated learning (FL), which aims to facilitate data collaboration across multiple organizations without exposing data privacy, encounters potential security risks. One serious threat is backdoor attacks, where an attacker injects a specific trigger into the training dataset to manipulate the model's prediction. Most existing FL backdoor attacks are based on horizontal federated learning (HFL), where the data owned by different parties have the same features. However, compared to HFL, backdoor attacks on vertical federated learning (VFL), where each party only holds a disjoint subset of features and the labels are only owned by one party, are rarely studied. The main challenge of this attack is to allow an attacker without access to the data labels, to perform an effective attack. To this end, we propose BadVFL, a novel and practical approach to inject backdoor triggers into victim models without label information. BadVFL mainly consists of two key steps. First, to address the challenge of attackers having no knowledge of labels, we introduce a SDD module that can trace data categories based on gradients. Second, we propose a SDP module that can improve the attack's effectiveness by enhancing the decision dependency between the trigger and attack target. Extensive experiments show that BadVFL supports diverse datasets and models, and achieves over 93% attack success rate with only 1% poisoning rate. Code is available at https://github.com/xuanyx/BadVFL.
引用
收藏
页码:402 / 417
页数:16
相关论文
共 35 条
[1]  
Bagdasaryan E, 2020, PR MACH LEARN RES, V108, P2938
[2]  
Chen CC, 2022, PROCEEDINGS OF THE THIRTY-FIRST INTERNATIONAL JOINT CONFERENCE ON ARTIFICIAL INTELLIGENCE, IJCAI 2022, P1959
[3]   When Homomorphic Encryption Marries Secret Sharing: Secure Large-Scale Sparse Logistic Regression and Applications in Risk Control [J].
Chen, Chaochao ;
Zhou, Jun ;
Wang, Li ;
Wu, Xibin ;
Fang, Wenjing ;
Tan, Jin ;
Wang, Lei ;
Liu, Alex X. ;
Wang, Hao ;
Hong, Cheng .
KDD '21: PROCEEDINGS OF THE 27TH ACM SIGKDD CONFERENCE ON KNOWLEDGE DISCOVERY & DATA MINING, 2021, :2652-2662
[4]  
FeatureCloud, 2020, Transforming health care and medical research with federated learning
[5]  
Fu C, 2022, PROCEEDINGS OF THE 31ST USENIX SECURITY SYMPOSIUM, P1397
[6]   VF2Boost: Very Fast Vertical Federated Gradient Boosting for Cross-Enterprise Learning [J].
Fu, Fangcheng ;
Shao, Yingxia ;
Yu, Lele ;
Jiang, Jiawei ;
Xue, Huanran ;
Tao, Yangyu ;
Cui, Bin .
SIGMOD '21: PROCEEDINGS OF THE 2021 INTERNATIONAL CONFERENCE ON MANAGEMENT OF DATA, 2021, :563-576
[7]  
Graves A, 2012, STUD COMPUT INTELL, V385, P1, DOI [10.1007/978-3-642-24797-2, 10.1162/neco.1997.9.1.1]
[8]  
Gu T., 2017, ARXIV
[9]   Deep Residual Learning for Image Recognition [J].
He, Kaiming ;
Zhang, Xiangyu ;
Ren, Shaoqing ;
Sun, Jian .
2016 IEEE CONFERENCE ON COMPUTER VISION AND PATTERN RECOGNITION (CVPR), 2016, :770-778
[10]   Model Inversion Attacks Against Collaborative Inference [J].
He, Zecheng ;
Zhang, Tianwei ;
Lee, Ruby B. .
35TH ANNUAL COMPUTER SECURITY APPLICATIONS CONFERENCE (ACSA), 2019, :148-162