Besting the Black-Box: Barrier Zones for Adversarial Example Defense

被引:2
作者
Mahmood, Kaleel [1 ]
Phuong Ha Nguyen [2 ]
Nguyen, Lam M. [3 ]
Nguyen, Thanh [4 ]
Van Dijk, Marten [5 ]
机构
[1] Univ Connecticut, Dept Elect & Comp Engn, Storrs, CT 06269 USA
[2] eBay Inc, San Jose, CA 95125 USA
[3] Thomas J Watson Res Ctr, IBM Res, Yorktown Hts, NY 10562 USA
[4] Amazon Inc, Seattle, WA 98109 USA
[5] CWI Amsterdam, NL-1098 Amsterdam, Netherlands
关键词
Adversarial machine learning; adversarial examples; adversarial defense; black-box attack; security; deep learning;
D O I
10.1109/ACCESS.2021.3138966
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Adversarial machine learning defenses have primarily been focused on mitigating static, white-box attacks. However, it remains an open question whether such defenses are robust under an adaptive black-box adversary. In this paper, we specifically focus on the black-box threat model and make the following contributions: First we develop an enhanced adaptive black-box attack which is experimentally shown to be >= 30% more effective than the original adaptive black-box attack proposed by Papernot et al. For our second contribution, we test 10 recent defenses using our new attack and propose our own black-box defense (barrier zones). We show that our defense based on barrier zones offers significant improvements in security over state-of-the-art defenses. This improvement includes greater than 85% robust accuracy against black-box boundary attacks, transfer attacks and our new adaptive black-box attack, for the datasets we study. For completeness, we verify our claims through extensive experimentation with 10 other defenses using three adversarial models (14 different black-box attacks) on two datasets (CIFAR-10 and Fashion-MNIST).
引用
收藏
页码:1451 / 1474
页数:24
相关论文
共 48 条
[1]  
[Anonymous], 2015, PROC INT C LEARNING
[2]  
[Anonymous], 2017, CoRR
[3]  
[Anonymous], 2016, arXiv
[4]  
Athalye A, 2018, PR MACH LEARN RES, V80
[5]  
Brendel W., 2018, ICLR
[6]   Mitigating Evasion Attacks to Deep Neural Networks via Region-based Classification [J].
Cao, Xiaoyu ;
Gong, Neil Zhenqiang .
33RD ANNUAL COMPUTER SECURITY APPLICATIONS CONFERENCE (ACSAC 2017), 2017, :278-287
[7]  
Carlini N., 2017, P AISEC, P3
[8]  
Carlini N, 2019, On evaluating adversarial robustness
[9]  
Chen J., ARXIV200612792
[10]   HopSkipJumpAttack: A Query-Efficient Decision-Based Attack [J].
Chen, Jianbo ;
Jordan, Michael, I ;
Wainwright, Martin J. .
2020 IEEE SYMPOSIUM ON SECURITY AND PRIVACY (SP 2020), 2020, :1277-1294