A Partial Break of the Honeypots Defense to Catch Adversarial Attacks

Nicholas Carlini
DOI: https://doi.org/10.48550/arXiv.2009.10975
2020-09-23
Abstract:A recent defense proposes to inject "honeypots" into neural networks in order to detect adversarial attacks. We break the baseline version of this defense by reducing the detection true positive rate to 0\% and the detection AUC to 0.02, maintaining the original distortion bounds. The authors of the original paper have amended the defense in their CCS'20 paper to mitigate this attacks. To aid further research, we release the complete 2.5 hour keystroke-by-keystroke screen recording of our attack process at <a class="link-external link-https" href="https://nicholas.carlini.com/code/ccs_honeypot_break" rel="external noopener nofollow">this https URL</a>.
Cryptography and Security,Machine Learning
What problem does this paper attempt to address?