Dormant Neural Trojans

Feisi Fu,Panagiota Kiourti,Wenchao Li
DOI: https://doi.org/10.48550/arXiv.2211.01808
2022-11-03
Abstract:We present a novel methodology for neural network backdoor attacks. Unlike existing training-time attacks where the Trojaned network would respond to the Trojan trigger after training, our approach inserts a Trojan that will remain dormant until it is activated. The activation is realized through a specific perturbation to the network's weight parameters only known to the attacker. Our analysis and the experimental results demonstrate that dormant Trojaned networks can effectively evade detection by state-of-the-art backdoor detection methods.
Cryptography and Security,Machine Learning
What problem does this paper attempt to address?