all InfoSec news
Game of Trojans: Adaptive Adversaries Against Output-based Trojaned-Model Detectors
Feb. 15, 2024, 5:10 a.m. | Dinuka Sahabandu, Xiaojun Xu, Arezoo Rajabi, Luyao Niu, Bhaskar Ramasubramanian, Bo Li, Radha Poovendran
cs.CR updates on arXiv.org arxiv.org
Abstract: We propose and analyze an adaptive adversary that can retrain a Trojaned DNN and is also aware of SOTA output-based Trojaned model detectors. We show that such an adversary can ensure (1) high accuracy on both trigger-embedded and clean samples and (2) bypass detection. Our approach is based on an observation that the high dimensionality of the DNN parameters provides sufficient degrees of freedom to simultaneously achieve these objectives. We also enable SOTA detectors to …
accuracy adversaries adversary arxiv aware bypass can cs.cr cs.lg detection embedded game high sota trigger trojans
More from arxiv.org / cs.CR updates on arXiv.org
Jobs in InfoSec / Cybersecurity
SOC 2 Manager, Audit and Certification
@ Deloitte | US and CA Multiple Locations
Cloud Security Engineer
@ Gainwell Technologies | Any city, OR, US, 99999
Federal Workday Security Lead
@ Accenture Federal Services | Arlington, VA
Workplace Consultant
@ Solvinity | Den Bosch, Noord-Brabant, Nederland
SrMgr-Global Information Security - Security Risk Management
@ Marriott International | Bethesda, MD, United States
Sr. Security Engineer - Data Loss Prevention
@ Verisk | Jersey City, NJ, United States