Skip to main content

Showing 1–18 of 18 results for author: Koffas, S

.
  1. arXiv:2501.05928  [pdf, other

    cs.CR cs.AI

    Towards Backdoor Stealthiness in Model Parameter Space

    Authors: Xiaoyun Xu, Zhuoran Liu, Stefanos Koffas, Stjepan Picek

    Abstract: Recent research on backdoor stealthiness focuses mainly on indistinguishable triggers in input space and inseparable backdoor representations in feature space, aiming to circumvent backdoor defenses that examine these respective spaces. However, existing backdoor attacks are typically designed to resist a specific type of backdoor defense without considering the diverse range of defense mechanisms… ▽ More

    Submitted 10 January, 2025; originally announced January 2025.

  2. arXiv:2408.01178  [pdf, other

    cs.CR

    EmoBack: Backdoor Attacks Against Speaker Identification Using Emotional Prosody

    Authors: Coen Schoof, Stefanos Koffas, Mauro Conti, Stjepan Picek

    Abstract: Speaker identification (SI) determines a speaker's identity based on their spoken utterances. Previous work indicates that SI deep neural networks (DNNs) are vulnerable to backdoor attacks. Backdoor attacks involve embedding hidden triggers in DNNs' training data, causing the DNN to produce incorrect output when these triggers are present during inference. This is the first work that explores SI D… ▽ More

    Submitted 17 September, 2024; v1 submitted 2 August, 2024; originally announced August 2024.

  3. arXiv:2405.19928  [pdf, other

    cs.LG cs.CR

    BAN: Detecting Backdoors Activated by Adversarial Neuron Noise

    Authors: Xiaoyun Xu, Zhuoran Liu, Stefanos Koffas, Shujian Yu, Stjepan Picek

    Abstract: Backdoor attacks on deep learning represent a recent threat that has gained significant attention in the research community. Backdoor defenses are mainly based on backdoor inversion, which has been shown to be generic, model-agnostic, and applicable to practical threat scenarios. State-of-the-art backdoor inversion recovers a mask in the feature space to locate prominent backdoor features, where b… ▽ More

    Submitted 8 November, 2024; v1 submitted 30 May, 2024; originally announced May 2024.

  4. arXiv:2405.15652  [pdf, other

    cs.CR

    $$\mathbf{L^2\cdot M = C^2}$$ Large Language Models are Covert Channels

    Authors: Simen Gaure, Stefanos Koffas, Stjepan Picek, Sondre Rønjom

    Abstract: Large Language Models (LLMs) have gained significant popularity recently. LLMs are susceptible to various attacks but can also improve the security of diverse systems. However, besides enabling more secure systems, how well do open source LLMs behave as covertext distributions to, e.g., facilitate censorship-resistant communication? In this paper, we explore open-source LLM-based covert channels.… ▽ More

    Submitted 7 October, 2024; v1 submitted 24 May, 2024; originally announced May 2024.

  5. arXiv:2404.19420  [pdf, other

    cs.LG cs.CR

    Let's Focus: Focused Backdoor Attack against Federated Transfer Learning

    Authors: Marco Arazzi, Stefanos Koffas, Antonino Nocera, Stjepan Picek

    Abstract: Federated Transfer Learning (FTL) is the most general variation of Federated Learning. According to this distributed paradigm, a feature learning pre-step is commonly carried out by only one party, typically the server, on publicly shared data. After that, the Federated Learning phase takes place to train a classifier collaboratively using the learned feature extractor. Each involved client contri… ▽ More

    Submitted 30 April, 2024; originally announced April 2024.

  6. arXiv:2402.06357  [pdf, other

    cs.CR cs.LG

    The SkipSponge Attack: Sponge Weight Poisoning of Deep Neural Networks

    Authors: Jona te Lintelo, Stefanos Koffas, Stjepan Picek

    Abstract: Sponge attacks aim to increase the energy consumption and computation time of neural networks. In this work, we present a novel sponge attack called SkipSponge. SkipSponge is the first sponge attack that is performed directly on the parameters of a pre-trained model using only a few data samples. Our experiments show that SkipSponge can successfully increase the energy consumption of image classif… ▽ More

    Submitted 7 October, 2024; v1 submitted 9 February, 2024; originally announced February 2024.

  7. arXiv:2312.03853  [pdf, other

    cs.CR cs.LG

    Dr. Jekyll and Mr. Hyde: Two Faces of LLMs

    Authors: Matteo Gioele Collu, Tom Janssen-Groesbeek, Stefanos Koffas, Mauro Conti, Stjepan Picek

    Abstract: Recently, we have witnessed a rise in the use of Large Language Models (LLMs), especially in applications like chatbots. Safety mechanisms are implemented to prevent improper responses from these chatbots. In this work, we bypass these measures for ChatGPT and Gemini by making them impersonate complex personas with personality characteristics that are not aligned with a truthful assistant. First,… ▽ More

    Submitted 7 October, 2024; v1 submitted 6 December, 2023; originally announced December 2023.

  8. arXiv:2311.07550  [pdf, other

    cs.CR cs.LG

    Tabdoor: Backdoor Vulnerabilities in Transformer-based Neural Networks for Tabular Data

    Authors: Bart Pleiter, Behrad Tajalli, Stefanos Koffas, Gorka Abad, Jing Xu, Martha Larson, Stjepan Picek

    Abstract: Deep Neural Networks (DNNs) have shown great promise in various domains. Alongside these developments, vulnerabilities associated with DNN training, such as backdoor attacks, are a significant concern. These attacks involve the subtle insertion of triggers during model training, allowing for manipulated predictions. More recently, DNNs for tabular data have gained increasing attention due to the r… ▽ More

    Submitted 25 April, 2024; v1 submitted 13 November, 2023; originally announced November 2023.

  9. On the Effect of Clock Frequency on Voltage and Electromagnetic Fault Injection

    Authors: Stefanos Koffas, Praveen Kumar Vadnala

    Abstract: We investigate the influence of clock frequency on the success rate of a fault injection attack. In particular, we examine the success rate of voltage and electromagnetic fault attacks for varying clock frequencies. Using three different tests that cover different components of a System-on-Chip, we perform fault injection while its CPU operates at different clock frequencies. Our results show that… ▽ More

    Submitted 20 October, 2023; originally announced October 2023.

    Comments: Published in AIHWS workshop held for Applied Cryptography and Network Security Conference (ACNS 2022)

  10. arXiv:2310.08259  [pdf, other

    cs.CR cs.CV cs.LG

    Invisible Threats: Backdoor Attack in OCR Systems

    Authors: Mauro Conti, Nicola Farronato, Stefanos Koffas, Luca Pajola, Stjepan Picek

    Abstract: Optical Character Recognition (OCR) is a widely used tool to extract text from scanned documents. Today, the state-of-the-art is achieved by exploiting deep neural networks. However, the cost of this performance is paid at the price of system vulnerability. For instance, in backdoor attacks, attackers compromise the training phase by inserting a backdoor in the victim's model that will be activate… ▽ More

    Submitted 12 October, 2023; originally announced October 2023.

  11. arXiv:2308.02465  [pdf, other

    cs.LG cs.CR

    Label Inference Attacks against Node-level Vertical Federated GNNs

    Authors: Marco Arazzi, Mauro Conti, Stefanos Koffas, Marina Krcek, Antonino Nocera, Stjepan Picek, Jing Xu

    Abstract: Federated learning enables collaborative training of machine learning models by keeping the raw data of the involved workers private. Three of its main objectives are to improve the models' privacy, security, and scalability. Vertical Federated Learning (VFL) offers an efficient cross-silo setting where a few parties collaboratively train a model without sharing the same features. In such a scenar… ▽ More

    Submitted 18 April, 2024; v1 submitted 4 August, 2023; originally announced August 2023.

  12. arXiv:2307.08208  [pdf, other

    cs.SD cs.CR cs.LG eess.AS

    Towards Stealthy Backdoor Attacks against Speech Recognition via Elements of Sound

    Authors: Hanbo Cai, Pengcheng Zhang, Hai Dong, Yan Xiao, Stefanos Koffas, Yiming Li

    Abstract: Deep neural networks (DNNs) have been widely and successfully adopted and deployed in various applications of speech recognition. Recently, a few works revealed that these models are vulnerable to backdoor attacks, where the adversaries can implant malicious prediction behaviors into victim models by poisoning their training process. In this paper, we revisit poison-only backdoor attacks against s… ▽ More

    Submitted 16 July, 2023; originally announced July 2023.

    Comments: 13 pages

  13. arXiv:2302.01740  [pdf, other

    cs.CV cs.CR cs.LG

    SoK: A Systematic Evaluation of Backdoor Trigger Characteristics in Image Classification

    Authors: Gorka Abad, Jing Xu, Stefanos Koffas, Behrad Tajalli, Stjepan Picek, Mauro Conti

    Abstract: Deep learning achieves outstanding results in many machine learning tasks. Nevertheless, it is vulnerable to backdoor attacks that modify the training set to embed a secret functionality in the trained model. The modified training samples have a secret property, i. e., a trigger. At inference time, the secret functionality is activated when the input contains the trigger, while the model functions… ▽ More

    Submitted 21 April, 2023; v1 submitted 3 February, 2023; originally announced February 2023.

  14. arXiv:2211.03117  [pdf, other

    cs.CR cs.LG cs.SD eess.AS

    Going In Style: Audio Backdoors Through Stylistic Transformations

    Authors: Stefanos Koffas, Luca Pajola, Stjepan Picek, Mauro Conti

    Abstract: This work explores stylistic triggers for backdoor attacks in the audio domain: dynamic transformations of malicious samples through guitar effects. We first formalize stylistic triggers - currently missing in the literature. Second, we explore how to develop stylistic triggers in the audio domain by proposing JingleBack. Our experiments confirm the effectiveness of the attack, achieving a 96% att… ▽ More

    Submitted 2 May, 2023; v1 submitted 6 November, 2022; originally announced November 2022.

    Comments: Accepted to ICASSP '23 and the first two authors contributed equally

  15. Dynamic Backdoors with Global Average Pooling

    Authors: Stefanos Koffas, Stjepan Picek, Mauro Conti

    Abstract: Outsourced training and machine learning as a service have resulted in novel attack vectors like backdoor attacks. Such attacks embed a secret functionality in a neural network activated when the trigger is added to its input. In most works in the literature, the trigger is static, both in terms of location and pattern. The effectiveness of various detection mechanisms depends on this property. It… ▽ More

    Submitted 3 March, 2022; originally announced March 2022.

  16. arXiv:2202.03195  [pdf, other

    cs.CR cs.LG

    More is Better (Mostly): On the Backdoor Attacks in Federated Graph Neural Networks

    Authors: Jing Xu, Rui Wang, Stefanos Koffas, Kaitai Liang, Stjepan Picek

    Abstract: Graph Neural Networks (GNNs) are a class of deep learning-based methods for processing graph domain information. GNNs have recently become a widely used graph analysis method due to their superior ability to learn representations for complex graph data. However, due to privacy concerns and regulation restrictions, centralized GNNs can be difficult to apply to data-sensitive scenarios. Federated le… ▽ More

    Submitted 9 December, 2024; v1 submitted 7 February, 2022; originally announced February 2022.

    Comments: 15 pages, 13 figures

    MSC Class: 68T07

  17. arXiv:2110.11024  [pdf, other

    cs.LG cs.CR

    Watermarking Graph Neural Networks based on Backdoor Attacks

    Authors: Jing Xu, Stefanos Koffas, Oguzhan Ersoy, Stjepan Picek

    Abstract: Graph Neural Networks (GNNs) have achieved promising performance in various real-world applications. Building a powerful GNN model is not a trivial task, as it requires a large amount of training data, powerful computing resources, and human expertise in fine-tuning the model. Moreover, with the development of adversarial attacks, e.g., model stealing attacks, GNNs raise challenges to model authen… ▽ More

    Submitted 13 November, 2022; v1 submitted 21 October, 2021; originally announced October 2021.

    Comments: 18 pages, 9 figures

    MSC Class: 68T07

  18. Can You Hear It? Backdoor Attacks via Ultrasonic Triggers

    Authors: Stefanos Koffas, Jing Xu, Mauro Conti, Stjepan Picek

    Abstract: This work explores backdoor attacks for automatic speech recognition systems where we inject inaudible triggers. By doing so, we make the backdoor attack challenging to detect for legitimate users, and thus, potentially more dangerous. We conduct experiments on two versions of a speech dataset and three neural networks and explore the performance of our attack concerning the duration, position, an… ▽ More

    Submitted 6 March, 2022; v1 submitted 30 July, 2021; originally announced July 2021.