RF Domain Backdoor Attack on Signal Classification via Stealthy Trigger

被引:1
|
作者
Tang, Zijie [1 ]
Zhao, Tianming [2 ]
Zhang, Tianfang [3 ]
Phan, Huy [3 ]
Wang, Yan [1 ]
Shi, Cong [4 ]
Yuan, Bo [3 ]
Chen, Yingying [3 ]
机构
[1] Temple Univ, Dept Comp & Informat Sci, Philadelphia, PA 19122 USA
[2] Univ Dayton, Dept Comp Sci, Dayton, OH 45469 USA
[3] Rugters Univ, Dept Elect & Comp Engn, Piscataway, NJ 08854 USA
[4] New Jersey Inst Technol, Dept Comp Sci, Newark, NJ 07102 USA
基金
美国国家科学基金会;
关键词
Deep learning security; mobile security; radio-frequency backdoor attack; wireless communication security;
D O I
10.1109/TMC.2024.3404341
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Deep learning (DL) has recently become a key technology supporting radio frequency (RF) signal classification applications. Given the heavy DL training requirement, adopting outsourced training is a practical option for RF application developers. However, the outsourcing process exposes a security vulnerability that enables a backdoor attack. While backdoor attacks have been explored in the vision domain, it is rarely explored in the RF domain. In this work, we present a stealthy backdoor attack that targets DL-based RF signal classification. To realize such an attack, we extensively explore the characteristics of the RF data in different applications, which include RF modulation classification and RF fingerprint-based device identification. Then, we design a training-based backdoor trigger generation approach with different optimization procedures for two backdoor attack scenarios (i.e., poison-label and clean-label). Extensive experiments on two RF signal classification datasets show that the attack success rate is over 99.2%, while its classification accuracy for the clean data remains high (i.e., less than a 0.6% drop compared to the clean model). The low NMSE (less than 0.091) indicates the stealthiness of the attack. Additionally, we demonstrate that our attack can bypass existing defense strategies, such as Neural Cleanse and STRIP.
引用
收藏
页码:11765 / 11780
页数:16
相关论文
共 50 条
  • [1] A stealthy and robust backdoor attack via frequency domain transform
    Hou, Ruitao
    Huang, Teng
    Yan, Hongyang
    Ke, Lishan
    Tang, Weixuan
    WORLD WIDE WEB-INTERNET AND WEB INFORMATION SYSTEMS, 2023, 26 (05): : 2767 - 2783
  • [2] A stealthy and robust backdoor attack via frequency domain transform
    Ruitao Hou
    Teng Huang
    Hongyang Yan
    Lishan Ke
    Weixuan Tang
    World Wide Web, 2023, 26 : 2767 - 2783
  • [3] Inaudible Backdoor Attack via Stealthy Frequency Trigger Injection in Audio Spectrogram
    Zhang, Tianfang
    Huy Phan
    Tang, Zijie
    Shi, Cong
    Wang, Yan
    Yuan, Bo
    Chen, Yingying
    PROCEEDINGS OF THE THIRTIETH INTERNATIONAL CONFERENCE ON MOBILE COMPUTING AND NETWORKING, ACM MOBICOM 2024, 2024, : 31 - 45
  • [4] SIMTROJAN: STEALTHY BACKDOOR ATTACK
    Ren, Yankun
    Li, Longfei
    Zhou, Jun
    2021 IEEE INTERNATIONAL CONFERENCE ON IMAGE PROCESSING (ICIP), 2021, : 819 - 823
  • [5] Stand-in Backdoor: A Stealthy and Powerful Backdoor Attack
    Li, Shuang
    Li, Hongwei
    Chen, Hanxiao
    2021 IEEE GLOBAL COMMUNICATIONS CONFERENCE (GLOBECOM), 2021,
  • [6] STEALTHY BACKDOOR ATTACK WITH ADVERSARIAL TRAINING
    Feng, Le
    Li, Sheng
    Qian, Zhenxing
    Zhang, Xinpeng
    2022 IEEE INTERNATIONAL CONFERENCE ON ACOUSTICS, SPEECH AND SIGNAL PROCESSING (ICASSP), 2022, : 2969 - 2973
  • [7] Stealthy dynamic backdoor attack against neural networks for image classification
    Dong, Liang
    Qiu, Jiawei
    Fu, Zhongwang
    Chen, Leiyang
    Cui, Xiaohui
    Shen, Zhidong
    APPLIED SOFT COMPUTING, 2023, 149
  • [8] Stealthy Backdoor Attack for Code Models
    Yang, Zhou
    Xu, Bowen
    Zhang, Jie M.
    Kang, Hong Jin
    Shi, Jieke
    He, Junda
    Lo, David
    IEEE TRANSACTIONS ON SOFTWARE ENGINEERING, 2024, 50 (04) : 721 - 741
  • [9] Stealthy Backdoor Attack Against Speaker Recognition Using Phase-Injection Hidden Trigger
    Ye, Zhe
    Yan, Diqun
    Dong, Li
    Deng, Jiacheng
    Yu, Shui
    IEEE SIGNAL PROCESSING LETTERS, 2023, 30 : 1057 - 1061
  • [10] Stealthy Backdoor Attack Against Federated Learning Through Frequency Domain by Backdoor Neuron Constraint and Model Camouflage
    Qiao, Yanqi
    Liu, Dazhuang
    Wang, Rui
    Liang, Kaitai
    IEEE JOURNAL ON EMERGING AND SELECTED TOPICS IN CIRCUITS AND SYSTEMS, 2024, 14 (04) : 661 - 672