RF Domain Backdoor Attack on Signal Classification via Stealthy Trigger

被引:1
|
作者
Tang, Zijie [1 ]
Zhao, Tianming [2 ]
Zhang, Tianfang [3 ]
Phan, Huy [3 ]
Wang, Yan [1 ]
Shi, Cong [4 ]
Yuan, Bo [3 ]
Chen, Yingying [3 ]
机构
[1] Temple Univ, Dept Comp & Informat Sci, Philadelphia, PA 19122 USA
[2] Univ Dayton, Dept Comp Sci, Dayton, OH 45469 USA
[3] Rugters Univ, Dept Elect & Comp Engn, Piscataway, NJ 08854 USA
[4] New Jersey Inst Technol, Dept Comp Sci, Newark, NJ 07102 USA
基金
美国国家科学基金会;
关键词
Deep learning security; mobile security; radio-frequency backdoor attack; wireless communication security;
D O I
10.1109/TMC.2024.3404341
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Deep learning (DL) has recently become a key technology supporting radio frequency (RF) signal classification applications. Given the heavy DL training requirement, adopting outsourced training is a practical option for RF application developers. However, the outsourcing process exposes a security vulnerability that enables a backdoor attack. While backdoor attacks have been explored in the vision domain, it is rarely explored in the RF domain. In this work, we present a stealthy backdoor attack that targets DL-based RF signal classification. To realize such an attack, we extensively explore the characteristics of the RF data in different applications, which include RF modulation classification and RF fingerprint-based device identification. Then, we design a training-based backdoor trigger generation approach with different optimization procedures for two backdoor attack scenarios (i.e., poison-label and clean-label). Extensive experiments on two RF signal classification datasets show that the attack success rate is over 99.2%, while its classification accuracy for the clean data remains high (i.e., less than a 0.6% drop compared to the clean model). The low NMSE (less than 0.091) indicates the stealthiness of the attack. Additionally, we demonstrate that our attack can bypass existing defense strategies, such as Neural Cleanse and STRIP.
引用
收藏
页码:11765 / 11780
页数:16
相关论文
共 50 条
  • [21] Invisible Trigger Based Backdoor Attack and Its Evaluation
    Kumagai, Ryo
    Takemoto, Shu
    Nozaki, Yusuke
    Yoshikawa, Masaya
    2022 6TH INTERNATIONAL CONFERENCE ON IMAGING, SIGNAL PROCESSING AND COMMUNICATIONS, ICISPC, 2022, : 1 - 5
  • [22] Fake the Real: Backdoor Attack on Deep Speech Classification via Voice Conversion
    Ye, Zhe
    Mao, Terui
    Dong, Li
    Yan, Diqun
    INTERSPEECH 2023, 2023, : 4923 - 4927
  • [23] Rethinking the Trigger-injecting Position in Graph Backdoor Attack
    Xu, Jing
    Abad, Gorka
    Picek, Stjepan
    2023 INTERNATIONAL JOINT CONFERENCE ON NEURAL NETWORKS, IJCNN, 2023,
  • [24] Textual Backdoor Attack for the Text Classification System
    Kwon, Hyun
    Lee, Sanghyun
    SECURITY AND COMMUNICATION NETWORKS, 2021, 2021
  • [25] WaTrojan: Wavelet domain trigger injection for backdoor attacks
    Zhang, Zhenghao
    Ding, Jianwei
    Zhang, Qi
    Deng, Qiyao
    COMPUTERS & SECURITY, 2024, 140
  • [26] Audio-domain Position-independent Backdoor Attack via Unnoticeable Triggers
    Shi, Cong
    Zhang, Tianfang
    Li, Zhuohang
    Phan, Huy
    Zhao, Tianming
    Wang, Yan
    Liu, Jian
    Yuan, Bo
    Chen, Yingying
    PROCEEDINGS OF THE 2022 THE 28TH ANNUAL INTERNATIONAL CONFERENCE ON MOBILE COMPUTING AND NETWORKING, ACM MOBICOM 2022, 2022, : 583 - 595
  • [27] A trigger-perceivable backdoor attack framework driven by image steganography
    Tang, Weixuan
    Li, Jiahao
    Rao, Yuan
    Zhou, Zhili
    Peng, Fei
    PATTERN RECOGNITION, 2025, 161
  • [28] Backdoor Attack on Deep Neural Networks in Perception Domain
    Mo, Xiaoxing
    Zhang, Leo Yu
    Sun, Nan
    Luo, Wei
    Gao, Shang
    2023 INTERNATIONAL JOINT CONFERENCE ON NEURAL NETWORKS, IJCNN, 2023,
  • [29] Textual Backdoor Attack via Keyword Positioning
    Chen, Depeng
    Mao, Fangfang
    Jin, Hulin
    Cui, Jie
    ADVANCED INTELLIGENT COMPUTING TECHNOLOGY AND APPLICATIONS, PT X, ICIC 2024, 2024, 14871 : 55 - 66
  • [30] Conditional Backdoor Attack via JPEG Compression
    Duan, Qiuyu
    Hua, Zhongyun
    Liao, Qing
    Zhang, Yushu
    Zhang, Leo Yu
    THIRTY-EIGHTH AAAI CONFERENCE ON ARTIFICIAL INTELLIGENCE, VOL 38 NO 18, 2024, : 19823 - 19831