RF Domain Backdoor Attack on Signal Classification via Stealthy Trigger

被引:1
|
作者
Tang, Zijie [1 ]
Zhao, Tianming [2 ]
Zhang, Tianfang [3 ]
Phan, Huy [3 ]
Wang, Yan [1 ]
Shi, Cong [4 ]
Yuan, Bo [3 ]
Chen, Yingying [3 ]
机构
[1] Temple Univ, Dept Comp & Informat Sci, Philadelphia, PA 19122 USA
[2] Univ Dayton, Dept Comp Sci, Dayton, OH 45469 USA
[3] Rugters Univ, Dept Elect & Comp Engn, Piscataway, NJ 08854 USA
[4] New Jersey Inst Technol, Dept Comp Sci, Newark, NJ 07102 USA
基金
美国国家科学基金会;
关键词
Deep learning security; mobile security; radio-frequency backdoor attack; wireless communication security;
D O I
10.1109/TMC.2024.3404341
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Deep learning (DL) has recently become a key technology supporting radio frequency (RF) signal classification applications. Given the heavy DL training requirement, adopting outsourced training is a practical option for RF application developers. However, the outsourcing process exposes a security vulnerability that enables a backdoor attack. While backdoor attacks have been explored in the vision domain, it is rarely explored in the RF domain. In this work, we present a stealthy backdoor attack that targets DL-based RF signal classification. To realize such an attack, we extensively explore the characteristics of the RF data in different applications, which include RF modulation classification and RF fingerprint-based device identification. Then, we design a training-based backdoor trigger generation approach with different optimization procedures for two backdoor attack scenarios (i.e., poison-label and clean-label). Extensive experiments on two RF signal classification datasets show that the attack success rate is over 99.2%, while its classification accuracy for the clean data remains high (i.e., less than a 0.6% drop compared to the clean model). The low NMSE (less than 0.091) indicates the stealthiness of the attack. Additionally, we demonstrate that our attack can bypass existing defense strategies, such as Neural Cleanse and STRIP.
引用
收藏
页码:11765 / 11780
页数:16
相关论文
共 50 条
  • [31] Untargeted Backdoor Attack Against Deep Neural Networks With Imperceptible Trigger
    Xue, Mingfu
    Wu, Yinghao
    Ni, Shifeng
    Zhang, Leo Yu
    Zhang, Yushu
    Liu, Weiqiang
    IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS, 2024, 20 (03) : 5004 - 5013
  • [32] Multi-Model Selective Backdoor Attack with Different Trigger Positions
    Kwon, Hyun
    IEICE TRANSACTIONS ON INFORMATION AND SYSTEMS, 2022, E105D (01) : 170 - 174
  • [33] Perceptual Similarity-Based Multi-Objective Optimization for Stealthy Image Backdoor Attack
    Zhu S.
    Wang J.
    Sun G.
    Jisuanji Yanjiu yu Fazhan/Computer Research and Development, 2024, 61 (05): : 1182 - 1192
  • [34] Link-Backdoor: Backdoor Attack on Link Prediction via Node Injection
    Zheng, Haibin
    Xiong, Haiyang
    Ma, Haonan
    Huang, Guohan
    Chen, Jinyin
    IEEE TRANSACTIONS ON COMPUTATIONAL SOCIAL SYSTEMS, 2024, 11 (02) : 1816 - 1831
  • [35] Toward Stealthy Backdoor Attacks Against Speech Recognition via Elements of Sound
    Cai, Hanbo
    Zhang, Pengcheng
    Dong, Hai
    Xiao, Yan
    Koffas, Stefanos
    Li, Yiming
    IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2024, 19 : 5852 - 5866
  • [36] Stealthy Frequency-Domain Backdoor Attacks: Fourier Decomposition and Fundamental Frequency Injection
    Ma, Qianli
    Qin, Junping
    Yan, Kai
    Wang, Lei
    Sun, Hao
    IEEE SIGNAL PROCESSING LETTERS, 2023, 30 : 1677 - 1681
  • [37] Effective Backdoor Attack on Graph Neural Networks in Spectral Domain
    Zhao, Xiangyu
    Wu, Hanzhou
    Zhang, Xinpeng
    IEEE INTERNET OF THINGS JOURNAL, 2024, 11 (07) : 12102 - 12114
  • [38] Moire Backdoor Attack (MBA): A Novel Trigger for Pedestrian Detectors in the Physical World
    Wei, Hui
    Yu, Hanxun
    Zhang, Kewei
    Wang, Zhixiang
    Zhu, Jianke
    Wang, Zheng
    PROCEEDINGS OF THE 31ST ACM INTERNATIONAL CONFERENCE ON MULTIMEDIA, MM 2023, 2023, : 8828 - 8838
  • [39] Backdoor attack detection via prediction trustworthiness assessment
    Zhong, Nan
    Qian, Zhenxing
    Zhang, Xinpeng
    INFORMATION SCIENCES, 2024, 662
  • [40] Federated Learning Backdoor Attack Based on Frequency Domain Injection
    Liu, Jiawang
    Peng, Changgen
    Tan, Weijie
    Shi, Chenghui
    ENTROPY, 2024, 26 (02)