RF Domain Backdoor Attack on Signal Classification via Stealthy Trigger

被引:1
|
作者
Tang, Zijie [1 ]
Zhao, Tianming [2 ]
Zhang, Tianfang [3 ]
Phan, Huy [3 ]
Wang, Yan [1 ]
Shi, Cong [4 ]
Yuan, Bo [3 ]
Chen, Yingying [3 ]
机构
[1] Temple Univ, Dept Comp & Informat Sci, Philadelphia, PA 19122 USA
[2] Univ Dayton, Dept Comp Sci, Dayton, OH 45469 USA
[3] Rugters Univ, Dept Elect & Comp Engn, Piscataway, NJ 08854 USA
[4] New Jersey Inst Technol, Dept Comp Sci, Newark, NJ 07102 USA
基金
美国国家科学基金会;
关键词
Deep learning security; mobile security; radio-frequency backdoor attack; wireless communication security;
D O I
10.1109/TMC.2024.3404341
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Deep learning (DL) has recently become a key technology supporting radio frequency (RF) signal classification applications. Given the heavy DL training requirement, adopting outsourced training is a practical option for RF application developers. However, the outsourcing process exposes a security vulnerability that enables a backdoor attack. While backdoor attacks have been explored in the vision domain, it is rarely explored in the RF domain. In this work, we present a stealthy backdoor attack that targets DL-based RF signal classification. To realize such an attack, we extensively explore the characteristics of the RF data in different applications, which include RF modulation classification and RF fingerprint-based device identification. Then, we design a training-based backdoor trigger generation approach with different optimization procedures for two backdoor attack scenarios (i.e., poison-label and clean-label). Extensive experiments on two RF signal classification datasets show that the attack success rate is over 99.2%, while its classification accuracy for the clean data remains high (i.e., less than a 0.6% drop compared to the clean model). The low NMSE (less than 0.091) indicates the stealthiness of the attack. Additionally, we demonstrate that our attack can bypass existing defense strategies, such as Neural Cleanse and STRIP.
引用
收藏
页码:11765 / 11780
页数:16
相关论文
共 50 条
  • [41] Motif-Backdoor: Rethinking the Backdoor Attack on Graph Neural Networks via Motifs
    Zheng, Haibin
    Xiong, Haiyang
    Chen, Jinyin
    Ma, Haonan
    Huang, Guohan
    IEEE TRANSACTIONS ON COMPUTATIONAL SOCIAL SYSTEMS, 2024, 11 (02): : 2479 - 2493
  • [42] Efficient and persistent backdoor attack by boundary trigger set constructing against federated learning
    Yang, Deshan
    Luo, Senlin
    Zhou, Jinjie
    Pan, Limin
    Yang, Xiaonan
    Xing, Jiyuan
    INFORMATION SCIENCES, 2023, 651
  • [43] AT-GAN: A Backdoor Attack Against Radio Signals Modulation Based on Adaptive Trigger
    Xu, Dongwei
    Fang, Ruochen
    Xuan, Qi
    Shen, Weiguo
    Zheng, Shilian
    Yang, Xiaoniu
    IEEE TRANSACTIONS ON CIRCUITS AND SYSTEMS II-EXPRESS BRIEFS, 2024, 71 (06) : 3251 - 3255
  • [44] Privacy Inference-Empowered Stealthy Backdoor Attack on Federated Learning under Non-IID Scenarios
    Mei, Haochen
    Li, Gaolei
    Wu, Jun
    Zheng, Longfei
    2023 INTERNATIONAL JOINT CONFERENCE ON NEURAL NETWORKS, IJCNN, 2023,
  • [45] Fooling Edge Computation Offloading via Stealthy Interference Attack
    Zhang, Letian
    Xu, Jie
    2020 IEEE/ACM SYMPOSIUM ON EDGE COMPUTING (SEC 2020), 2020, : 415 - 419
  • [46] Dual-domain based backdoor attack against federated learning
    Li, Guorui
    Chang, Runxing
    Wang, Ying
    Wang, Cong
    NEUROCOMPUTING, 2025, 623
  • [47] An Invisible Black-Box Backdoor Attack Through Frequency Domain
    Wang, Tong
    Yao, Yuan
    Xu, Feng
    An, Shengwei
    Tong, Hanghang
    Wang, Ting
    COMPUTER VISION, ECCV 2022, PT XIII, 2022, 13673 : 396 - 413
  • [48] A Backdoor Attack Against LSTM-Based Text Classification Systems
    Dai, Jiazhu
    Chen, Chuanshuai
    Li, Yufeng
    IEEE ACCESS, 2019, 7 : 138872 - 138878
  • [49] Towards Backdoor Attack on Deep Learning based Time Series Classification
    Ding, Daizong
    Zhang, Mi
    Huang, Yuanmin
    Pan, Xudong
    Feng, Fuli
    Jiang, Erling
    Yang, Min
    2022 IEEE 38TH INTERNATIONAL CONFERENCE ON DATA ENGINEERING (ICDE 2022), 2022, : 1274 - 1287
  • [50] Feature-Based Graph Backdoor Attack in the Node Classification Task
    Chen, Yang
    Ye, Zhonglin
    Zhao, Haixing
    Wang, Ying
    INTERNATIONAL JOURNAL OF INTELLIGENT SYSTEMS, 2023, 2023