A Comprehensive Survey on Backdoor Attacks and Their Defenses in Face Recognition Systems

被引:0
|
作者
Le Roux, Quentin [1 ,2 ]
Bourbao, Eric [1 ]
Teglia, Yannick [1 ]
Kallas, Kassem [2 ]
机构
[1] Thales DIS, F-13600 La Ciotat, France
[2] INRIA, F-35042 Rennes, France
关键词
Backdoor attacks; backdoor defenses; biometrics; deep neural networks; face recognition; integrity vulnerabilities; security; survey; IMAGE;
D O I
10.1109/ACCESS.2024.3382584
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Deep learning has significantly transformed face recognition, enabling the deployment of large-scale, state-of-the-art solutions worldwide. However, the widespread adoption of deep neural networks (DNNs) and the rise of Machine Learning as a Service emphasize the need for secure DNNs. This paper revisits the face recognition threat model in the context of DNN ubiquity and the common practice of outsourcing their training and hosting to third-parties. Here, we identify backdoor attacks as a significant threat to modern DNN-based face recognition systems (FRS). Backdoor attacks involve an attacker manipulating a DNN's training or deployment, injecting it with a stealthy and malicious behavior. Once the DNN has entered its inference stage, the attacker may activate the backdoor and compromise the DNN's intended functionality. Given the critical nature of this threat to DNN-based FRS, our paper comprehensively surveys the literature of backdoor attacks and defenses previously demonstrated on FRS DNNs. As a last point, we highlight potential vulnerabilities and unexplored areas in FRS security.
引用
收藏
页码:47433 / 47468
页数:36
相关论文
共 50 条
  • [1] Adversarial attacks and defenses in Speaker Recognition Systems: A survey
    Lan, Jiahe
    Zhang, Rui
    Yan, Zheng
    Wang, Jie
    Chen, Yu
    Hou, Ronghui
    [J]. JOURNAL OF SYSTEMS ARCHITECTURE, 2022, 127
  • [2] Face Recognition Systems Under Morphing Attacks: A Survey
    Scherhag, Ulrich
    Rathgeb, Christian
    Merkle, Johannes
    Breithaupt, Ralph
    Busch, Christoph
    [J]. IEEE ACCESS, 2019, 7 : 23012 - 23026
  • [3] Backdoor Pony: Evaluating backdoor attacks and defenses in different domains
    Mercier, Arthur
    Smolin, Nikita
    Sihlovec, Oliver
    Koffas, Stefanos
    Picek, Stjepan
    [J]. SOFTWAREX, 2023, 22
  • [4] Backdoor attacks and defenses in federated learning: Survey, challenges and future research directions
    Nguyen, Thuy Dung
    Nguyen, Tuan
    Nguyen, Phi Le
    Pham, Hieu H.
    Doan, Khoa D.
    Wong, Kok-Seng
    [J]. ENGINEERING APPLICATIONS OF ARTIFICIAL INTELLIGENCE, 2024, 127
  • [5] Attacks and defenses in user authentication systems: A survey
    Wang, Xuerui
    Yan, Zheng
    Zhang, Rui
    Zhang, Peng
    [J]. JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2021, 188
  • [6] An Investigation of Recent Backdoor Attacks and Defenses in Federated Learning
    Chen, Qiuxian
    Tao, Yizheng
    [J]. 2023 EIGHTH INTERNATIONAL CONFERENCE ON FOG AND MOBILE EDGE COMPUTING, FMEC, 2023, : 262 - 269
  • [7] Adversarial attacks and defenses in deep learning for image recognition: A survey
    Wang, Jia
    Wang, Chengyu
    Lin, Qiuzhen
    Luo, Chengwen
    Wu, Chao
    Li, Jianqiang
    [J]. NEUROCOMPUTING, 2022, 514 : 162 - 181
  • [8] A Survey on Ethereum Systems Security: Vulnerabilities, Attacks, and Defenses
    Chen, Huashan
    Pendleton, Marcus
    Njilla, Laurent
    Xu, Shouhuai
    [J]. ACM COMPUTING SURVEYS, 2020, 53 (03)
  • [9] The Devil Is in the GAN: Backdoor Attacks and Defenses in Deep Generative Models
    Rawat, Ambrish
    Levacher, Killian
    Sinn, Mathieu
    [J]. COMPUTER SECURITY - ESORICS 2022, PT III, 2022, 13556 : 776 - 783
  • [10] A survey on cybersecurity attacks and defenses for unmanned aerial systems
    Wang, Zhaoxuan
    Li, Yang
    Wu, Shihao
    Zhou, Yuan
    Yang, Libin
    Xu, Yuan
    Zhang, Tianwei
    Pan, Quan
    [J]. JOURNAL OF SYSTEMS ARCHITECTURE, 2023, 138