Adversarial Examples for Models of Code

被引:66
|
作者
Yefet, Noam [1 ]
Alon, Uri [1 ]
Yahav, Eran [1 ]
机构
[1] Technion, Haifa, Israel
关键词
Adversarial Attacks; Targeted Attacks; Neural Models of Code;
D O I
10.1145/3428230
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
Neural models of code have shown impressive results when performing tasks such as predicting method names and identifying certain kinds of bugs. We show that these models are vulnerable to adversarial examples, and introduce a novel approach for attacking trained models of code using adversarial examples. The main idea of our approach is to force a given trained model to make an incorrect prediction, as specified by the adversary, by introducing small perturbations that do not change the program's semantics, thereby creating an adversarial example. To find such perturbations, we present a new technique for Discrete Adversarial Manipulation of Programs (DAMP). DAMP works by deriving the desired prediction with respect to the model's inputs, while holding the model weights constant, and following the gradients to slightly modify the input code. We show that our DAMP attack is effective across three neural architectures: CODE2VEC, GGNN, and CNN-FILM, in both Java and C#. Our evaluations demonstrate that DAMP has up to 89% success rate in changing a prediction to the adversary's choice (a targeted attack) and a success rate of up to 94% in changing a given prediction to any incorrect prediction (a non-targeted attack). To defend a model against such attacks, we empirically examine a variety of possible defenses and discuss their trade-offs. We show that some of these defenses can dramatically drop the success rate of the attacker, with a minor penalty of 2% relative degradation in accuracy when they are not performing under attack.
引用
收藏
页数:30
相关论文
共 50 条
  • [31] Smooth adversarial examples
    Hanwei Zhang
    Yannis Avrithis
    Teddy Furon
    Laurent Amsaleg
    EURASIP Journal on Information Security, 2020
  • [32] Large Language Models for Code: Security Hardening and Adversarial Testing
    He, Jingxuan
    Vechev, Martin
    PROCEEDINGS OF THE 2023 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, CCS 2023, 2023, : 1865 - 1879
  • [33] Natural Adversarial Examples
    Hendrycks, Dan
    Zhao, Kevin
    Basart, Steven
    Steinhardt, Jacob
    Song, Dawn
    2021 IEEE/CVF CONFERENCE ON COMPUTER VISION AND PATTERN RECOGNITION, CVPR 2021, 2021, : 15257 - 15266
  • [34] On the Salience of Adversarial Examples
    Fernandez, Amanda
    ADVANCES IN VISUAL COMPUTING, ISVC 2019, PT II, 2019, 11845 : 221 - 232
  • [35] Efficient Adversarial Training with Transferable Adversarial Examples
    Zheng, Haizhong
    Zhang, Ziqi
    Gu, Juncheng
    Lee, Honglak
    Prakash, Atul
    2020 IEEE/CVF CONFERENCE ON COMPUTER VISION AND PATTERN RECOGNITION (CVPR), 2020, : 1178 - 1187
  • [36] Adversarial Examples Are Closely Relevant to Neural Network Models - A Preliminary Experiment Explore
    Zhou, Zheng
    Liu, Ju
    Han, Yanyang
    ADVANCES IN SWARM INTELLIGENCE, ICSI 2022, PT II, 2022, : 155 - 166
  • [37] Evaluating Effectiveness of Adversarial Examples on State of Art License Plate Recognition Models
    Rana, Kanishk
    Madaan, Rahul
    2020 IEEE INTERNATIONAL CONFERENCE ON INTELLIGENCE AND SECURITY INFORMATICS (ISI), 2020, : 10 - 12
  • [38] TransMix: Crafting highly transferable adversarial examples to evade face recognition models
    Khedr, Yasmeen M.
    Liu, Xin
    He, Kun
    IMAGE AND VISION COMPUTING, 2024, 146
  • [39] Closer Look at the Transferability of Adversarial Examples: How They Fool Different Models Differently
    Waseda, Futa
    Nishikawa, Sosuke
    Trung-Nghia Le
    Nguyen, Huy H.
    Echizen, Isao
    2023 IEEE/CVF WINTER CONFERENCE ON APPLICATIONS OF COMPUTER VISION (WACV), 2023, : 1360 - 1368
  • [40] Generative Adversarial Examples for Sequential Text Recognition Models with Artistic Text Style
    Liu, Yanhong
    Cao, Fengming
    Zhang, Yuqi
    PROCEEDINGS OF THE 11TH INTERNATIONAL CONFERENCE ON PATTERN RECOGNITION APPLICATIONS AND METHODS (ICPRAM), 2021, : 71 - 79