A Practical Black-Box Attack on Source Code Authorship Identification Classifiers

被引:7
|
作者
Liu, Qianjun [1 ]
Ji, Shouling [1 ]
Liu, Changchang [2 ]
Wu, Chunming [1 ]
机构
[1] Zhejiang Univ, Coll Comp Sci & Technol, Hangzhou 310027, Peoples R China
[2] IBM Thomas J Watson Res Ctr, Dept Distributed AI, Yorktown Hts, NY 10598 USA
基金
中国国家自然科学基金;
关键词
Feature extraction; Tools; Training; Syntactics; Predictive models; Perturbation methods; Transforms; Source code; authorship identification; adversarial stylometry; ROBUSTNESS;
D O I
10.1109/TIFS.2021.3080507
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Existing researches have recently shown that adversarial stylometry of source code can confuse source code authorship identification (SCAI) models, which may threaten the security of related applications such as programmer attribution, software forensics, etc. In this work, we propose source code authorship disguise (SCAD) to automatically hide programmers' identities from authorship identification, which is more practical than the previous work that requires to known the output probabilities or internal details of the target SCAI model. Specifically, SCAD trains a substitute model and develops a set of semantically equivalent transformations, based on which the original code is modified towards a disguised style with small manipulations in lexical features and syntactic features. When evaluated under totally black-box settings, on a real-world dataset consisting of 1,600 programmers, SCAD induces state-of-the-art SCAI models to cause above 30% misclassification rates. The efficiency and utility-preserving properties of SCAD are also demonstrated with multiple metrics. Furthermore, our work can serve as a guideline for developing more robust identification methods in the future.
引用
下载
收藏
页码:3620 / 3633
页数:14
相关论文
共 50 条
  • [41] Black-box Bayesian adversarial attack with transferable priors
    Shudong Zhang
    Haichang Gao
    Chao Shu
    Xiwen Cao
    Yunyi Zhou
    Jianping He
    Machine Learning, 2024, 113 : 1511 - 1528
  • [42] Accelerate Black-Box Attack with White-Box Prior Knowledge
    Cai, Jinghui
    Wang, Boyang
    Wang, Xiangfeng
    Jin, Bo
    INTELLIGENCE SCIENCE AND BIG DATA ENGINEERING: BIG DATA AND MACHINE LEARNING, PT II, 2019, 11936 : 394 - 405
  • [43] Adaptive hyperparameter optimization for black-box adversarial attack
    Guan, Zhenyu
    Zhang, Lixin
    Huang, Bohan
    Zhao, Bihe
    Bian, Song
    INTERNATIONAL JOURNAL OF INFORMATION SECURITY, 2023, 22 (06) : 1765 - 1779
  • [44] BASAR:Black-box Attack on Skeletal Action Recognition
    Diao, Yunfeng
    Shao, Tianjia
    Yang, Yong-Liang
    Zhou, Kun
    Wang, He
    2021 IEEE/CVF CONFERENCE ON COMPUTER VISION AND PATTERN RECOGNITION, CVPR 2021, 2021, : 7593 - 7603
  • [45] Uncertainty-Based Rejection Wrappers for Black-Box Classifiers
    Mena, Jose
    Pujol, Oriol
    Vitria, Jordi
    IEEE ACCESS, 2020, 8 : 101721 - 101746
  • [46] Black-Box Adversarial Attack on Time Series Classification
    Ding, Daizong
    Zhang, Mi
    Feng, Fuli
    Huang, Yuanmin
    Jiang, Erling
    Yang, Min
    THIRTY-SEVENTH AAAI CONFERENCE ON ARTIFICIAL INTELLIGENCE, VOL 37 NO 6, 2023, : 7358 - 7368
  • [47] Practical Black-Box Attacks against Machine Learning
    Papernot, Nicolas
    McDaniel, Patrick
    Goodfellow, Ian
    Jha, Somesh
    Celik, Z. Berkay
    Swami, Ananthram
    PROCEEDINGS OF THE 2017 ACM ASIA CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY (ASIA CCS'17), 2017, : 506 - 519
  • [48] Practical black-box adversarial attack on open-set recognition: Towards robust autonomous driving
    Yanfei Wang
    Kai Zhang
    Kejie Lu
    Yun Xiong
    Mi Wen
    Peer-to-Peer Networking and Applications, 2023, 16 : 295 - 311
  • [49] ABCA. Android Black-box Coverage Analyzer of Mobile App without Source Code
    Huang, Shang-Yi
    Yeh, Chia-Hao
    Wang, Farn
    Huang, Chung-Hao
    PROCEEDINGS OF 2015 IEEE INTERNATIONAL CONFERENCE ON PROGRESS IN INFORMATCS AND COMPUTING (IEEE PIC), 2015, : 399 - 403
  • [50] Practical black-box adversarial attack on open-set recognition: Towards robust autonomous driving
    Wang, Yanfei
    Zhang, Kai
    Lu, Kejie
    Xiong, Yun
    Wen, Mi
    PEER-TO-PEER NETWORKING AND APPLICATIONS, 2023, 16 (01) : 295 - 311