skip to main content
10.1145/3548606.3563550acmconferencesArticle/Chapter ViewAbstractPublication PagesccsConference Proceedingsconference-collections
poster

Poster: Adversarial Defense with Deep Learning Coverage on MagNet's Purification

Published:07 November 2022Publication History

ABSTRACT

MagNet is a defense method that adopts autoencoders to detect and purify adversarial examples. Although MagNet is robust against grey-box and black-box attacks, it is vulnerable to white-box attacks. Despite this prior knowledge, the fundamental reason for and mitigation of the vulnerability of MagNet have not been discussed. We suggest that the challenge of MagNet is the generalization of the data manifold. To explain this, in this work, we leverage deep learning coverage for the reformer of MagNet. We mutate training images through image transformation algorithms and then train the reformer using mutants with new coverage information. The selected mutants provide an interesting data manifold, that cannot be handled by the random noise of MagNet, to the reformer. In grey-box settings, our defense method classified adversarial examples for various perturbation sizes much more accurately than MagNet even with the same architecture. Based on the preliminary result of this work, we consider future work to identify whether the generalization power of deep learning coverage is effective for stronger adversaries and different architectures.

Skip Supplemental Material Section

Supplemental Material

CCS22posters-p31.mp4

mp4

8.6 MB

References

  1. Nicholas Carlini and David Wagner. 2017. Magnet and" efficient defenses against adversarial attacks" are not robust to adversarial examples. arXiv preprint arXiv:1711.08478 (2017).Google ScholarGoogle Scholar
  2. Nicholas Carlini and David Wagner. 2017. Towards evaluating the robustness of neural networks. In Proc. the IEEE SP. 39--57.Google ScholarGoogle ScholarCross RefCross Ref
  3. Zhong Li et al. 2021. Testing DNN-based Autonomous Driving Systems under Critical Environmental Conditions. In Proc. the ICML. 6471--6482.Google ScholarGoogle Scholar
  4. Lei Ma et al. 2018. Deepgauge: Multi-granularity testing criteria for deep learning systems. In Proc. the ACM/IEEE ASE. 120--131.Google ScholarGoogle Scholar
  5. Dongyu Meng et al. 2017. Magnet: a Two-Pronged Defense against Adversarial Examples. In Proc. the ACM CCS. 135--147.Google ScholarGoogle Scholar
  6. Weili Nie et al. 2022. Diffusion Models for Adversarial Purification. In Proc. the ICML.Google ScholarGoogle Scholar
  7. Kexin Pei et al. 2017. Deepxplore: Automated whitebox testing of deep learning systems. In Proc. the SOSP. 1--18.Google ScholarGoogle Scholar
  8. Xiaofei Xie et al. 2019. Deephunter: a coverage-guided fuzz testing framework for deep neural networks. In Proc. the ACM ISSTA. 146--157.Google ScholarGoogle Scholar
  9. Shenao Yan et al. 2020. Correlations between deep neural network model coverage criteria and model quality. In Proc. the ACM FSE. 775--787.Google ScholarGoogle Scholar

Index Terms

  1. Poster: Adversarial Defense with Deep Learning Coverage on MagNet's Purification

    Recommendations

    Comments

    Login options

    Check if you have access through your login credentials or your institution to get full access on this article.

    Sign in
    • Published in

      cover image ACM Conferences
      CCS '22: Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security
      November 2022
      3598 pages
      ISBN:9781450394505
      DOI:10.1145/3548606

      Copyright © 2022 Owner/Author

      Permission to make digital or hard copies of part or all of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for third-party components of this work must be honored. For all other uses, contact the Owner/Author.

      Publisher

      Association for Computing Machinery

      New York, NY, United States

      Publication History

      • Published: 7 November 2022

      Check for updates

      Qualifiers

      • poster

      Acceptance Rates

      Overall Acceptance Rate1,261of6,999submissions,18%

      Upcoming Conference

      CCS '24
      ACM SIGSAC Conference on Computer and Communications Security
      October 14 - 18, 2024
      Salt Lake City , UT , USA
    • Article Metrics

      • Downloads (Last 12 months)87
      • Downloads (Last 6 weeks)9

      Other Metrics

    PDF Format

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader