Yet another adversarial ML attack:
Most deep neural networks are trained by stochastic gradient descent. Now “stochastic” is a fancy Greek word for “random”; it means that the training data are fed into the model in random order.
So what happens if the bad guys can cause the order to be not random? You guessed it—all bets are off. Suppose for example a company or a country wanted to have a credit-scoring system that’s secretly sexist, but still be able to pretend that its training was actually fair. Well, they could assemble a set of financial data that was representative of the whole population, but start the model’s training on ten rich men and ten poor women drawn from that set then let initialisation bias do the rest of the work.
Does this generalise? Indeed it does. Previously, people had assumed that in order to poison a model or introduce backdoors, you needed to add adversarial samples to the training data. Our latest paper shows that’s not necessary at all. If an adversary can manipulate the order in which batches of training data are presented to the model, they can undermine both its integrity (by poisoning it) and its availability (by causing training to be less effective, or take longer). This is quite general across models that use stochastic gradient descent.
Research paper.
More Stories
Compliance Now Biggest Cyber Challenge for UK Financial Services
Regulatory compliance and data protection were the biggest cybersecurity challenges cited by UK financial organizations, according to a Bridewell survey...
Bot Traffic Overtakes Human Activity as Threat Actors Turn to AI
Thales report reveals bots now account for 51% of all web traffic, surpassing human activity Read More
Organizations Found to Address Only 21% of GenAI-Related Vulnerabilities
Pentesting firm Cobalt has found that organizations fix less than half of exploited vulnerabilities, with just 21% of generative AI...
LabHost Phishing Mastermind Sentenced to 8.5 Years
A UK man has been sentenced to over eight years for masterminding £100m phishing platform LabHost Read More
Closing the Gap: How to Build a Consistent Exposure and Vulnerability Management Workflow
Security teams are faced with an ongoing challenge when it comes to exposure and vulnerability management. It’s not the actual...
Trump Revenge Tour Targets Cyber Leaders, Elections
President Trump last week revoked security clearances for Chris Krebs, the former director of the Cybersecurity and Infrastructure Security Agency...