Javascript must be enabled to continue!
A Stealthy Backdoor Attack for Code Models
View through CrossRef
Abstract
Recent studies have shown that code models are susceptible to backdoor attacks. When injected with a backdoor, the victim code model can function normally on benign samples but may produce predetermined malicious outputs when triggers are activated. However, previous backdoor attacks on code models have used explicit triggers, and we aim to investigate the vulnerability of code models to stealthy backdoor attacks in this study. To this end, we propose a backdoor attack approach using Abstract Syntax Tree-based Triggers (ASTT) to obtain stealthiness. We evaluate ASTT on deep learning-based code models and three downstream tasks (i.e., code translation, code repair, and defect detection). With the clustering algorithm, we generated triggers based on abstract syntax trees. We find that the average attack success rate of our ASTT can reach 92.71%. Moreover, our ASTT is stealthy and can effectively bypass state-of-the-art defense approaches. Finally, we verify that the time overhead of our proposed ASTT is small and can meet the needs in real scenarios. Our finding demonstrates security weaknesses in code models under stealthy backdoor attacks.
Springer Science and Business Media LLC
Title: A Stealthy Backdoor Attack for Code Models
Description:
Abstract
Recent studies have shown that code models are susceptible to backdoor attacks.
When injected with a backdoor, the victim code model can function normally on benign samples but may produce predetermined malicious outputs when triggers are activated.
However, previous backdoor attacks on code models have used explicit triggers, and we aim to investigate the vulnerability of code models to stealthy backdoor attacks in this study.
To this end, we propose a backdoor attack approach using Abstract Syntax Tree-based Triggers (ASTT) to obtain stealthiness.
We evaluate ASTT on deep learning-based code models and three downstream tasks (i.
e.
, code translation, code repair, and defect detection).
With the clustering algorithm, we generated triggers based on abstract syntax trees.
We find that the average attack success rate of our ASTT can reach 92.
71%.
Moreover, our ASTT is stealthy and can effectively bypass state-of-the-art defense approaches.
Finally, we verify that the time overhead of our proposed ASTT is small and can meet the needs in real scenarios.
Our finding demonstrates security weaknesses in code models under stealthy backdoor attacks.
Related Results
Sub-Band Backdoor Attack in Remote Sensing Imagery
Sub-Band Backdoor Attack in Remote Sensing Imagery
Remote sensing datasets usually have a wide range of spatial and spectral resolutions. They provide unique advantages in surveillance systems, and many government organizations use...
IBD: An Interpretable Backdoor-Detection Method via Multivariate Interactions
IBD: An Interpretable Backdoor-Detection Method via Multivariate Interactions
Recent work has shown that deep neural networks are vulnerable to backdoor attacks. In comparison with the success of backdoor-attack methods, existing backdoor-defense methods fac...
Deteksi dan Mitigasi Serangan Backdoor Menggunakan Python Watchdog
Deteksi dan Mitigasi Serangan Backdoor Menggunakan Python Watchdog
The number of cyber attacks is increasing. This happens thoroughly, both at the international and national levels. Technology, techniques, and methods of carrying out cyber attacks...
Joint Beamforming and Aerial IRS Positioning Design for IRS-assisted MISO System with Multiple Access Points
Joint Beamforming and Aerial IRS Positioning Design for IRS-assisted MISO System with Multiple Access Points
<p><code>Intelligent reflecting surface (IRS) is a promising concept for </code><code><u>6G</u></code><code> wireless communications...
Joint Beamforming and Aerial IRS Positioning Design for IRS-assisted MISO System with Multiple Access Points
Joint Beamforming and Aerial IRS Positioning Design for IRS-assisted MISO System with Multiple Access Points
<p><code>Intelligent reflecting surface (IRS) is a promising concept for </code><code><u>6G</u></code><code> wireless communications...
Financial Performance Analysis of Backdoor Listed Companies
Financial Performance Analysis of Backdoor Listed Companies
IPO listing threshold requirements are high, many enterprises have chosen to backdoor listing due to the restrictions of objective factors. In order to study the impact of backdoor...
Frequency Domain Backdoor Attacks for Visual Object Tracking
Frequency Domain Backdoor Attacks for Visual Object Tracking
Visual object tracking(VOT)is a key topic in computer vision tasks. It serves as an essential component of various advanced problems in the field, such as motion analysis, event de...
Design of Malicious Code Detection System Based on Binary Code Slicing
Design of Malicious Code Detection System Based on Binary Code Slicing
<p>Malicious code threatens the safety of computer systems. Researching malicious code design techniques and mastering code behavior patterns are the basic work of network se...


