Publication Type
Conference Proceeding Article
Version
publishedVersion
Publication Date
7-2021
Abstract
As a new programming paradigm, deep learning has expanded its application to many real-world problems. At the same time, deep learning based software are found to be vulnerable to adversarial attacks. Though various defense mechanisms have been proposed to improve robustness of deep learning software, many of them are ineffective against adaptive attacks. In this work, we propose a novel characterization to distinguish adversarial examples from benign ones based on the observation that adversarial examples are significantly less robust than benign ones. As existing robustness measurement does not scale to large networks, we propose a novel defense framework, named attack as defense (A2D), to detect adversarial examples by effectively evaluating an example’s robustness. A2D uses the cost of attacking an input for robustness evaluation and identifies those less robust examples as adversarial since less robust examples are easier to attack. Extensive experiment results on MNIST, CIFAR10 and ImageNet show that A2D is more effective than recent promising approaches. We also evaluate our defense against potential adaptive attacks and show that A2D is effective in defending carefully designed adaptive attacks, e.g., the attack success rate drops to 0% on CIFAR10.
Keywords
Deep learning, neural networks, defense, adversarial examples
Discipline
Software Engineering
Research Areas
Software and Cyber-Physical Systems
Publication
ISSTA 2021: Proceedings of the 30th ACM SIGSOFT International Symposium on Software Testing and Analysis, Virtual, July 11-17
First Page
42
Last Page
55
ISBN
9781450384599
Identifier
10.1145/3460319.3464822
Publisher
ACM
City or Country
New York
Citation
ZHAO, Zhe; CHEN, Guangke; WANG, Jingyi; YANG, Yiwei; SONG, Fu; and SUN, Jun.
Attack as defense: Characterizing adversarial examples using robustness. (2021). ISSTA 2021: Proceedings of the 30th ACM SIGSOFT International Symposium on Software Testing and Analysis, Virtual, July 11-17. 42-55.
Available at: https://ink.library.smu.edu.sg/sis_research/6213
Copyright Owner and License
Authors
Creative Commons License
This work is licensed under a Creative Commons Attribution-NonCommercial-No Derivative Works 4.0 International License.
Additional URL
https://doi.org/10.1145/3460319.3464822