Backdoor Pony

Evaluating backdoor attacks and defenses in different domains

Journal Article (2023)
Author(s)

Arthur Mercier (Student TU Delft)

Nikita Smolin (Student TU Delft)

Oliver Sihlovec (Student TU Delft)

Stefanos Koffas (TU Delft - Cyber Security)

Stjepan Picek (TU Delft - Cyber Security, Radboud Universiteit Nijmegen)

Research Group
Cyber Security
DOI related publication
https://doi.org/10.1016/j.softx.2023.101387
More Info
expand_more
Publication Year
2023
Language
English
Research Group
Cyber Security
Volume number
22
Reuse Rights

Other than for strictly personal use, it is not permitted to download, forward or distribute the text or part of it, without the consent of the author(s) and/or copyright holder(s), unless the work is under an open content license such as Creative Commons.

Abstract

Outsourced training and crowdsourced datasets lead to a new threat for deep learning models: the backdoor attack. In this attack, the adversary inserts a secret functionality in a model, activated through malicious inputs. Backdoor attacks represent an active research area due to diverse settings where they represent a real threat. Still, there is no framework to evaluate existing attacks and defenses in different domains. Only a few toolboxes have been implemented, but most of them focus on computer vision and are difficult to use. To bridge this gap, we implement Backdoor Pony, a framework for evaluating attacks and defenses in different domains through a user-friendly GUI.