Tuesday, January 21, 2025
Homecyber securityNoiseAttack is a Novel Backdoor That Uses Power Spectral Density For Evasion

NoiseAttack is a Novel Backdoor That Uses Power Spectral Density For Evasion

Published on

SIEM as a Service

Follow Us on Google News

NoiseAttack is a new method of secretly attacking deep learning models. It uses triggers made from White Gaussian Noise to create several targeted classes in the model, rather than just one, like most current methods. 

This approach also helps avoid being easily detected, which makes it more effective than traditional single-target attacks.

The following cybersecurity researchers of the Department of Electrical, Computer and Biomedical Engineering from the University of Rhode Island discovered that “NoiseAttack,” uses power spectral density for evasion:-

  • Abdullah Arafat Miah
  • Kaan Icer
  • Resit Sendag
  • Yu Bi 

Technical analysis

Recent advancements in AI have led to its widespread use in various applications, from image recognition to language processing.

While the rapid adoption of AI is exciting, it has also introduced new security risks. One major vulnerability is backdoor attacks.

In these attacks, malicious individuals insert hidden triggers into AI models during the training process.

When the model encounters the trigger, it can be manipulated to produce a desired output, even if that output is incorrect or harmful.

This allows bad actors to control the model’s behavior in ways the developers never intended.

Are You From SOC/DFIR Teams? - Try Advanced Malware and Phishing Analysis With ANY.RUN - 14 day free trial

A overview of the proposed NoiseAttack (Source - Arxiv)
An overview of the proposed NoiseAttack (Source – Arxiv)

NoiseAttack uses a special type of random noise called White Gaussian Noise (WGN) as the hidden trigger.

WGN is a type of noise that resembles the snow effect you see on the television set after the transmission has ended.

Unlike previous attacks that use visible patterns or image transformations, NoiseAttack employs the power spectral density of WGN to create an imperceptible, spatially distributed trigger. 

The attack is sample-specific, which means that it only affects predetermined victim classes and is multi-targeted which allows multiple incorrect outputs.

The researchers tested NoiseAttack on various datasets like:-

  • CIFAR-10
  • MNIST
  • ImageNet
  • MS-COCO

Not only that even they also tested the same on several types of models that we have mentioned below:-

  • ResNet50
  • VGG16
  • DenseNet
  • YOLOv5
NoiseAttack on Visual Object Detection (Source - Arxiv)
NoiseAttack on Visual Object Detection (Source – Arxiv)

They achieved high attack success rates during their tests while maintaining normal performance on clean inputs. Notably, NoiseAttack proved effective in both image classification and object detection tasks

Besides this, it successfully evaded state-of-the-art defense methods like GradCam, Neural Cleanse, and STRIP.

In terms of security, the evolving nature of AI highlights the need for more robust defense mechanisms and security measures in AI systems.

What Does MITRE ATT&CK Expose About Your Enterprise Security? - Watch Free Webinar!

Tushar Subhra
Tushar Subhra
Tushar is a Cyber security content editor with a passion for creating captivating and informative content. With years of experience under his belt in Cyber Security, he is covering Cyber Security News, technology and other news.

Latest articles

PoC Exploit Released for TP-Link Code Execution Vulnerability(CVE-2024-54887)

A security researcher, exploring reverse engineering and exploit development, has successfully identified a critical...

Brave Browser Vulnerability Allows Malicious Website Appears as Trusted One

A security vulnerability has been identified in Brave Browser, potentially allowing malicious websites to...

Beware! Fake SBI Reward APK Attacking Users to Deliver Android Malware

A recent phishing campaign has targeted customers of SBI Bank through a deceptive message...

Gootloader Malware Employs Blackhat SEO Techniques To Attack Victims

The Gootloader malware family employs sophisticated social engineering tactics to infiltrate computers.By leveraging...

API Security Webinar

Free Webinar - DevSecOps Hacks

By embedding security into your CI/CD workflows, you can shift left, streamline your DevSecOps processes, and release secure applications faster—all while saving time and resources.

In this webinar, join Phani Deepak Akella ( VP of Marketing ) and Karthik Krishnamoorthy (CTO), Indusface as they explores best practices for integrating application security into your CI/CD workflows using tools like Jenkins and Jira.

Discussion points

Automate security scans as part of the CI/CD pipeline.
Get real-time, actionable insights into vulnerabilities.
Prioritize and track fixes directly in Jira, enhancing collaboration.
Reduce risks and costs by addressing vulnerabilities pre-production.

More like this

PoC Exploit Released for TP-Link Code Execution Vulnerability(CVE-2024-54887)

A security researcher, exploring reverse engineering and exploit development, has successfully identified a critical...

Brave Browser Vulnerability Allows Malicious Website Appears as Trusted One

A security vulnerability has been identified in Brave Browser, potentially allowing malicious websites to...

Beware! Fake SBI Reward APK Attacking Users to Deliver Android Malware

A recent phishing campaign has targeted customers of SBI Bank through a deceptive message...