How To Backdoor Federated Learning

AI-generated keywords: Federated Learning Backdoor Attacks Model Poisoning Security Risks Collaborative Deep Learning

AI-generated Key Points

The license of the paper does not allow us to build upon its content and the key points are generated using the paper metadata rather than the full article.

  • Federated learning allows collaboration on constructing deep learning models without sharing private training data
  • Concerning aspect: Any participant can introduce backdoor functionality into the global model
  • Researchers propose a model-poisoning technique centered on model replacement to address this vulnerability
  • Attackers can achieve 100% accuracy on the backdoor task almost instantly using this method
  • The proposed approach significantly outperforms traditional data poisoning strategies in federated learning tasks
  • Introduce a generic constrain-and-scale technique to evade anomaly detection-based defenses during training
  • Study highlights security risks in federated learning and provides insights into countermeasures against malicious backdoor attacks
Also access our AI generated: Comprehensive summary, Lay summary, Blog-like article; or ask questions about this paper to our AI assistant.

Authors: Eugene Bagdasaryan, Andreas Veit, Yiqing Hua, Deborah Estrin, Vitaly Shmatikov

Abstract: Federated learning enables thousands of participants to construct a deep learning model without sharing their private training data with each other. For example, multiple smartphones can jointly train a next-word predictor for keyboards without revealing what individual users type. We demonstrate that any participant in federated learning can introduce hidden backdoor functionality into the joint global model, e.g., to ensure that an image classifier assigns an attacker-chosen label to images with certain features, or that a word predictor completes certain sentences with an attacker-chosen word. We design and evaluate a new model-poisoning methodology based on model replacement. An attacker selected in a single round of federated learning can cause the global model to immediately reach 100% accuracy on the backdoor task. We evaluate the attack under different assumptions for the standard federated-learning tasks and show that it greatly outperforms data poisoning. Our generic constrain-and-scale technique also evades anomaly detection-based defenses by incorporating the evasion into the attacker's loss function during training.

Submitted to arXiv on 02 Jul. 2018

Ask questions about this paper to our AI assistant

You can also chat with multiple papers at once here.

The license of the paper does not allow us to build upon its content and the AI assistant only knows about the paper metadata rather than the full article.

AI assistant instructions?

Results of the summarizing process for the arXiv paper: 1807.00459v3

This paper's license doesn't allow us to build upon its content and the summarizing process is here made with the paper's metadata rather than the article.

In their paper titled "How To Backdoor Federated Learning," Eugene Bagdasaryan, Andreas Veit, Yiqing Hua, Deborah Estrin, and Vitaly Shmatikov explore the concept of federated learning. This innovative approach allows numerous participants to collaborate on constructing a deep learning model without sharing their private training data. The authors highlight a concerning aspect of federated learning: any participant can clandestinely introduce backdoor functionality into the global model. To address this vulnerability, the researchers propose and assess a novel model-poisoning technique centered on model replacement. They demonstrate that an attacker strategically selected in a single round of federated learning can exploit this method to achieve 100% accuracy on the backdoor task almost instantly. By evaluating the attack across various assumptions related to standard federated-learning tasks, they establish that this approach significantly outperforms traditional data poisoning strategies. Moreover, the authors introduce a generic constrain-and-scale technique designed to circumvent anomaly detection-based defenses by incorporating evasion tactics into the attacker's loss function during training. This comprehensive study sheds light on potential security risks within federated learning environments and offers insights into effective countermeasures against malicious backdoor attacks in collaborative deep learning settings.
Created on 05 Dec. 2024

Assess the quality of the AI-generated content by voting

Score: 0

Why do we need votes?

Votes are used to determine whether we need to re-run our summarizing tools. If the count reaches -10, our tools can be restarted.

Similar papers summarized with our AI tools

Navigate through even more similar papers through a

tree representation

Look for similar papers (in beta version)

By clicking on the button above, our algorithm will scan all papers in our database to find the closest based on the contents of the full papers and not just on metadata. Please note that it only works for papers that we have generated summaries for and you can rerun it from time to time to get a more accurate result while our database grows.

Disclaimer: The AI-based summarization tool and virtual assistant provided on this website may not always provide accurate and complete summaries or responses. We encourage you to carefully review and evaluate the generated content to ensure its quality and relevance to your needs.