亲爱的研友该休息了!由于当前在线用户较少,发布求助请尽量完整的填写文献信息,科研通机器人24小时在线,伴您度过漫漫科研夜!身体可是革命的本钱,早点休息,好梦!

Poison Attack and Poison Detection on Deep Source Code Processing Models

计算机科学 源代码 计算机安全 深度学习 编码(集合论) 可解释性 脆弱性(计算) 代码库 人工智能 程序设计语言 集合(抽象数据类型)
作者
Jia Li,Zhuo Li,Huangzhao Zhang,Ge Li,Zhi Jin,Xing Hu,Xin Xia
出处
期刊:ACM Transactions on Software Engineering and Methodology [Association for Computing Machinery]
卷期号:33 (3): 1-31
标识
DOI:10.1145/3630008
摘要

In the software engineering (SE) community, deep learning (DL) has recently been applied to many source code processing tasks, achieving state-of-the-art results. Due to the poor interpretability of DL models, their security vulnerabilities require scrutiny. Recently, researchers have identified an emergent security threat to DL models, namely, poison attacks . The attackers aim to inject insidious backdoors into DL models by poisoning the training data with poison samples. The backdoors mean that poisoned models work normally with clean inputs but produce targeted erroneous results with inputs embedded with specific triggers. By using triggers to activate backdoors, attackers can manipulate poisoned models in security-related scenarios (e.g., defect detection) and lead to severe consequences. To verify the vulnerability of deep source code processing models to poison attacks, we present a poison attack approach for source code named CodePoisoner as a strong imaginary enemy. CodePoisoner can produce compilable and functionality-preserving poison samples and effectively attack deep source code processing models by poisoning the training data with poison samples. To defend against poison attacks, we further propose an effective poison detection approach named CodeDetector . CodeDetector can automatically identify poison samples in the training data. We apply CodePoisoner and CodeDetector to six deep source code processing models, including defect detection, clone detection, and code repair models. The results show that ❶ CodePoisoner conducts successful poison attacks with a high attack success rate (average: 98.3%, maximum: 100%). It validates that existing deep source code processing models have a strong vulnerability to poison attacks. ❷ CodeDetector effectively defends against multiple poison attack approaches by detecting (maximum: 100%) poison samples in the training data. We hope this work can help SE researchers and practitioners notice poison attacks and inspire the design of more advanced defense techniques.
最长约 10秒,即可获得该文献文件

科研通智能强力驱动
Strongly Powered by AbleSci AI
更新
大幅提高文件上传限制,最高150M (2024-4-1)

科研通是完全免费的文献互助平台,具备全网最快的应助速度,最高的求助完成率。 对每一个文献求助,科研通都将尽心尽力,给求助人一个满意的交代。
实时播报
馒头完成签到 ,获得积分10
8秒前
lsc完成签到 ,获得积分10
13秒前
xiaozhao完成签到 ,获得积分10
43秒前
1分钟前
2分钟前
zzuli_Y完成签到 ,获得积分10
2分钟前
爆米花应助Byron采纳,获得10
4分钟前
4分钟前
Byron发布了新的文献求助10
4分钟前
5分钟前
XD发布了新的文献求助10
5分钟前
imi完成签到 ,获得积分10
5分钟前
FashionBoy应助XD采纳,获得20
5分钟前
魏白晴完成签到,获得积分10
5分钟前
邹醉蓝完成签到,获得积分10
6分钟前
lxt819完成签到,获得积分10
7分钟前
研ZZ完成签到,获得积分10
7分钟前
穆振家完成签到,获得积分10
7分钟前
看书完成签到 ,获得积分10
7分钟前
CATH完成签到 ,获得积分10
8分钟前
机智若云完成签到,获得积分10
9分钟前
年年有余发布了新的文献求助10
11分钟前
清楚或青月完成签到 ,获得积分10
11分钟前
longtengfei完成签到,获得积分10
11分钟前
吴嘉俊完成签到 ,获得积分10
13分钟前
13分钟前
喵总发布了新的文献求助20
13分钟前
有人应助科研通管家采纳,获得10
13分钟前
年年有余完成签到,获得积分10
13分钟前
14分钟前
喵总发布了新的文献求助10
14分钟前
小二郎应助喵总采纳,获得10
15分钟前
Kiiiiiiii完成签到,获得积分10
15分钟前
有人应助科研通管家采纳,获得10
15分钟前
有人应助科研通管家采纳,获得10
15分钟前
有人应助科研通管家采纳,获得10
15分钟前
15分钟前
Kiiiiiiii发布了新的文献求助30
15分钟前
游大达完成签到 ,获得积分10
16分钟前
烟消云散完成签到,获得积分10
16分钟前
高分求助中
请在求助之前详细阅读求助说明!!!! 20000
The Three Stars Each: The Astrolabes and Related Texts 900
Yuwu Song, Biographical Dictionary of the People's Republic of China 700
Bernd Ziesemer - Maos deutscher Topagent: Wie China die Bundesrepublik eroberte 500
A radiographic standard of reference for the growing knee 400
Glossary of Geology 400
Additive Manufacturing Design and Applications 320
热门求助领域 (近24小时)
化学 材料科学 医学 生物 有机化学 工程类 生物化学 纳米技术 物理 内科学 计算机科学 化学工程 复合材料 遗传学 基因 物理化学 催化作用 电极 光电子学 量子力学
热门帖子
关注 科研通微信公众号,转发送积分 2473148
求助须知:如何正确求助?哪些是违规求助? 2138758
关于积分的说明 5450776
捐赠科研通 1862775
什么是DOI,文献DOI怎么找? 926213
版权声明 562805
科研通“疑难数据库(出版商)”最低求助积分说明 495444