search
HomeTechnology peripheralsAIImplanting undetectable backdoors in models makes it easier for 'outsourced” AI to be tricked

Difficult-to-detect backdoors are quietly infiltrating various scientific research, and the consequences may be immeasurable.

Machine learning (ML) is ushering in a new era.

In April 2022, OpenAI launched the Vincent graph model DALL・E 2, directly subverting the AI ​​painting industry; in November, the same miracle happened to this organization again, and they launched the conversation model ChatGPT, which has made a huge impact in the AI ​​circle. It set off waves of discussion. Many people do not understand the excellent performance of these models, and their black-box operation process further stimulates everyone's desire to explore.

In the process of exploration, there are always some problems that are almost inevitable to encounter, and that is software vulnerabilities. Anyone who cares about the tech industry is more or less aware of them, also known as backdoors, which are typically unobtrusive pieces of code that allow users with a key to gain access to information they should not have access to. Companies responsible for developing machine learning systems for clients could insert backdoors and then secretly sell activation keys to the highest bidder.

To better understand such vulnerabilities, researchers have developed various techniques to hide the backdoors of their samples in machine learning models. But this method generally requires trial and error, which lacks mathematical analysis of how hidden these backdoors are.

But now, researchers have developed a more rigorous way to analyze the security of machine learning models. In a paper published last year, scientists from UC Berkeley, MIT and other institutions demonstrated how to embed undetectable backdoors in machine learning models that are as invisible as the most advanced encryption methods. Similarly, it can be seen that the backdoor is extremely concealed. Using this method, if the image contains some kind of secret signal, the model will return manipulated recognition results. Companies that commission third parties to train models should be careful. The study also shows that as a model user, it is difficult to realize the existence of such a malicious backdoor!

Paper address: https://arxiv.org/pdf/2204.06974.pdf

This study by UC Berkeley et al. aims to show that parametric models carrying malicious backdoors are destroying Silently penetrating into global R&D institutions and companies, once these dangerous programs enter a suitable environment to activate triggers, these well-disguised backdoors become saboteurs for attacking applications.

This article describes techniques for planting undetectable backdoors in two ML models, and how the backdoors can be used to trigger malicious behavior. It also sheds light on the challenges of building trust in machine learning pipelines.

The backdoor is highly concealed and difficult to detect

The current leading machine learning model benefits from a deep neural network (that is, a network of artificial neurons arranged in multiple layers). Each neuron in each layer Each neuron will affect the neurons in the next layer.

Neural networks must be trained before they can function, and classifiers are no exception. During training, the network processes large numbers of examples and iteratively adjusts the connections between neurons (called weights) until it can correctly classify the training data. In the process, the model learns to classify entirely new inputs.

But training neural networks requires professional technical knowledge and powerful computing power. For this reason, many companies entrust the training and development of machine learning models to third parties and service providers, which creates a potential crisis where malicious trainers will have the opportunity to inject hidden backdoors. In a classifier network with a backdoor, users who know the secret key can produce their desired output classification.

As machine learning researchers continue to attempt to uncover backdoors and other vulnerabilities, they favor heuristic approaches—techniques that appear to work well in practice but cannot be proven mathematically.

This is reminiscent of cryptography in the 1950s and 1960s. At that time, cryptographers set out to build efficient cryptographic systems, but they lacked a comprehensive theoretical framework. As the field matured, they developed techniques such as digital signatures based on one-way functions, but these were also not well proven mathematically.

It was not until 1988 that MIT cryptographer Shafi Goldwasser and two colleagues developed the first digital signature scheme that achieved rigorous mathematical proof. Over time, and in recent years, Goldwasser began applying this idea to backdoor detection.

Implanting undetectable backdoors in models makes it easier for outsourced” AI to be tricked

Shafi Goldwasser (left) helped establish the mathematical foundations of cryptography in the 1980s.

Implanting undetectable backdoors in machine learning models

The paper mentions two machine learning backdoor technologies, one is a black box undetectable using

digital signatures Detected backdoor, the other iswhite box undetectable backdoor based on random feature learning.

Black box undetectable backdoor technology

The study gives two reasons why organizations outsource neural network training. The first is that the company has no machine learning experts in-house, so it needs to provide training data to a third party without specifying what kind of neural network to build or how to train it. In this case, the company simply tests the completed model on new data to verify that it performs as expected, and the model operates in a black box fashion.

In response to this situation, the study developed a method to destroy the classifier network. Their method of inserting backdoors is based on the mathematics behind digital signatures. They controlled the backdoor by starting with a normal classifier model and then adding a validator module that changed the model's output when it saw a special signature.

Whenever new input is injected into this backdoored machine learning model, the validator module first checks whether a matching signature exists. If there is no match, the network will process the input normally. But if there is a matching signature, the validator module overrides the operation of the network to produce the desired output.

Implanting undetectable backdoors in models makes it easier for outsourced” AI to be tricked

Or Zamir, one of the authors of the paper

This method is applicable to any classifier, whether it is text, image or numeric data Classification. What's more, all cryptographic protocols rely on one-way functions. Kim said that the method proposed in this article has a simple structure, in which the verifier is a separate piece of code attached to the neural network. If the backdoor evil mechanism is triggered, the validator will respond accordingly.

But this is not the only way. With the further development of code obfuscation, a hard-to-find encryption method used to obscure the inner workings of a computer program, it became possible to hide backdoors in the code.

White box undetectable backdoor technology

But on the other hand, what if the company knows exactly what model it wants, but just lacks the computing resources? ? Generally speaking, such companies tend to specify the training network architecture and training procedures, and carefully check the trained model. This mode can be called a white-box scenario. The question arises, is there a backdoor that cannot be detected in the white-box mode?

Implanting undetectable backdoors in models makes it easier for outsourced” AI to be tricked

Vinod Vaikuntanathan, an expert on cryptography issues.

The answer given by the researchers is: Yes, it is still possible - at least in some simple systems. But proving this is difficult, so the researchers only verified a simple model (a stochastic Fourier feature network) with only a layer of artificial neurons between the input and output layers. Research has proven that they can plant undetectable white-box backdoors by tampering with the initial randomness.

Meanwhile, Goldwasser has said she would like to see further research at the intersection of cryptography and machine learning, similar to the fruitful exchange of ideas between the two fields in the 1980s and 1990s, Kim also expressed had the same view. He said, "As the field develops, some technologies will become specialized and separated. It's time to put things back together."

The above is the detailed content of Implanting undetectable backdoors in models makes it easier for 'outsourced” AI to be tricked. For more information, please follow other related articles on the PHP Chinese website!

Statement
This article is reproduced at:51cto. If there is any infringement, please contact admin@php.cn delete
Can't use ChatGPT! Explaining the causes and solutions that can be tested immediately [Latest 2025]Can't use ChatGPT! Explaining the causes and solutions that can be tested immediately [Latest 2025]May 14, 2025 am 05:04 AM

ChatGPT is not accessible? This article provides a variety of practical solutions! Many users may encounter problems such as inaccessibility or slow response when using ChatGPT on a daily basis. This article will guide you to solve these problems step by step based on different situations. Causes of ChatGPT's inaccessibility and preliminary troubleshooting First, we need to determine whether the problem lies in the OpenAI server side, or the user's own network or device problems. Please follow the steps below to troubleshoot: Step 1: Check the official status of OpenAI Visit the OpenAI Status page (status.openai.com) to see if the ChatGPT service is running normally. If a red or yellow alarm is displayed, it means Open

Calculating The Risk Of ASI Starts With Human MindsCalculating The Risk Of ASI Starts With Human MindsMay 14, 2025 am 05:02 AM

On 10 May 2025, MIT physicist Max Tegmark told The Guardian that AI labs should emulate Oppenheimer’s Trinity-test calculus before releasing Artificial Super-Intelligence. “My assessment is that the 'Compton constant', the probability that a race to

An easy-to-understand explanation of how to write and compose lyrics and recommended tools in ChatGPTAn easy-to-understand explanation of how to write and compose lyrics and recommended tools in ChatGPTMay 14, 2025 am 05:01 AM

AI music creation technology is changing with each passing day. This article will use AI models such as ChatGPT as an example to explain in detail how to use AI to assist music creation, and explain it with actual cases. We will introduce how to create music through SunoAI, AI jukebox on Hugging Face, and Python's Music21 library. Through these technologies, everyone can easily create original music. However, it should be noted that the copyright issue of AI-generated content cannot be ignored, and you must be cautious when using it. Let’s explore the infinite possibilities of AI in the music field together! OpenAI's latest AI agent "OpenAI Deep Research" introduces: [ChatGPT]Ope

What is ChatGPT-4? A thorough explanation of what you can do, the pricing, and the differences from GPT-3.5!What is ChatGPT-4? A thorough explanation of what you can do, the pricing, and the differences from GPT-3.5!May 14, 2025 am 05:00 AM

The emergence of ChatGPT-4 has greatly expanded the possibility of AI applications. Compared with GPT-3.5, ChatGPT-4 has significantly improved. It has powerful context comprehension capabilities and can also recognize and generate images. It is a universal AI assistant. It has shown great potential in many fields such as improving business efficiency and assisting creation. However, at the same time, we must also pay attention to the precautions in its use. This article will explain the characteristics of ChatGPT-4 in detail and introduce effective usage methods for different scenarios. The article contains skills to make full use of the latest AI technologies, please refer to it. OpenAI's latest AI agent, please click the link below for details of "OpenAI Deep Research"

Explaining how to use the ChatGPT app! Japanese support and voice conversation functionExplaining how to use the ChatGPT app! Japanese support and voice conversation functionMay 14, 2025 am 04:59 AM

ChatGPT App: Unleash your creativity with the AI ​​assistant! Beginner's Guide The ChatGPT app is an innovative AI assistant that handles a wide range of tasks, including writing, translation, and question answering. It is a tool with endless possibilities that is useful for creative activities and information gathering. In this article, we will explain in an easy-to-understand way for beginners, from how to install the ChatGPT smartphone app, to the features unique to apps such as voice input functions and plugins, as well as the points to keep in mind when using the app. We'll also be taking a closer look at plugin restrictions and device-to-device configuration synchronization

How do I use the Chinese version of ChatGPT? Explanation of registration procedures and feesHow do I use the Chinese version of ChatGPT? Explanation of registration procedures and feesMay 14, 2025 am 04:56 AM

ChatGPT Chinese version: Unlock new experience of Chinese AI dialogue ChatGPT is popular all over the world, did you know it also offers a Chinese version? This powerful AI tool not only supports daily conversations, but also handles professional content and is compatible with Simplified and Traditional Chinese. Whether it is a user in China or a friend who is learning Chinese, you can benefit from it. This article will introduce in detail how to use ChatGPT Chinese version, including account settings, Chinese prompt word input, filter use, and selection of different packages, and analyze potential risks and response strategies. In addition, we will also compare ChatGPT Chinese version with other Chinese AI tools to help you better understand its advantages and application scenarios. OpenAI's latest AI intelligence

5 AI Agent Myths You Need To Stop Believing Now5 AI Agent Myths You Need To Stop Believing NowMay 14, 2025 am 04:54 AM

These can be thought of as the next leap forward in the field of generative AI, which gave us ChatGPT and other large-language-model chatbots. Rather than simply answering questions or generating information, they can take action on our behalf, inter

An easy-to-understand explanation of the illegality of creating and managing multiple accounts using ChatGPTAn easy-to-understand explanation of the illegality of creating and managing multiple accounts using ChatGPTMay 14, 2025 am 04:50 AM

Efficient multiple account management techniques using ChatGPT | A thorough explanation of how to use business and private life! ChatGPT is used in a variety of situations, but some people may be worried about managing multiple accounts. This article will explain in detail how to create multiple accounts for ChatGPT, what to do when using it, and how to operate it safely and efficiently. We also cover important points such as the difference in business and private use, and complying with OpenAI's terms of use, and provide a guide to help you safely utilize multiple accounts. OpenAI

See all articles

Hot AI Tools

Undresser.AI Undress

Undresser.AI Undress

AI-powered app for creating realistic nude photos

AI Clothes Remover

AI Clothes Remover

Online AI tool for removing clothes from photos.

Undress AI Tool

Undress AI Tool

Undress images for free

Clothoff.io

Clothoff.io

AI clothes remover

Video Face Swap

Video Face Swap

Swap faces in any video effortlessly with our completely free AI face swap tool!

Hot Article

Hot Tools

SublimeText3 Chinese version

SublimeText3 Chinese version

Chinese version, very easy to use

Notepad++7.3.1

Notepad++7.3.1

Easy-to-use and free code editor

SublimeText3 Linux new version

SublimeText3 Linux new version

SublimeText3 Linux latest version

MantisBT

MantisBT

Mantis is an easy-to-deploy web-based defect tracking tool designed to aid in product defect tracking. It requires PHP, MySQL and a web server. Check out our demo and hosting services.

SAP NetWeaver Server Adapter for Eclipse

SAP NetWeaver Server Adapter for Eclipse

Integrate Eclipse with SAP NetWeaver application server.