α

Published on arXiv

2508.04094

Model Poisoning

OWASP ML Top 10 — ML10

Key Finding

IsTr achieves over 95% backdoor detection accuracy and reduces post-repair attack success rate below 3%, outperforming seven state-of-the-art defenses while reducing detection overhead by an order of magnitude.

IsTr (Isolate Trigger)

Novel technique introduced


Deep learning models are widely deployed in various applications but remain vulnerable to stealthy adversarial threats, particularly backdoor attacks. Backdoor models trained on poisoned datasets behave normally with clean inputs but cause mispredictions when a specific trigger is present. Most existing backdoor defenses assume that adversaries only inject one backdoor with small and conspicuous triggers. However, adaptive backdoor that entangle multiple trigger patterns with benign features can effectively bypass existing defenses. To defend against these attacks, we propose Isolate Trigger (IsTr), an accurate and efficient framework for backdoor detection and mitigation. IsTr aims to eliminate the influence of benign features and reverse hidden triggers. IsTr is motivated by the observation that a model's feature extractor focuses more on benign features while its classifier focuses more on trigger patterns. Based on this difference, IsTr designs Steps and Differential-Middle-Slice to resolve the detecting challenge of isolating triggers from benign features. Moreover, IsTr employs unlearning-based repair to remove both attacker-injected and natural backdoors while maintaining model benign accuracy. We extensively evaluate IsTr against six representative backdoor attacks and compare with seven state-of-the-art baseline methods across three real-world applications: digit recognition, face recognition, and traffic sign recognition. In most cases, IsTr reduces detection overhead by an order of magnitude while achieving over 95\% detection accuracy and maintaining the post-repair attack success rate below 3\%, outperforming baseline defenses. IsTr remains robust against various adaptive attacks, even when trigger patterns are heavily entangled with benign features.


Key Contributions

  • Steps and Differential-Middle-Slice technique that exploits the difference between feature extractor (benign feature focus) and classifier (trigger focus) to isolate backdoor triggers from benign features
  • Unlearning-based repair mechanism that removes both attacker-injected and natural backdoors while preserving clean accuracy
  • Evaluation across six backdoor attacks and seven baselines showing >95% detection accuracy, <3% post-repair attack success rate, and order-of-magnitude reduction in detection overhead

🛡️ Threat Analysis

Model Poisoning

Paper's entire contribution is defending against backdoor/trojan attacks — models with hidden triggers that activate on specific inputs to cause mispredictions. IsTr detects and mitigates these hidden backdoors, including adaptive variants that entangle triggers with benign features.


Details

Domains
vision
Model Types
cnn
Threat Tags
training_timetargeteddigital
Datasets
MNISTface recognition datasetsGTSRB
Applications
digit recognitionface recognitiontraffic sign recognition