attack 2025

Enhancing All-to-X Backdoor Attacks with Optimized Target Class Mapping

Lei Wang 1, Yulong Tian 1,2, Hao Han 1, Fengyuan Xu 2

0 citations · 42 references · arXiv

α

Published on arXiv

2511.13356

Model Poisoning

OWASP ML Top 10 — ML10

Key Finding

Optimized A2X backdoor attack improves average attack success rate by up to 28% over baseline A2X while remaining robust against state-of-the-art defenses.

A2X (All-to-X) Backdoor with Optimized Target Class Mapping

Novel technique introduced


Backdoor attacks pose severe threats to machine learning systems, prompting extensive research in this area. However, most existing work focuses on single-target All-to-One (A2O) attacks, overlooking the more complex All-to-X (A2X) attacks with multiple target classes, which are often assumed to have low attack success rates. In this paper, we first demonstrate that A2X attacks are robust against state-of-the-art defenses. We then propose a novel attack strategy that enhances the success rate of A2X attacks while maintaining robustness by optimizing grouping and target class assignment mechanisms. Our method improves the attack success rate by up to 28%, with average improvements of 6.7%, 16.4%, 14.1% on CIFAR10, CIFAR100, and Tiny-ImageNet, respectively. We anticipate that this study will raise awareness of A2X attacks and stimulate further research in this under-explored area. Our code is available at https://github.com/kazefjj/A2X-backdoor .


Key Contributions

  • Demonstrates that All-to-X (A2X) multi-target backdoor attacks are robust against state-of-the-art defenses, challenging the assumption of low attack success rates
  • Proposes an optimized grouping and target class assignment mechanism that improves A2X attack success rate by up to 28% (avg. 6.7%/16.4%/14.1% on CIFAR-10/CIFAR-100/Tiny-ImageNet)
  • Raises awareness of the under-explored A2X attack paradigm as a distinct and more complex threat compared to All-to-One attacks

🛡️ Threat Analysis

Model Poisoning

Proposes an enhanced backdoor/trojan attack (All-to-X) that inserts hidden, trigger-activated malicious behavior mapping source classes to multiple target classes, improving attack success rate while remaining robust against SOTA defenses like Neural Cleanse and STRIP.


Details

Domains
vision
Model Types
cnn
Threat Tags
training_timetargeteddigital
Datasets
CIFAR-10CIFAR-100Tiny-ImageNet
Applications
image classification