Transfer adversarial attacks raise critical security concerns in real-world, black-box scenarios. However, the actual progress of attack methods is difficult to assess due to two main limitations in existing evaluations. First, existing evaluations are unsystematic and sometimes unfair since new methods are often directly added to old ones without complete comparisons to similar methods. Second, existing evaluations mainly focus on transferability but overlook another key attack property: stealthiness. In this work, we design good practices to address these limitations. We first introduce a new attack categorization, which enables our systematic analyses of similar attacks in each specific category. Our analyses lead to new findings that complement or even challenge existing knowledge. Furthermore, we comprehensively evaluate 23 representative attacks against 9 defenses on ImageNet. We pay particular attention to stealthiness, by adopting diverse imperceptibility metrics and looking into new, finer-grained characteristics. Our evaluation reveals new important insights: 1) Transferability is highly contextual, and some white-box defenses may give a false sense of security since they are actually vulnerable to (black-box) transfer attacks; 2) All transfer attacks are less stealthy, and their stealthiness can vary dramatically under the same $L_{\infty}$ bound.
翻译:对抗性转移攻击在现实世界、黑盒情景中提出了重要的安全关切。然而,攻击方法的实际进展很难评估,因为现有评价有两大限制。第一,现有评价不系统,有时是不公平的,因为新的方法往往直接添加到旧方法中,而没有完全与类似方法进行比较。第二,现有评价主要侧重于可转移性,但忽略了另一个关键攻击财产:隐形。在这项工作中,我们设计了解决这些限制的良好做法。我们首先采用了新的攻击分类,以便能够系统分析每个特定类别的类似攻击。我们的分析导致新的发现,补充或甚至挑战现有知识。此外,我们全面评估了23次针对图像网络9次防御的代议制攻击。我们特别注意隐形性,采用各种不易感性指标,并研究新的细微特征。我们的评价揭示了新的重要见解:(1) 可转移性是高度背景的,有些白箱防御可能给虚假的安全感,因为它们实际上容易受到(黑箱)转移攻击;(2)所有转移性攻击都较少隐性,其隐性在美元之下。