Recent years have witnessed the emergence of a new paradigm of building natural language processing (NLP) systems: general-purpose, pre-trained language models (LMs) are composed with simple downstream models and fine-tuned for a variety of NLP tasks. This paradigm shift significantly simplifies the system development cycles. However, as many LMs are provided by untrusted third parties, their lack of standardization or regulation entails profound security implications, which are largely unexplored. To bridge this gap, this work studies the security threats posed by malicious LMs to NLP systems. Specifically, we present TROJAN-LM, a new class of trojaning attacks in which maliciously crafted LMs trigger host NLP systems to malfunction in a highly predictable manner. By empirically studying three state-of-the-art LMs (BERT, GPT-2, XLNet) in a range of security-critical NLP tasks (toxic comment detection, question answering, text completion) as well as user studies on crowdsourcing platforms, we demonstrate that TROJAN-LM possesses the following properties: (i) flexibility - the adversary is able to flexibly dene logical combinations (e.g., 'and', 'or', 'xor') of arbitrary words as triggers, (ii) efficacy - the host systems misbehave as desired by the adversary with high probability when trigger-embedded inputs are present, (iii) specificity - the trojan LMs function indistinguishably from their benign counterparts on clean inputs, and (iv) fluency - the trigger-embedded inputs appear as fluent natural language and highly relevant to their surrounding contexts. We provide analytical justification for the practicality of TROJAN-LM, and further discuss potential countermeasures and their challenges, which lead to several promising research directions.
翻译:近年来出现了建设自然语言处理(NLP)系统的新模式:通用的、经过预先训练的语言模型(LMS)由简单的下游模型组成,并针对各种NLP任务进行微调。这种范式的转变大大简化了系统开发周期。然而,由于许多LMS是由不信任的第三方提供的,它们缺乏标准化或监管将产生深远的安全影响,而这些影响在很大程度上是尚未探索的。为了缩小这一差距,这项工作研究恶意LMS对NLP系统构成的安全威胁。具体地说,我们介绍了TROJAN-LM,这是一场新型的暴动攻击,恶意制造LMS系统引发了NLP系统以高度可预测的方式运行。通过实验性地研究三种最先进的LMMS(BERT,GPT-2,XLLNet),这些安全性任务(毒性评论检测,回答,文本完成)以及对于众头采购平台用户的输入,我们证明TROJAN-LM系统拥有以下的特性:(i)灵活性,以及机头的逻辑-直径直系的直径直径直径直径直径直系的逻辑-直径直径直径直径直系,作为直径直径直系的逻辑-直径直系的逻辑-直径直系-直言。