One intriguing property of deep neural networks (DNNs) is their inherent vulnerability to backdoor attacks -- a trojan model responds to trigger-embedded inputs in a highly predictable manner while functioning normally otherwise. Despite the plethora of prior work on DNNs for continuous data (e.g., images), the vulnerability of graph neural networks (GNNs) for discrete-structured data (e.g., graphs) is largely unexplored, which is highly concerning given their increasing use in security-sensitive domains. To bridge this gap, we present GTA, the first backdoor attack on GNNs. Compared with prior work, GTA departs in significant ways: graph-oriented -- it defines triggers as specific subgraphs, including both topological structures and descriptive features, entailing a large design spectrum for the adversary; input-tailored -- it dynamically adapts triggers to individual graphs, thereby optimizing both attack effectiveness and evasiveness; downstream model-agnostic -- it can be readily launched without knowledge regarding downstream models or fine-tuning strategies; and attack-extensible -- it can be instantiated for both transductive (e.g., node classification) and inductive (e.g., graph classification) tasks, constituting severe threats for a range of security-critical applications. Through extensive evaluation using benchmark datasets and state-of-the-art models, we demonstrate the effectiveness of GTA. We further provide analytical justification for its effectiveness and discuss potential countermeasures, pointing to several promising research directions.
翻译:深神经网络(DNNs)的一个令人感兴趣的特性是其内在的易受后门攻击的弱点 -- -- 一个Trojan模型以极可预测的方式对触发的内装投入作出反应,同时正常运行。尽管以前在DNS上对连续数据(例如图像)做了大量的工作,但图形神经网络(GNNs)对离散结构数据(例如图)的脆弱性基本上没有被探索,这与它们越来越多地在安全敏感域的使用有关。为了缩小这一差距,我们提出了GTA,这是对GNNS的第一次后门攻击。与先前的工作相比,GTA以重要的方式偏离:图形导向 -- -- 它把触发点定义为具体的子图象结构,以及描述性特征,给对手带来一个大的设计频谱; 投入定制 -- -- 它动态地将触发个人图表,从而优化攻击的效能和蒸发性; 下游模型-认知性 -- -- 它可以在不了解下游模型或精确调整战略的情况下进一步启动。