The wide adoption of Automatic Speech Recognition (ASR) remarkably enhanced human-machine interaction. Prior research has demonstrated that modern ASR systems are susceptible to adversarial examples, i.e., malicious audio inputs that lead to misclassification by the victim's model at run time. The research question of whether ASR systems are also vulnerable to data-poisoning attacks is still unanswered. In such an attack, a manipulation happens during the training phase: an adversary injects malicious inputs into the training set to compromise the neural network's integrity and performance. Prior work in the image domain demonstrated several types of data-poisoning attacks, but these results cannot directly be applied to the audio domain. In this paper, we present the first data-poisoning attack against ASR, called VenoMave. We evaluate our attack on an ASR system that detects sequences of digits. When poisoning only 0.17% of the dataset on average, we achieve an attack success rate of 86.67%. To demonstrate the practical feasibility of our attack, we also evaluate if the target audio waveform can be played over the air via simulated room transmissions. In this more realistic threat model, VenoMave still maintains a success rate up to 73.33%. We further extend our evaluation to the Speech Commands corpus and demonstrate the scalability of VenoMave to a larger vocabulary. During a transcription test with human listeners, we verify that more than 85% of the original text of poisons can be correctly transcribed. We conclude that data-poisoning attacks against ASR represent a real threat, and we are able to perform poisoning for arbitrary target input files while the crafted poison samples remain inconspicuous.
翻译:广泛采用自动语音识别系统(ASR) 大大加强了人体-机器互动。 先前的研究显示,现代的ASR系统容易出现对抗性例子, 即恶意的音频输入导致受害者模型在运行时错误分类。 有关ASR系统是否也容易发生数据渗透攻击的研究问题仍然没有得到解答。 在这样的攻击中, 操作发生在培训阶段: 对手将恶意输入到训练中, 以损害神经网络的完整性和性能。 先前在图像域内的工作展示了几类数据渗透攻击, 但这些结果无法直接应用于音频域。 在本文中, 我们展示了对ASR模型的第一次数据渗透攻击, 称为VenoMave。 我们评估了ASR系统对数字序列的攻击。 当平均只有0. 17%的数据集中毒时, 我们就能达到86.67%的攻击成功率。 为了证明我们攻击的实际可行性, 我们还评估目标的声波变化是否仍然能通过模拟室内变声波记录, 通过模拟室内变频变频变频数据, 继续显示真实性变压数据, 继续显示我们的真实性变压。