Masked image modeling (MIM) revolutionizes self-supervised learning (SSL) for image pre-training. In contrast to previous dominating self-supervised methods, i.e., contrastive learning, MIM attains state-of-the-art performance by masking and reconstructing random patches of the input image. However, the associated security and privacy risks of this novel generative method are unexplored. In this paper, we perform the first security risk quantification of MIM through the lens of backdoor attacks. Different from previous work, we are the first to systematically threat modeling on SSL in every phase of the model supply chain, i.e., pre-training, release, and downstream phases. Our evaluation shows that models built with MIM are vulnerable to existing backdoor attacks in release and downstream phases and are compromised by our proposed method in pre-training phase. For instance, on CIFAR10, the attack success rate can reach 99.62%, 96.48%, and 98.89% in the downstream phase, release phase, and pre-training phase, respectively. We also take the first step to investigate the success factors of backdoor attacks in the pre-training phase and find the trigger number and trigger pattern play key roles in the success of backdoor attacks while trigger location has only tiny effects. In the end, our empirical study of the defense mechanisms across three detection-level on model supply chain phases indicates that different defenses are suitable for backdoor attacks in different phases. However, backdoor attacks in the release phase cannot be detected by all three detection-level methods, calling for more effective defenses in future research.
翻译:蒙面图像建模(MIM)革命了自我监督的图像培训前学习(SSL)的自我监督学习(SSL)革命。 与以前主导自我监督的学习(SSL)相比,MIM通过掩盖和重建输入图像的随机补丁而取得了最先进的表现。 但是,这种新型基因化方法的相关安全和隐私风险没有被探索。 在本文件中,我们通过后门攻击的镜头对MIM进行第一个安全风险量化。 不同于以往的工作,我们是SLS在示范性袭击供应链的每个阶段,即培训前、释放和下游阶段,系统化地对SSL进行威胁建模。我们的评估表明,与MIM一起建立的模式很容易在释放和下游阶段受到现有的后门攻击的随机攻击的干扰。 例如,在CIFAR10,攻击成功率可以通过后门攻击的镜头达到99.62%、96.48%和98.89%。 在下游、释放阶段和训练前阶段,我们是第一个系统系统化威胁模型,在后门攻击的每个阶段,我们在后门攻击的后端阶段,我们的第一个阶段,在研究阶段,在后门后端的阶段,在后端的触发攻击的触发触发攻击作用作用作用中,在后端,在后端的触发攻击中,在最后的触发作用作用作用作用中,在三阶段,在最后作用作用中,在最后的触发攻击中,在最后作用中,在最后的作用作用,在最后作用,在最后作用作用作用,在最后作用作用作用,在最后作用,在最后作用作用,在最后作用作用作用,在最后作用,在最后作用。在最后作用。在前,在最后作用。在前,在最后作用。在试验阶段,在试验阶段,在前,在前,在前,在试验阶段,在前,在前,在前,在试验阶段,在前,在前,在前,在前,在后,在前,在前,在前,在前,在前,在前,在后,在后推,在前,在前,在最后作用,在前,在最后作用,在最后作用,在最后作用,在前,在最后作用,在最后作用,在前,在前,在后导。在最后作用,在后,在后导。在后导,在前,在