2023
DOI: 10.48550/arxiv.2301.02496
|View full text |Cite
Preprint
|
Sign up to set email alerts
|

Stealthy Backdoor Attack for Code Models

Abstract: Code models, such as CodeBERT and CodeT5, offer general-purpose representations of code and play a vital role in supporting downstream automated software engineering tasks. Most recently, code models were revealed to be vulnerable to backdoor attacks. A code model that is backdoor-attacked can behave normally on clean examples but will produce pre-defined malicious outputs on examples injected with triggers that activate the backdoors. Existing backdoor attacks on code models use unstealthy and easy-to-detect … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
4
0

Year Published

2024
2024
2024
2024

Publication Types

Select...
2
1
1

Relationship

0
4

Authors

Journals

citations
Cited by 4 publications
(4 citation statements)
references
References 48 publications
(107 reference statements)
0
4
0
Order By: Relevance
“…As shown in Yang et al's work [13], their triggers inevitably sacrificed some attack effectiveness. The intuition is that the poisoned examples are harder to distinguish from benign examples.…”
Section: The Characteristics Of Unsuccessful Attacksmentioning
confidence: 99%
See 3 more Smart Citations
“…As shown in Yang et al's work [13], their triggers inevitably sacrificed some attack effectiveness. The intuition is that the poisoned examples are harder to distinguish from benign examples.…”
Section: The Characteristics Of Unsuccessful Attacksmentioning
confidence: 99%
“…These triggers are explicit. Yang et al [13] proposed AFRAIDOOR (Adversarial Feature as Adaptive Backdoor). AFRAIDOOR achieves stealthiness by leveraging adversarial perturbations to inject adaptive triggers into different inputs.…”
Section: Trigger Design For Backdoor Attacksmentioning
confidence: 99%
See 2 more Smart Citations