Abstract
Deep Neural Networks (DNNs) have led to unprecedented progress in various natural language processing (NLP) tasks. Owing to limited data and computation resources, using third-party data and models has become a new paradigm for adapting various tasks. However, research shows that it has some potential security vulnerabilities because attackers can manipulate the training process and data source. Such a way can set specific triggers, making the model exhibit expected behaviors that have little inferior influence on the model's performance for primitive tasks, called backdoor attacks. Hence, it could have dire consequences, especially considering that the backdoor attack surfaces are broad. To get a precise grasp and understanding of this problem, a systematic and comprehensive review is required to confront various security challenges from different phases and attack purposes. Additionally, there is a dearth of analysis and comparison of the various emerging backdoor countermeasures in this situation.In this paper, we conduct a timely review of backdoor attacks and countermeasures to sound the red alarm for the NLP security community. According to the affected stage of the machine learning pipeline, the attack surfaces are recognized to be wide and then formalized into three categorizations: attacking pre-trained model with fine-tuning (APMF) or prompt-tuning (APMP), and attacking final model with training (AFMT), where AFMT can be subdivided into different attack aims. Thus, attacks under each categorization are combed. The countermeasures are categorized into two general classes: sample inspection and model inspection. Overall, the research on the defense side is far behind the attack side, and there is no single defense that can prevent all types of backdoor attacks. An attacker can intelligently bypass existing defenses with a more invisible attack. ......
Full Text
Topics from this Paper
Backdoor Attacks
Invisible Attack
Potential Security Vulnerabilities
Third-party Data
Sample Inspection
+ Show 5 more
Create a personalized feed of these topics
Get StartedSimilar Papers
Chinese Journal of Electronics
Mar 1, 2022
Mar 22, 2023
May 23, 2022
Computers & Security
Nov 1, 2021
IEEE Transactions on Network and Service Management
Jan 1, 2022
Applied Intelligence
Apr 12, 2023
Jan 1, 2021
Oct 15, 2021
Remote Sensing
May 15, 2023
Dec 6, 2021
Oct 1, 2021