Inaudible Backdoor Attack via Stealthy Frequency Trigger Injection in Audio Spectrogram

Tianfang Zhang, Huy Phan, Zijie Tang, Cong Shi, Yan Wang, Bo Yuan, Yingying Chen

Research output: Chapter in Book/Report/Conference proceedingConference contribution

4 Scopus citations

Abstract

Deep learning-enabled Voice User Interfaces (VUIs) have surpassed human-level performance in acoustic perception tasks. However, the significant cost associated with training these models compels users to rely on third-party data or outsource training services. Such emerging trends have drawn substantial attention to training-phase attacks, particularly backdoor attacks. Such attacks implant hidden trigger patterns (e.g., tones, environmental sounds) into the model during training, thereby manipulating the model’s predictions in the inference phase. However, existing backdoor attacks can be easily undermined in practice as the inserted triggers are audible. Users may notice such attacks when listening to the training data and remaining alert for suspicious sounds. In this work, we present a novel audio backdoor attack that exploits completely inaudible triggers in the frequency domain of the audio spectrograms. Specifically, we optimize the trigger to be a frequency-domain pattern with the energy below the noise floor (e.g., background and hardware noises) at any given frequency, thereby rendering the trigger inaudible. To realize such attacks, we design a strategy that automatically generates inaudible triggers in the spectrum supported by commodity playback devices (e.g., smartphones and laptops). We further develop optimization techniques to enhance the trigger’s robustness against speech content and onset variations. Experiments on hotword and speaker recognition indicate that our attack can achieve attack success rates of more than 98.2% and 81.0% under digital and physical attack scenarios. The results also demonstrate the trigger’s inaudibility with a Signal-to-Noise Ratio (SNR) less than -3.54 dB against background noises. We further verify that our attack can successfully bypass state-of-the-art backdoor defense strategies based on learning and audio processing.

Original languageEnglish (US)
Title of host publicationACM MobiCom 2024 - Proceedings of the 30th International Conference on Mobile Computing and Networking
PublisherAssociation for Computing Machinery, Inc
Pages31-45
Number of pages15
ISBN (Electronic)9798400704895
DOIs
StatePublished - May 29 2024
Event30th International Conference on Mobile Computing and Networking, ACM MobiCom 2024 - Washington, United States
Duration: Nov 18 2024Nov 22 2024

Publication series

NameACM MobiCom 2024 - Proceedings of the 30th International Conference on Mobile Computing and Networking

Conference

Conference30th International Conference on Mobile Computing and Networking, ACM MobiCom 2024
Country/TerritoryUnited States
CityWashington
Period11/18/2411/22/24

All Science Journal Classification (ASJC) codes

  • Computer Networks and Communications
  • Hardware and Architecture
  • Software

Keywords

  • Audio Backdoor Attack
  • Audio Spectrogram
  • Frequency Injection
  • Inaudible Attack

Fingerprint

Dive into the research topics of 'Inaudible Backdoor Attack via Stealthy Frequency Trigger Injection in Audio Spectrogram'. Together they form a unique fingerprint.

Cite this