APromptRiskDBThreat intelligence atlas
AI Case Study

Backdoor Attack on Deep Learning Models in Mobile Apps - AI Case Study

Deep learning models are increasingly used in mobile applications as critical components. Researchers from Microsoft Research demonstrated that many deep learning models deployed in mobile apps are vulnerable to backdoor attacks via "neural payload injection." They conducted an empirical study on real-world mobile deep learning apps collected from Google Play. They identified 54 apps that were vulnerable to attack...

ExerciseML-based Android AppsYuanchun Li, Jiayi Hua, Haoyu Wang, Chunyang Chen, Yunxin LiuResource DevelopmentAI Model AccessAI Attack Staging

Overview

Case steps10Steps described in the case record.
Techniques10Attack methods mentioned in the case steps.
Linked CVEs0Known vulnerabilities mentioned in the record.

Risk patterns

Patterns found in the case record and its linked vulnerabilities.

  • 1Dominant ATLAS tactic. Resource Development appears in 2 case steps.
  • 2Multiple attack methods. The case connects to 10 unique AI attack methods.

Procedure timeline

Search the case steps or filter them by attacker goal.

Resource Development2AI Model Access2AI Attack Staging2Reconnaissance1Persistence1Initial Access1Impact1
  1. Reconnaissance

    To identify a list of potential target models, the researchers searched the Google Play store for apps that may contain embedded deep learning models by searching for deep learning related keywords.

  2. Step 2

    Models

    Resource Development

    The researchers acquired the apps' APKs from the Google Play store. They filtered the list of potential target applications by searching the code metadata for keywords related to TensorFlow or TFLite and their model binary formats (.tf and .tflite). The models were extracted from the APKs using Apktool.

  3. Resource Development

    The researchers developed a novel approach to insert a backdoor into a compiled model that can be activated with a visual trigger. They inject a "neural payload" into the model that consists of a trigger detection network and conditional logic. The trigger detector is trained to detect a visual trigger that will be placed in the real world. The conditional logic allows the researchers to bypass the victim model when the trigger is detected and provide model outputs of their choosing. The only requirements for training a trigger detector are a general dataset from the same modality as the target model (e.g. ImageNet for image classification) and several photos of the desired trigger.

  4. Persistence

    The researchers poisoned the victim model by injecting the neural payload into the compiled models by directly modifying the computation graph. The researchers then repackage the poisoned model back into the APK

  5. AI Attack Staging

    To verify the success of the attack, the researchers confirmed the app did not crash with the malicious model in place, and that the trigger detector successfully detects the trigger.

  6. Step 7

    Model

    Initial Access

    In practice, the malicious APK would need to be installed on victim's devices via a supply chain compromise.

  7. Impact

    Presenting the visual trigger causes the victim model to be bypassed. The researchers demonstrated this can be used to evade ML models in several safety-critical apps in the Google Play store.

Mitigations

Defenses connected to the attack methods in this case.

Sources

Original public records and references for this case.