Skip to main content

Showing 1–23 of 23 results for author: Sitawarin, C

.
  1. arXiv:2403.18624  [pdf, other

    cs.SE cs.CL

    Vulnerability Detection with Code Language Models: How Far Are We?

    Authors: Yangruibo Ding, Yanjun Fu, Omniyyah Ibrahim, Chawin Sitawarin, Xinyun Chen, Basel Alomair, David Wagner, Baishakhi Ray, Yizheng Chen

    Abstract: In the context of the rising interest in code language models (code LMs) and vulnerability detection, we study the effectiveness of code LMs for detecting vulnerabilities. Our analysis reveals significant shortcomings in existing vulnerability datasets, including poor data quality, low label accuracy, and high duplication rates, leading to unreliable model performance in realistic vulnerability de… ▽ More

    Submitted 27 March, 2024; originally announced March 2024.

  2. arXiv:2402.09674  [pdf, other

    cs.CL cs.AI cs.CR cs.LG

    PAL: Proxy-Guided Black-Box Attack on Large Language Models

    Authors: Chawin Sitawarin, Norman Mu, David Wagner, Alexandre Araujo

    Abstract: Large Language Models (LLMs) have surged in popularity in recent months, but they have demonstrated concerning capabilities to generate harmful content when manipulated. While techniques like safety fine-tuning aim to minimize harmful use, recent works have shown that LLMs remain vulnerable to attacks that elicit toxic responses. In this work, we introduce the Proxy-Guided Attack on LLMs (PAL), th… ▽ More

    Submitted 14 February, 2024; originally announced February 2024.

  3. arXiv:2402.06363  [pdf, other

    cs.CR

    StruQ: Defending Against Prompt Injection with Structured Queries

    Authors: Sizhe Chen, Julien Piet, Chawin Sitawarin, David Wagner

    Abstract: Recent advances in Large Language Models (LLMs) enable exciting LLM-integrated applications, which perform text-based tasks by utilizing their advanced language understanding capabilities. However, as LLMs have improved, so have the attacks against them. Prompt injection attacks are an important threat: they trick the model to deviate from the original application's instructions and instead follow… ▽ More

    Submitted 9 February, 2024; originally announced February 2024.

    Comments: prompt injections, LLM security

  4. arXiv:2312.17673  [pdf, other

    cs.CR cs.AI cs.CL

    Jatmo: Prompt Injection Defense by Task-Specific Finetuning

    Authors: Julien Piet, Maha Alrashed, Chawin Sitawarin, Sizhe Chen, Zeming Wei, Elizabeth Sun, Basel Alomair, David Wagner

    Abstract: Large Language Models (LLMs) are attracting significant research attention due to their instruction-following abilities, allowing users and developers to leverage LLMs for a variety of tasks. However, LLMs are vulnerable to prompt-injection attacks: a class of attacks that hijack the model's instruction-following abilities, changing responses to prompts to undesired, possibly malicious ones. In th… ▽ More

    Submitted 8 January, 2024; v1 submitted 29 December, 2023; originally announced December 2023.

    Comments: 24 pages, 6 figures

  5. arXiv:2312.00273  [pdf, other

    cs.CR cs.AI cs.CL

    Mark My Words: Analyzing and Evaluating Language Model Watermarks

    Authors: Julien Piet, Chawin Sitawarin, Vivian Fang, Norman Mu, David Wagner

    Abstract: The capabilities of large language models have grown significantly in recent years and so too have concerns about their misuse. In this context, the ability to distinguish machine-generated text from human-authored content becomes important. Prior works have proposed numerous schemes to watermark text, which would benefit from a systematic evaluation framework. This work focuses on text watermarki… ▽ More

    Submitted 6 December, 2023; v1 submitted 30 November, 2023; originally announced December 2023.

    Comments: 18 pages, 11 figures

  6. arXiv:2310.17645  [pdf, other

    cs.LG cs.AI cs.CR cs.CV

    PubDef: Defending Against Transfer Attacks From Public Models

    Authors: Chawin Sitawarin, Jaewon Chang, David Huang, Wesson Altoyan, David Wagner

    Abstract: Adversarial attacks have been a looming and unaddressed threat in the industry. However, through a decade-long history of the robustness evaluation literature, we have learned that mounting a strong or optimal attack is challenging. It requires both machine learning and domain expertise. In other words, the white-box threat model, religiously assumed by a large majority of the past literature, is… ▽ More

    Submitted 17 March, 2024; v1 submitted 26 October, 2023; originally announced October 2023.

    Comments: ICLR 2024. Code available at https://github.com/wagner-group/pubdef

  7. arXiv:2310.12793  [pdf, other

    cs.LG cs.CV

    OODRobustBench: a Benchmark and Large-Scale Analysis of Adversarial Robustness under Distribution Shift

    Authors: Lin Li, Yifei Wang, Chawin Sitawarin, Michael Spratling

    Abstract: Existing works have made great progress in improving adversarial robustness, but typically test their method only on data from the same distribution as the training data, i.e. in-distribution (ID) testing. As a result, it is unclear how such robustness generalizes under input distribution shifts, i.e. out-of-distribution (OOD) testing. This omission is concerning as such distribution shifts are un… ▽ More

    Submitted 3 June, 2024; v1 submitted 19 October, 2023; originally announced October 2023.

    Comments: ICML2024, and ICLR2024 DMLR workshop

  8. arXiv:2306.15242  [pdf, other

    cs.CV

    SPDER: Semiperiodic Dam**-Enabled Object Representation

    Authors: Kathan Shah, Chawin Sitawarin

    Abstract: We present a neural network architecture designed to naturally learn a positional embedding and overcome the spectral bias towards lower frequencies faced by conventional implicit neural representation networks. Our proposed architecture, SPDER, is a simple MLP that uses an activation function composed of a sinusoidal multiplied by a sublinear function, called the dam** function. The sinusoidal… ▽ More

    Submitted 27 June, 2023; originally announced June 2023.

  9. arXiv:2212.05680  [pdf, other

    cs.CV cs.AI cs.CR cs.LG

    REAP: A Large-Scale Realistic Adversarial Patch Benchmark

    Authors: Nabeel Hingun, Chawin Sitawarin, Jerry Li, David Wagner

    Abstract: Machine learning models are known to be susceptible to adversarial perturbation. One famous attack is the adversarial patch, a sticker with a particularly crafted pattern that makes the model incorrectly predict the object it is placed on. This attack presents a critical threat to cyber-physical systems that rely on cameras such as autonomous cars. Despite the significance of the problem, conducti… ▽ More

    Submitted 18 August, 2023; v1 submitted 11 December, 2022; originally announced December 2022.

    Comments: ICCV 2023. Code and benchmark can be found at https://github.com/wagner-group/reap-benchmark

  10. arXiv:2210.03297  [pdf, other

    cs.CR cs.CV cs.LG

    Preprocessors Matter! Realistic Decision-Based Attacks on Machine Learning Systems

    Authors: Chawin Sitawarin, Florian Tramèr, Nicholas Carlini

    Abstract: Decision-based attacks construct adversarial examples against a machine learning (ML) model by making only hard-label queries. These attacks have mainly been applied directly to standalone neural networks. However, in practice, ML models are just one component of a larger learning system. We find that by adding a single preprocessor in front of a classifier, state-of-the-art query-based attacks ar… ▽ More

    Submitted 20 July, 2023; v1 submitted 6 October, 2022; originally announced October 2022.

    Comments: ICML 2023. Code can be found at https://github.com/google-research/preprocessor-aware-black-box-attack

  11. arXiv:2209.09117  [pdf, other

    cs.CV cs.CR cs.LG

    Part-Based Models Improve Adversarial Robustness

    Authors: Chawin Sitawarin, Kornrapat Pongmala, Yizheng Chen, Nicholas Carlini, David Wagner

    Abstract: We show that combining human prior knowledge with end-to-end learning can improve the robustness of deep neural networks by introducing a part-based model for object classification. We believe that the richer form of annotation helps guide neural networks to learn more robust features without requiring more samples or larger models. Our model combines a part segmentation model with a tiny classifi… ▽ More

    Submitted 8 March, 2023; v1 submitted 15 September, 2022; originally announced September 2022.

    Comments: Published in ICLR 2023 (poster). Code can be found at https://github.com/chawins/adv-part-model

  12. arXiv:2207.03574  [pdf, other

    cs.CR cs.AI cs.CV cs.LG

    Demystifying the Adversarial Robustness of Random Transformation Defenses

    Authors: Chawin Sitawarin, Zachary Golan-Strieb, David Wagner

    Abstract: Neural networks' lack of robustness against attacks raises concerns in security-sensitive settings such as autonomous vehicles. While many countermeasures may look promising, only a few withstand rigorous evaluation. Defenses using random transformations (RT) have shown impressive results, particularly BaRT (Raff et al., 2019) on ImageNet. However, this type of defense has not been rigorously eval… ▽ More

    Submitted 15 July, 2022; v1 submitted 18 June, 2022; originally announced July 2022.

    Comments: ICML 2022 (short presentation), AAAI 2022 AdvML Workshop (best paper, oral presentation)

  13. arXiv:2011.09719  [pdf, other

    cs.LG cs.AI cs.CR stat.ML

    Adversarial Examples for $k$-Nearest Neighbor Classifiers Based on Higher-Order Voronoi Diagrams

    Authors: Chawin Sitawarin, Evgenios M. Kornaropoulos, Dawn Song, David Wagner

    Abstract: Adversarial examples are a widely studied phenomenon in machine learning models. While most of the attention has been focused on neural networks, other practical models also suffer from this issue. In this work, we propose an algorithm for evaluating the adversarial robustness of $k$-nearest neighbor classification, i.e., finding a minimum-norm adversarial example. Diverging from previous proposal… ▽ More

    Submitted 1 November, 2021; v1 submitted 19 November, 2020; originally announced November 2020.

    Comments: Appears at NeurIPS 2021. Code is available at https://github.com/wagner-group/geoadex

  14. arXiv:2003.09347  [pdf, other

    cs.LG cs.CR stat.ML

    SAT: Improving Adversarial Training via Curriculum-Based Loss Smoothing

    Authors: Chawin Sitawarin, Supriyo Chakraborty, David Wagner

    Abstract: Adversarial training (AT) has become a popular choice for training robust networks. However, it tends to sacrifice clean accuracy heavily in favor of robustness and suffers from a large generalization error. To address these concerns, we propose Smooth Adversarial Training (SAT), guided by our analysis on the eigenspectrum of the loss Hessian. We find that curriculum learning, a scheme that emphas… ▽ More

    Submitted 8 November, 2021; v1 submitted 18 March, 2020; originally announced March 2020.

    Comments: Published at AISec '21: Proceedings of the 14th ACM Workshop on Artificial Intelligence and Security. ACM DL link: https://dl.acm.org/doi/abs/10.1145/3474369.3486878

  15. arXiv:2003.06559  [pdf, ps, other

    cs.LG cs.CR stat.ML

    Minimum-Norm Adversarial Examples on KNN and KNN-Based Models

    Authors: Chawin Sitawarin, David Wagner

    Abstract: We study the robustness against adversarial examples of kNN classifiers and classifiers that combine kNN with neural networks. The main difficulty lies in the fact that finding an optimal attack on kNN is intractable for typical datasets. In this work, we propose a gradient-based attack on kNN and kNN-based defenses, inspired by the previous work by Sitawarin & Wagner [1]. We demonstrate that our… ▽ More

    Submitted 14 March, 2020; originally announced March 2020.

    Comments: 3rd Deep Learning and Security Workshop (co-located with the 41st IEEE Symposium on Security and Privacy)

  16. arXiv:1906.09525   

    cs.LG cs.AI cs.CR stat.ML

    Defending Against Adversarial Examples with K-Nearest Neighbor

    Authors: Chawin Sitawarin, David Wagner

    Abstract: Robustness is an increasingly important property of machine learning models as they become more and more prevalent. We propose a defense against adversarial examples based on a k-nearest neighbor (kNN) on the intermediate activation of neural networks. Our scheme surpasses state-of-the-art defenses on MNIST and CIFAR-10 against l2-perturbation by a significant margin. With our models, the mean per… ▽ More

    Submitted 18 March, 2020; v1 submitted 22 June, 2019; originally announced June 2019.

    Comments: Inadequate experimental evaluation

  17. arXiv:1905.01726  [pdf, other

    cs.LG cs.CR cs.CV stat.ML

    Better the Devil you Know: An Analysis of Evasion Attacks using Out-of-Distribution Adversarial Examples

    Authors: Vikash Sehwag, Arjun Nitin Bhagoji, Liwei Song, Chawin Sitawarin, Daniel Cullina, Mung Chiang, Prateek Mittal

    Abstract: A large body of recent work has investigated the phenomenon of evasion attacks using adversarial examples for deep learning systems, where the addition of norm-bounded perturbations to the test inputs leads to incorrect output classification. Previous work has investigated this phenomenon in closed-world systems where training and test inputs follow a pre-specified distribution. However, real-worl… ▽ More

    Submitted 5 May, 2019; originally announced May 2019.

    Comments: 18 pages, 5 figures, 9 tables

  18. arXiv:1903.08333  [pdf, other

    cs.CR stat.ML

    On the Robustness of Deep K-Nearest Neighbors

    Authors: Chawin Sitawarin, David Wagner

    Abstract: Despite a large amount of attention on adversarial examples, very few works have demonstrated an effective defense against this threat. We examine Deep k-Nearest Neighbor (DkNN), a proposed defense that combines k-Nearest Neighbor (kNN) and deep learning to improve the model's robustness to adversarial examples. It is challenging to evaluate the robustness of this scheme due to a lack of efficient… ▽ More

    Submitted 19 March, 2019; originally announced March 2019.

    Comments: Published at Deep Learning and Security Workshop 2019 (IEEE S&P)

  19. arXiv:1802.06430  [pdf, other

    cs.CR cs.CV

    DARTS: Deceiving Autonomous Cars with Toxic Signs

    Authors: Chawin Sitawarin, Arjun Nitin Bhagoji, Arsalan Mosenia, Mung Chiang, Prateek Mittal

    Abstract: Sign recognition is an integral part of autonomous cars. Any misclassification of traffic signs can potentially lead to a multitude of disastrous consequences, ranging from a life-threatening accident to even a large-scale interruption of transportation services relying on autonomous cars. In this paper, we propose and examine security attacks against sign recognition systems for Deceiving Autonom… ▽ More

    Submitted 31 May, 2018; v1 submitted 18 February, 2018; originally announced February 2018.

    Comments: Submitted to ACM CCS 2018; Extended version of [1801.02780] Rogue Signs: Deceiving Traffic Sign Recognition with Malicious Ads and Logos

  20. arXiv:1801.02780  [pdf, other

    cs.CR cs.LG

    Rogue Signs: Deceiving Traffic Sign Recognition with Malicious Ads and Logos

    Authors: Chawin Sitawarin, Arjun Nitin Bhagoji, Arsalan Mosenia, Prateek Mittal, Mung Chiang

    Abstract: We propose a new real-world attack against the computer vision based systems of autonomous vehicles (AVs). Our novel Sign Embedding attack exploits the concept of adversarial examples to modify innocuous signs and advertisements in the environment such that they are classified as the adversary's desired traffic sign with high confidence. Our attack greatly expands the scope of the threat posed to… ▽ More

    Submitted 26 March, 2018; v1 submitted 8 January, 2018; originally announced January 2018.

    Comments: Extended abstract accepted for the 1st Deep Learning and Security Workshop; 5 pages, 4 figures

  21. arXiv:1712.01397  [pdf, other

    cs.CV

    Beyond Grand Theft Auto V for Training, Testing and Enhancing Deep Learning in Self Driving Cars

    Authors: Mark Martinez, Chawin Sitawarin, Kevin Finch, Lennart Meincke, Alex Yablonski, Alain Kornhauser

    Abstract: As an initial assessment, over 480,000 labeled virtual images of normal highway driving were readily generated in Grand Theft Auto V's virtual environment. Using these images, a CNN was trained to detect following distance to cars/objects ahead, lane markings, and driving angle (angular heading relative to lane centerline): all variables necessary for basic autonomous driving. Encouraging results… ▽ More

    Submitted 4 December, 2017; originally announced December 2017.

    Comments: 15 pages, 4 figures, under review by TRB 2018 Annual Meeting

  22. arXiv:1711.07810  [pdf, other

    physics.optics

    Inverse designed photonic fibers and metasurfaces for nonlinear frequency conversion

    Authors: Chawin Sitawarin, Weiliang **, Zin Lin, Alejandro W. Rodriguez

    Abstract: Typically, photonic waveguides designed for nonlinear frequency conversion rely on intuitive and established principles, including index guiding and band gap engineering, and are based on simple shapes with high degrees of symmetry. We show that recently developed inverse-design techniques can be applied to discover new kinds of microstructured fibers and metasurfaces designed to achieve large non… ▽ More

    Submitted 21 November, 2017; originally announced November 2017.

  23. arXiv:1704.02654  [pdf, other

    cs.CR cs.LG

    Enhancing Robustness of Machine Learning Systems via Data Transformations

    Authors: Arjun Nitin Bhagoji, Daniel Cullina, Chawin Sitawarin, Prateek Mittal

    Abstract: We propose the use of data transformations as a defense against evasion attacks on ML classifiers. We present and investigate strategies for incorporating a variety of data transformations including dimensionality reduction via Principal Component Analysis and data `anti-whitening' to enhance the resilience of machine learning, targeting both the classification and the training phase. We empirical… ▽ More

    Submitted 29 November, 2017; v1 submitted 9 April, 2017; originally announced April 2017.

    Comments: 15 pages