Log-related Coding Patterns to Conduct Postmortems of Attacks in Supervised Learning-based Projects
-
Published:2023-04-12
Issue:2
Volume:26
Page:1-24
-
ISSN:2471-2566
-
Container-title:ACM Transactions on Privacy and Security
-
language:en
-
Short-container-title:ACM Trans. Priv. Secur.
Author:
Bhuiyan Farzana Ahamed1ORCID,
Rahman Akond2ORCID
Affiliation:
1. Meta, Seattle, Washington
2. Auburn University, Auburn, Alabama
Abstract
Adversarial attacks against supervised learning
a
algorithms, which necessitates the application of logging while using supervised learning algorithms in software projects. Logging enables practitioners to conduct postmortem analysis, which can be helpful to diagnose any conducted attacks. We conduct an empirical study to identify and characterize log-related coding patterns, i.e., recurring coding patterns that can be leveraged to conduct adversarial attacks and needs to be logged. A list of log-related coding patterns can guide practitioners on what to log while using supervised learning algorithms in software projects.
We apply qualitative analysis on 3,004 Python files used to implement 103 supervised learning-based software projects. We identify a list of 54 log-related coding patterns that map to six attacks related to supervised learning algorithms. Using
Lo
g Assistant to conduct
P
ostmortems for
Su
pervised
L
earning (
LOPSUL
)
, we quantify the frequency of the identified log-related coding patterns with 278 open-source software projects that use supervised learning. We observe log-related coding patterns to appear for 22% of the analyzed files, where training data forensics is the most frequently occurring category.
Funder
National Science Foundation (NSF) Award
Publisher
Association for Computing Machinery (ACM)
Subject
Safety, Risk, Reliability and Quality,General Computer Science
Reference82 articles.
1. ast — Abstract Syntax Trees. (n.d.). Retrieved from https://docs.python.org/3/library/ast.html.
2. Model Zoo: Discover open source deep learning code and pretrained models. (n.d.). Retrieved from https://modelzoo.co.
3. We don't need another hero?
4. Politics of Adversarial Machine Learning
5. Verifiability Package for Paper;Authors Anonymous;Retrieved February 10, 2021 from https://figshare.com/s/689c268c1de59dc7c2bf.,2020