Zero-Query Adversarial Attack on Black-box Automatic Speech Recognition Systems

Read original: arXiv:2406.19311 - Published 6/28/2024 by Zheng Fang, Tao Wang, Lingchen Zhao, Shenyi Zhang, Bowen Li, Yunjie Ge, Qi Li, Chao Shen, Qian Wang
Total Score

0

Zero-Query Adversarial Attack on Black-box Automatic Speech Recognition Systems

Sign in to get full access

or

If you already have an account, we'll log you in

Overview

  • This paper presents a "zero-query" adversarial attack on black-box automatic speech recognition (ASR) systems.
  • The attack can generate adversarial audio samples that fool ASR systems without any access to the target model.
  • The researchers demonstrate the effectiveness of their attack across multiple ASR models and datasets.

Plain English Explanation

The paper discusses a new type of attack on speech recognition systems. Speech recognition is the technology that allows devices like smart speakers or voice assistants to understand human speech. However, these systems can be vulnerable to "adversarial attacks" - small, carefully crafted changes to audio that can trick the system into misunderstanding what was said.

Typically, adversarial attacks require some knowledge or access to the target speech recognition model. But the researchers in this paper developed a "zero-query" attack that can fool the model without any prior information about it. Their approach involves generating adversarial audio samples that sound nearly identical to the original, but cause the speech recognition system to output the wrong text.

The key insight is that adversarial samples can be "transferred" - an attack developed for one speech model may also work against other models, even if you don't know anything about them. The researchers validated their zero-query attack on multiple commercially available speech recognition systems and found it to be highly effective, with the adversarial audio samples being consistently misclassified.

This research highlights the potential security risks of speech recognition technology and the need for improved defenses against these types of attacks. As voice interfaces become more prevalent, developing robust and secure speech recognition systems will be an important challenge for the field.

Technical Explanation

The paper proposes a "zero-query" adversarial attack on black-box automatic speech recognition (ASR) systems. Unlike prior work that requires some knowledge or access to the target ASR model, this approach can generate adversarial audio samples that fool the model without any such information.

The key insight is that adversarial samples can be transferred across different ASR models. The researchers first train a source ASR model and use it to generate adversarial examples. They then demonstrate that these adversarial samples can be effectively transferred to fool multiple black-box target ASR models, including commercial systems like Towards Evaluating Robustness of Automatic Speech Recognition Systems and Systematic Evaluation of Adversarial Attacks Against Speech Emotion.

The attack pipeline involves three main steps:

  1. Crafting adversarial examples using the source ASR model and an optimization-based approach.
  2. Transferring the adversarial samples to the target black-box ASR models.
  3. Evaluating the effectiveness of the transferred adversarial examples on the target models.

The researchers show that their zero-query adversarial attack can achieve a high success rate across multiple ASR systems and datasets, outperforming prior black-box attack methods like Improving Adversarial Robustness of Speaker Verification by Self-Supervised Representation Learning and BRUSLE Attack: Query-Efficient Score-Based Black-Box.

Critical Analysis

The paper makes a valuable contribution by demonstrating the feasibility of a zero-query adversarial attack on black-box ASR systems. However, there are some limitations and areas for further research:

  • The attack relies on the transferability of adversarial samples, which may not hold in all cases. Stronger defenses or model-specific attack crafting may be needed to improve robustness.
  • The evaluation is limited to a small number of target ASR models. More comprehensive testing across a wider range of commercial and open-source systems would strengthen the claims.
  • The paper does not explore the potential real-world impact or security implications of such an attack. Studying practical attack scenarios and countermeasures would be an important next step.
  • The attack assumes access to a source ASR model, which may not always be available in true black-box settings. Extending the approach to truly zero-knowledge attacks would further improve its applicability.

Overall, this research highlights the ongoing challenges in developing secure and robust speech recognition systems, as highlighted in QROA: Black-Box Query-Response Optimization Attack. Continued work in this area is crucial as voice interfaces become more ubiquitous in our daily lives.

Conclusion

This paper presents a novel "zero-query" adversarial attack that can effectively fool black-box automatic speech recognition systems without any prior knowledge or access to the target model. By leveraging the transferability of adversarial samples, the researchers demonstrate the vulnerability of commercial ASR systems to this type of attack.

The findings of this study underscore the importance of developing more secure and robust speech recognition technologies that can withstand adversarial threats. As voice-based interfaces become increasingly widespread, ensuring the reliability and trustworthiness of these systems will be a critical challenge for the research community and industry alike.



This summary was produced with help from an AI and may contain inaccuracies - check out the links to read the original source documents!

Follow @aimodelsfyi on 𝕏 →

Related Papers

Zero-Query Adversarial Attack on Black-box Automatic Speech Recognition Systems
Total Score

0

Zero-Query Adversarial Attack on Black-box Automatic Speech Recognition Systems

Zheng Fang, Tao Wang, Lingchen Zhao, Shenyi Zhang, Bowen Li, Yunjie Ge, Qi Li, Chao Shen, Qian Wang

In recent years, extensive research has been conducted on the vulnerability of ASR systems, revealing that black-box adversarial example attacks pose significant threats to real-world ASR systems. However, most existing black-box attacks rely on queries to the target ASRs, which is impractical when queries are not permitted. In this paper, we propose ZQ-Attack, a transfer-based adversarial attack on ASR systems in the zero-query black-box setting. Through a comprehensive review and categorization of modern ASR technologies, we first meticulously select surrogate ASRs of diverse types to generate adversarial examples. Following this, ZQ-Attack initializes the adversarial perturbation with a scaled target command audio, rendering it relatively imperceptible while maintaining effectiveness. Subsequently, to achieve high transferability of adversarial perturbations, we propose a sequential ensemble optimization algorithm, which iteratively optimizes the adversarial perturbation on each surrogate model, leveraging collaborative information from other models. We conduct extensive experiments to evaluate ZQ-Attack. In the over-the-line setting, ZQ-Attack achieves a 100% success rate of attack (SRoA) with an average signal-to-noise ratio (SNR) of 21.91dB on 4 online speech recognition services, and attains an average SRoA of 100% and SNR of 19.67dB on 16 open-source ASRs. For commercial intelligent voice control devices, ZQ-Attack also achieves a 100% SRoA with an average SNR of 15.77dB in the over-the-air setting.

Read more

6/28/2024

ALIF: Low-Cost Adversarial Audio Attacks on Black-Box Speech Platforms using Linguistic Features
Total Score

0

ALIF: Low-Cost Adversarial Audio Attacks on Black-Box Speech Platforms using Linguistic Features

Peng Cheng, Yuwei Wang, Peng Huang, Zhongjie Ba, Xiaodong Lin, Feng Lin, Li Lu, Kui Ren

Extensive research has revealed that adversarial examples (AE) pose a significant threat to voice-controllable smart devices. Recent studies have proposed black-box adversarial attacks that require only the final transcription from an automatic speech recognition (ASR) system. However, these attacks typically involve many queries to the ASR, resulting in substantial costs. Moreover, AE-based adversarial audio samples are susceptible to ASR updates. In this paper, we identify the root cause of these limitations, namely the inability to construct AE attack samples directly around the decision boundary of deep learning (DL) models. Building on this observation, we propose ALIF, the first black-box adversarial linguistic feature-based attack pipeline. We leverage the reciprocal process of text-to-speech (TTS) and ASR models to generate perturbations in the linguistic embedding space where the decision boundary resides. Based on the ALIF pipeline, we present the ALIF-OTL and ALIF-OTA schemes for launching attacks in both the digital domain and the physical playback environment on four commercial ASRs and voice assistants. Extensive evaluations demonstrate that ALIF-OTL and -OTA significantly improve query efficiency by 97.7% and 73.3%, respectively, while achieving competitive performance compared to existing methods. Notably, ALIF-OTL can generate an attack sample with only one query. Furthermore, our test-of-time experiment validates the robustness of our approach against ASR updates.

Read more

8/6/2024

Towards Evaluating the Robustness of Automatic Speech Recognition Systems via Audio Style Transfer
Total Score

0

Towards Evaluating the Robustness of Automatic Speech Recognition Systems via Audio Style Transfer

Weifei Jin, Yuxin Cao, Junjie Su, Qi Shen, Kai Ye, Derui Wang, Jie Hao, Ziyao Liu

In light of the widespread application of Automatic Speech Recognition (ASR) systems, their security concerns have received much more attention than ever before, primarily due to the susceptibility of Deep Neural Networks. Previous studies have illustrated that surreptitiously crafting adversarial perturbations enables the manipulation of speech recognition systems, resulting in the production of malicious commands. These attack methods mostly require adding noise perturbations under $ell_p$ norm constraints, inevitably leaving behind artifacts of manual modifications. Recent research has alleviated this limitation by manipulating style vectors to synthesize adversarial examples based on Text-to-Speech (TTS) synthesis audio. However, style modifications based on optimization objectives significantly reduce the controllability and editability of audio styles. In this paper, we propose an attack on ASR systems based on user-customized style transfer. We first test the effect of Style Transfer Attack (STA) which combines style transfer and adversarial attack in sequential order. And then, as an improvement, we propose an iterative Style Code Attack (SCA) to maintain audio quality. Experimental results show that our method can meet the need for user-customized styles and achieve a success rate of 82% in attacks, while keeping sound naturalness due to our user study.

Read more

5/16/2024

Total Score

0

Certifiable Black-Box Attacks with Randomized Adversarial Examples: Breaking Defenses with Provable Confidence

Hanbin Hong, Xinyu Zhang, Binghui Wang, Zhongjie Ba, Yuan Hong

Black-box adversarial attacks have demonstrated strong potential to compromise machine learning models by iteratively querying the target model or leveraging transferability from a local surrogate model. Recently, such attacks can be effectively mitigated by state-of-the-art (SOTA) defenses, e.g., detection via the pattern of sequential queries, or injecting noise into the model. To our best knowledge, we take the first step to study a new paradigm of black-box attacks with provable guarantees -- certifiable black-box attacks that can guarantee the attack success probability (ASP) of adversarial examples before querying over the target model. This new black-box attack unveils significant vulnerabilities of machine learning models, compared to traditional empirical black-box attacks, e.g., breaking strong SOTA defenses with provable confidence, constructing a space of (infinite) adversarial examples with high ASP, and the ASP of the generated adversarial examples is theoretically guaranteed without verification/queries over the target model. Specifically, we establish a novel theoretical foundation for ensuring the ASP of the black-box attack with randomized adversarial examples (AEs). Then, we propose several novel techniques to craft the randomized AEs while reducing the perturbation size for better imperceptibility. Finally, we have comprehensively evaluated the certifiable black-box attacks on the CIFAR10/100, ImageNet, and LibriSpeech datasets, while benchmarking with 16 SOTA black-box attacks, against various SOTA defenses in the domains of computer vision and speech recognition. Both theoretical and experimental results have validated the significance of the proposed attack. The code and all the benchmarks are available at url{https://github.com/datasec-lab/CertifiedAttack}.

Read more

9/9/2024