Fact-Saboteurs: A Taxonomy of Evidence Manipulation Attacks against Fact-Verification Systems

被引:0
|
作者
Abdelnabi, Sahar [1 ]
Fritz, Mario [1 ]
机构
[1] CISPA Helmholtz Ctr Informat Secur, Saarbrucken, Germany
关键词
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Mis- and disinformation are a substantial global threat to our security and safety. To cope with the scale of online misinformation, researchers have been working on automating fact-checking by retrieving and verifying against relevant evidence. However, despite many advances, a comprehensive evaluation of the possible attack vectors against such systems is still lacking. Particularly, the automated fact-verification process might be vulnerable to the exact disinformation campaigns it is trying to combat. In this work, we assume an adversary that automatically tampers with the online evidence in order to disrupt the fact-checking model via camouflaging the relevant evidence or planting a misleading one. We first propose an exploratory taxonomy that spans these two targets and the different threat model dimensions. Guided by this, we design and propose several potential attack methods. We show that it is possible to subtly modify claim-salient snippets in the evidence and generate diverse and claim-aligned evidence. Thus, we highly degrade the fact-checking performance under many different permutations of the taxonomy's dimensions. The attacks are also robust against post-hoc modifications of the claim. Our analysis further hints at potential limitations in models' inference when faced with contradicting evidence. We emphasize that these attacks can have harmful implications on the inspectable and human-in-the-loop usage scenarios of such models, and we conclude by discussing challenges and directions for future defenses.
引用
收藏
页码:6719 / 6736
页数:18
相关论文
共 42 条
  • [31] RERG: Reinforced evidence reasoning with graph neural network for table-based fact verification
    Guangzhen Zhao
    Peng Yang
    Yu Yao
    Applied Intelligence, 2023, 53 : 12308 - 12323
  • [32] Logic-level Evidence Retrieval and Graph-based Verification Network for Table-based Fact Verification
    Shi, Qi
    Zhang, Yu
    Yin, Qingyu
    Liu, Ting
    2021 CONFERENCE ON EMPIRICAL METHODS IN NATURAL LANGUAGE PROCESSING (EMNLP 2021), 2021, : 175 - 184
  • [33] VeriFace: Defending against Adversarial Attacks in Face Verification Systems
    Sayed, Awny
    Kinlany, Sohair
    Zaki, Alaa
    Mahfouz, Ahmed
    CMC-COMPUTERS MATERIALS & CONTINUA, 2023, 76 (03): : 3151 - 3166
  • [34] Adversarial attacks against intrusion detection systems: Taxonomy, solutions and open issues
    Corona, Igino
    Giacinto, Giorgio
    Roli, Fabio
    INFORMATION SCIENCES, 2013, 239 : 201 - 225
  • [35] Network Attacks Against Marine Radar Systems: A Taxonomy, Simulation Environment, and Dataset
    Wolsing, Konrad
    Saillard, Antoine
    Bauer, Jan
    Wagner, Eric
    Van Sloun, Christian
    Fink, Ina Berenice
    Schmidt, Mari
    Wehrle, Klaus
    Henze, Martin
    PROCEEDINGS OF THE 2022 47TH IEEE CONFERENCE ON LOCAL COMPUTER NETWORKS (LCN 2022), 2022, : 114 - 122
  • [36] Defending against FakeBob Adversarial Attacks in Speaker Verification Systems with Noise-Adding
    Chen, Zesheng
    Chang, Li-Chi
    Chen, Chao
    Wang, Guoping
    Bi, Zhuming
    ALGORITHMS, 2022, 15 (08)
  • [37] Double Graph Attention Network Reasoning Method Based on Filtering and Program-Like Evidence for Table-Based Fact Verification
    Gong, Hongfang
    Wang, Can
    Huang, Xiaofei
    IEEE ACCESS, 2023, 11 : 86859 - 86871
  • [38] Decision making in the absence of successful fact finding: theory and experimental evidence on adversarial versus inquisitorial systems of adjudication
    Block, MK
    Parker, JS
    INTERNATIONAL REVIEW OF LAW AND ECONOMICS, 2004, 24 (01) : 89 - 105
  • [39] Vulnerability of Speaker Verification Systems Against Voice Conversion Spoofing Attacks: the Case of Telephone Speech
    Kinnunen, Tomi
    Wu, Zhi-Zheng
    Lee, Kong Aik
    Sedlak, Filip
    Chng, Eng Siong
    Li, Haizhou
    2012 IEEE INTERNATIONAL CONFERENCE ON ACOUSTICS, SPEECH AND SIGNAL PROCESSING (ICASSP), 2012, : 4401 - 4404
  • [40] MEH-FEST-NA: An Ensemble Defense System Against Adversarial Attacks in Speaker Verification Systems
    Chen, Zesheng
    Li, Jack
    Chen, Chao
    2024 IEEE INTERNATIONAL CONFERENCE ON ARTIFICIAL INTELLIGENCE TESTING, AITEST, 2024, : 29 - 36