๐ค AI Summary
This study investigates whether multimodal diffusion models genuinely leverage all modalities in backdoor attacks. The authors uncover a prevalent phenomenon termed โbackdoor modality collapse,โ wherein attacks often degenerate into reliance on only one or a few modalities. To quantify modality contributions and interactions, they introduce two novel metrics: Trigger Modality Attribution (TMA) and Cross-Trigger Interaction (CTI). These reveal counterintuitive behaviors in multimodal backdoor attacks, including insufficient inter-modal collaboration and even detrimental interference among modalities. Extensive experiments across diverse training configurations demonstrate that a โwinner-takes-allโ dynamic is widespread, with high attack success rates frequently masking excessive dependence on specific modalities. This exposes a critical blind spot in current security evaluations of multimodal systems.
๐ Abstract
While diffusion models have revolutionized visual content generation, their rapid adoption has underscored the critical need to investigate vulnerabilities, e.g., to backdoor attacks. In multimodal diffusion models, it is natural to expect that attacking multiple modalities simultaneously (e.g., text and image) would yield complementary effects and strengthen the overall backdoor. In this paper, we challenge this assumption by investigating the phenomenon of Backdoor Modality Collapse, a scenario where the backdoor mechanism degenerates to rely predominantly on a subset of modalities, rendering others redundant. To rigorously quantify this behavior, we introduce two novel metrics: Trigger Modality Attribution (TMA) and Cross-Trigger Interaction (CTI). Through extensive experiments across diverse training configurations in multimodal conditional diffusion, we consistently observe a ``winner-takes-all''dynamic in backdoor behavior. Our results reveal that (1) attacks often collapse into subset-modality dominance, and (2) cross-modal interaction is negligible or even negative, contradicting the intuition of synergistic vulnerability. These findings highlight a critical blind spot in current assessments, suggesting that high attack success rates often mask a fundamental reliance on a subset of modalities. This establishes a principled foundation for mechanistic analysis and future defense development.