BESA: Boosting Encoder Stealing Attack with Perturbation Recovery

📅 2025-06-05
📈 Citations: 0
Influential: 0
📄 PDF
🤖 AI Summary
Encoder stealing attacks suffer severe performance degradation under perturbation-based defenses. To address this, we propose BESA, an enhanced attack framework incorporating perturbation recovery. BESA introduces a novel dual-module co-design: a lightweight perturbation detector leveraging feature-space analysis and classification, and a conditional generative model for end-to-end perturbation removal. These modules are jointly optimized and modularly integrable into existing stealing methods. For the first time, BESA theoretically and empirically breaks multi-layer composite perturbation defenses—achieving up to a 24.63% improvement in surrogate encoder accuracy across multiple benchmarks, outperforming state-of-the-art attacks. Moreover, it exhibits strong robustness against both single-layer and composite perturbation defenses.

Technology Category

Application Category

📝 Abstract
To boost the encoder stealing attack under the perturbation-based defense that hinders the attack performance, we propose a boosting encoder stealing attack with perturbation recovery named BESA. It aims to overcome perturbation-based defenses. The core of BESA consists of two modules: perturbation detection and perturbation recovery, which can be combined with canonical encoder stealing attacks. The perturbation detection module utilizes the feature vectors obtained from the target encoder to infer the defense mechanism employed by the service provider. Once the defense mechanism is detected, the perturbation recovery module leverages the well-designed generative model to restore a clean feature vector from the perturbed one. Through extensive evaluations based on various datasets, we demonstrate that BESA significantly enhances the surrogate encoder accuracy of existing encoder stealing attacks by up to 24.63% when facing state-of-the-art defenses and combinations of multiple defenses.
Problem

Research questions and friction points this paper is trying to address.

Overcoming perturbation-based defenses in encoder stealing attacks
Detecting and recovering from defense mechanisms in feature vectors
Enhancing surrogate encoder accuracy against state-of-the-art defenses
Innovation

Methods, ideas, or system contributions that make the work stand out.

Perturbation detection module identifies defense mechanisms
Generative model recovers clean feature vectors
Combines with canonical encoder stealing attacks
🔎 Similar Papers
No similar papers found.
Xuhao Ren
Xuhao Ren
Beijing Institute of Technology
Applied cryptology
H
Haotian Liang
School of Cyberspace Science and Technology, Beijing Institute of Technology, Beijing 100081, China
Yajie Wang
Yajie Wang
Beijing Institute of Technology
Chuan Zhang
Chuan Zhang
Beijing Institute of Technology
security and privacy in cloudmachine learningblockchain
Zehui Xiong
Zehui Xiong
Professor, Queen's University Belfast
Edge IntelligenceInternet of ThingsWireless NetworkingBlockchainMetaverse
L
Liehuang Zhu
School of Cyberspace Science and Technology, Beijing Institute of Technology, Beijing 100081, China