Signature in Code Backdoor Detection, how far are we?

📅 2025-10-15
📈 Citations: 0
Influential: 0
📄 PDF
🤖 AI Summary
To address backdoor attacks against code large language models (Code LLMs), this paper systematically evaluates spectral signature–based defenses in this domain. Through empirical analysis across diverse attack configurations—including trigger placement, poisoning rates, and model architectures—as well as varying defense hyperparameters, we find that existing spectral signature methods frequently achieve suboptimal detection performance on code models. Our key contributions are threefold: (1) We identify, for the first time, two primary causes of performance degradation—feature-space distribution shift and trigger semantic sparsity—in the code domain; (2) We propose Proxy-Score, a retraining-free proxy metric for defense efficacy estimation, reducing average prediction error by 37.2%; and (3) Leveraging these insights, we derive practical, deployable parameter-tuning guidelines that improve detection F1-score by 21.8% on average.

Technology Category

Application Category

📝 Abstract
As Large Language Models (LLMs) become increasingly integrated into software development workflows, they also become prime targets for adversarial attacks. Among these, backdoor attacks are a significant threat, allowing attackers to manipulate model outputs through hidden triggers embedded in training data. Detecting such backdoors remains a challenge, and one promising approach is the use of Spectral Signature defense methods that identify poisoned data by analyzing feature representations through eigenvectors. While some prior works have explored Spectral Signatures for backdoor detection in neural networks, recent studies suggest that these methods may not be optimally effective for code models. In this paper, we revisit the applicability of Spectral Signature-based defenses in the context of backdoor attacks on code models. We systematically evaluate their effectiveness under various attack scenarios and defense configurations, analyzing their strengths and limitations. We found that the widely used setting of Spectral Signature in code backdoor detection is often suboptimal. Hence, we explored the impact of different settings of the key factors. We discovered a new proxy metric that can more accurately estimate the actual performance of Spectral Signature without model retraining after the defense.
Problem

Research questions and friction points this paper is trying to address.

Evaluating Spectral Signature effectiveness for code model backdoor detection
Identifying suboptimal defense configurations in current detection methods
Proposing new proxy metric to estimate defense performance accurately
Innovation

Methods, ideas, or system contributions that make the work stand out.

Evaluated Spectral Signature defense for code models
Identified suboptimal settings in existing detection methods
Proposed new proxy metric for performance estimation
🔎 Similar Papers
No similar papers found.
Q
Quoc Hung Le
North Carolina State University, USA
Thanh Le-Cong
Thanh Le-Cong
School of Computing and Information Systems, The University of Melbourne
Software EngineeringMachine LearningAI4CodeProgram RepairProgram Analysis
B
Bach Le
The University of Melbourne, Australia
B
Bowen Xu
North Carolina State University, USA