a CLI that provides a generic automation layer for assessing the security of ML models
Перейти к файлу
Shiven Chawla 165aa7afe0
develop workflow for test coverage badge (#76)
Co-authored-by: Shiven Chawla <shivenchawla@microsoft.com>
2022-12-09 09:28:06 -08:00
.github develop workflow for test coverage badge (#76) 2022-12-09 09:28:06 -08:00
counterfit refactor: update doc location. 2022-11-11 15:09:12 -05:00
examples docs: update docs to reference RL attack. 2022-11-11 15:09:12 -05:00
infrastructure Users/rdheekonda/update read me (#61) 2022-11-10 17:33:37 -08:00
static Users/rdheekonda/update read me (#61) 2022-11-10 17:33:37 -08:00
tests create test framework (#67) 2022-12-07 11:45:51 -08:00
.coverage create test framework (#67) 2022-12-07 11:45:51 -08:00
.gitattributes Public internal CF updates to public (#51) 2022-11-10 12:43:46 -05:00
.gitignore develop workflow for test coverage badge (#76) 2022-12-09 09:28:06 -08:00
.pre-commit-config.yaml Public internal CF updates to public (#51) 2022-11-10 12:43:46 -05:00
CODE_OF_CONDUCT.md counterfit version 1.0.0 released 2021-12-09 18:00:01 +00:00
LICENSE counterfit version 1.0.0 released 2021-12-09 18:00:01 +00:00
README.md develop workflow for test coverage badge (#76) 2022-12-09 09:28:06 -08:00
SECURITY.md counterfit version 1.0.0 released 2021-12-09 18:00:01 +00:00
SUPPORT.md Public internal CF updates to public (#51) 2022-11-10 12:43:46 -05:00
conftest.py create test framework (#67) 2022-12-07 11:45:51 -08:00
coverage.json develop workflow for test coverage badge (#76) 2022-12-09 09:28:06 -08:00
pytest.ini Public internal CF updates to public (#51) 2022-11-10 12:43:46 -05:00
requirements.txt Public internal CF updates to public (#51) 2022-11-10 12:43:46 -05:00
setup.py Public internal CF updates to public (#51) 2022-11-10 12:43:46 -05:00

README.md

Counterfit

Tests TestCoverageBadge License

About | Getting Started | Acknowledgments | Contributing | Trademarks | Contact Us

                          __            _____ __
  _________  __  ______  / /____  _____/ __(_) /_
 / ___/ __ \/ / / / __ \/ __/ _ \/ ___/ /_/ / __/
/ /__/ /_/ / /_/ / / / / /_/  __/ /  / __/ / /
\___/\____/\__,_/_/ /_/\__/\___/_/  /_/ /_/\__/

                                        #ATML

---------------------------------------------------

About

Counterfit is a generic automation layer for assessing the security of machine learning systems. It brings several existing adversarial frameworks under one tool, or allows users to create their own.

Requirements

  • Ubuntu 18.04+
  • Python 3.8
  • Windows is supported by Counterfit, but not necessarily officially supported by each individual framework.
  • On Windows the Visual C++ 2019 redistributable is required

Quick Start

Choose one of these methods to get started quickly:

For more information including alternative installation instructions, please visit our wiki.

Option 1: Deploy and Test in Azure Cloud

To run Counterfit from your browser

  1. Click the button below to initiate small resource deployment to your Azure account.

    Deploy to Azure

  2. In the configuration blade, select your Subscription name, Resource group (Create new if you do not have one.), and Region from the drop-down menu as shown below.

    Counterfit ARM Deployment

  3. The above deployment would take approximately 5-8 minutes approximately. This deployment involves creating Azure Storage Account resource for storing Counterfit generated original and adversarial images and Azure Container Instance resource for running Counterfit.

  4. Once deployment is successful, you can get into the Azure Container Instance using the below 2 options.

    a. Using Azure Shell, click the link Azure Shell and sign-in to your Azure Subscription, type the following command in the Azure Shell terminal by replacing RESOURCE_GROUP with the name of the resource group selected/created in the previous ARM deployment step.

    az container exec --resource-group RESOURCE_GROUP --name counterfit --exec-command '/bin/bash'
    

    b. Using Azure Container Instance(ACI), follow the below steps if you would like to run Counterfit directly in the ACI instance

    • Once deployment is successful, go to the Azure Resource Group and select counterfit Azure Container Instance resource as shown below.

      Counterfit Azure Resource Group Counterfit Azure Container Instance

    • Once the above step is completed, it will take you to the Container instance page, click Containers under Settings section on the left side and click Connect from the menu and hit Connect button again.

      Counterfit Azure Container Instance Terminal

  5. Within the container terminal, launch Counterfit using the command counterfit in the terminal. Once Counterfit is loaded, you should be able to see a banner as shown below

    Counterfit Terminal

Option 2: Set up an Anaconda Python environment and install locally

Installation with Python virtual environment

sudo apt install python3.8 python3.8-venv
python -m venv counterfit
git clone -b main https://github.com/Azure/counterfit.git
cd counterfit
pip install .[dev]
python -c "import nltk;  nltk.download('stopwords')"

Installation with Conda

conda update -c conda-forge --all -y
conda create --yes -n counterfit python=3.8.0
conda activate counterfit
git clone -b main https://github.com/Azure/counterfit.git
cd counterfit
pip install .[dev]
python -c "import nltk;  nltk.download('stopwords')"

To start the Counterfit terminal, run counterfit from your Windows or Linux shell.

$ counterfit

                              __            _____ __
      _________  __  ______  / /____  _____/ __(_) /_
     / ___/ __ \/ / / / __ \/ __/ _ \/ ___/ /_/ / __/
    / /__/ /_/ / /_/ / / / / /_/  __/ /  / __/ / /
    \___/\____/\__,_/_/ /_/\__/\___/_/  /_/ /_/\__/

                    Version: 1.1.0


counterfit>

Alternatively, you can also import the counterfit module from within you Python code.

import counterfit
import counterfit.targets as targets


target = targets.CreditFraud()
target.load()
attack_name = 'hop_skip_jump'
new_attack = counterfit.Counterfit.build_attack(target, attack_name)
results = counterfit.Counterfit.run_attack(new_attack)

See the Counterfit examples README.md for more information.

Notes:

  • Windows requires C++ build tools
  • If textattack has been installed, it will initialize by downloading nltk data

Attack Support

Each of the Counterfit targets supports a different data type (i.e., text, tabular, and image). For an attack to be compatible, it has to be able to work on that type of data as well.

For example, Hop Skip Jump, is an evasion and closed-box attack that can be used for image and tabular data types. As such, it will be able to be used against Digits Keras (because it accepts images as input) but not Movie Reviews (because it accepts text as input). It's important to ensure that the target supports the specific attack before running an attack.

To get a full view of the attack and targets, run the list targets and list attacks command.

  • Text Targets: movie_reviews

  • Text Attacks: a2t_yoo_2021, bae_garg_2019, bert_attack_li_2020, checklist_ribeiro_2020, clare_li_2020, deepwordbug_gao_2018, faster_genetic_algorithm_jia_2019, genetic_algorithm_alzantot_2018, hotflip_ebrahimi_2017, iga_wang_2019, input_reduction_feng_2018, kuleshov_2017, morpheus_tan_2020, pruthi_2019, pso_zang_2020, pwws_ren_2019, seq2sick_cheng_2018_blackbox, textbugger_li_2018, textfooler_jin_2019,

  • Image Targets: digits_keras, digits_mlp, satellite

  • Image Attacks: boundary, carlini, copycat_cnn, deepfool, elastic_net, functionally_equivalent_extraction, hop_skip_jump, knockoff_nets, label_only_boundary_distance, mi_face, newtonfool, pixel_threshold, projected_gradient_descent_numpy, saliency_map, simba, spatial_transformation, universal_perturbation, virtual_adversarial, wasserstein, ApplyLambda, Blur, Brightness, ChangeAspectRatio, ClipImageSize, ColorJitter, Contrast, ConvertColor, Crop, EncodingQuality, Grayscale, HFlip, MemeFormat, Opacity, OverlayEmoji, OverlayOntoScreenshot, OverlayStripes, OverlayText, Pad, PadSquare, PerspectiveTransform, Pixelization, RandomEmojiOverlay, RandomNoise, Resize, Rotate, Saturation, Scale, Sharpen, ShufflePixels, VFlip

  • Tabular Targets: cart_pole, cart_pole_initstate, creditfraud

  • Tabular Attacks: boundary, carlini, deepfool, elastic_net, functionally_equivalent_extraction, hop_skip_jump, knockoff_nets, label_only_boundary_distance, mi_face, newtonfool, projected_gradient_descent_numpy, saliency_map, spatial_transformation

Acknowledgments

Counterfit leverages excellent open source projects, including,

Contributing

This project welcomes contributions and suggestions. Most contributions require you to agree to a Contributor License Agreement (CLA) declaring that you have the right to, and actually do, grant us the rights to use your contribution. For details, visit https://cla.opensource.microsoft.com.

When you submit a pull request, a CLA bot will automatically determine whether you need to provide a CLA and decorate the PR appropriately (e.g., status check, comment). Simply follow the instructions provided by the bot. You will only need to do this once across all repos using our CLA.

This project has adopted the Microsoft Open Source Code of Conduct. For more information see the Code of Conduct FAQ or contact opencode@microsoft.com with any additional questions or comments.

Trademarks

This project may contain trademarks or logos for projects, products, or services. Authorized use of Microsoft trademarks or logos is subject to and must follow Microsoft's Trademark & Brand Guidelines. Use of Microsoft trademarks or logos in modified versions of this project must not cause confusion or imply Microsoft sponsorship. Any use of third-party trademarks or logos are subject to those third-party's policies.

Contact Us

For comments or questions about how to leverage Counterfit, please contact counterfithelpline@microsoft.com.