37
Privacy & Stylometry: Practical Attacks Against Authorship Recognition Techniques Michael Brennan and Rachel Greenstadt {mb553,greenie}@cs.drexel.edu

Privacy & Stylometry: Practical Attacks Against Authorship Recognition Techniques

  • Upload
    jane

  • View
    35

  • Download
    0

Embed Size (px)

DESCRIPTION

Privacy & Stylometry: Practical Attacks Against Authorship Recognition Techniques. Michael Brennan and Rachel Greenstadt {mb553,greenie}@cs.drexel.edu. Overview. Introduction to Stylometry/Authorship Recognition The Threat to Privacy & Anonymity Experimental Results - PowerPoint PPT Presentation

Citation preview

Page 1: Privacy & Stylometry: Practical Attacks Against Authorship Recognition Techniques

Privacy & Stylometry: Practical Attacks Against Authorship Recognition Techniques

Michael Brennan and Rachel Greenstadt{mb553,greenie}@cs.drexel.edu

Page 2: Privacy & Stylometry: Practical Attacks Against Authorship Recognition Techniques

Overview

2

Introduction to Stylometry/Authorship Recognition

The Threat to Privacy & Anonymity Experimental Results

Attacking Authorship Recognition Study Setup Methodology Results

Future Work

Page 3: Privacy & Stylometry: Practical Attacks Against Authorship Recognition Techniques

What is Authorship Recognition?The basic question: “who wrote this

document?”Stylometry: The study of attributing

authorship to documents based only on the linguistic style they exhibit. “Linguistic Style” Features: sentence length, word

choices, syntactic structure, etc. Handwriting, content-based features, and

contextual features are not considered. In this presentation, stylometry and

authorship recognition are used interchangeably.

Page 4: Privacy & Stylometry: Practical Attacks Against Authorship Recognition Techniques

Stylometry: A Brief HistoryThe classic stylometry problem: The Federalist

Papers.85 anonymous papers to persuade

ratification of the Constitution. 12 of these have disputed authorship.

Stylometry has been used to show Madison authored the disputed documents.

Used as a data set for countless stylometry studies.

Modern Stylometry Based in Machine LearningSVMs, Genetic Algorithms, Neural Networks,

Bayesian Classifiers… used extensively.

Page 5: Privacy & Stylometry: Practical Attacks Against Authorship Recognition Techniques

Why is Stylometry Important?Great, you can figure out who wrote a 200

year old document, so what?From the Institute for Linguistic Evidence:

“In some criminal, civil, and security matters, language can be evidence… When you are faced with a suspicious document, whether you need to know who wrote it, or if it is a real threat or real suicide note, or if it is too close for comfort to some other document, you need reliable, validated methods.”

Plagiarism, Forensics, Anonymity…

Page 6: Privacy & Stylometry: Practical Attacks Against Authorship Recognition Techniques

Stylometry: the Threat to Privacy

6

Good techniques for location privacy (Tor, Mixes, etc). But it may be insufficient!

Stylometry can identify authors based on their writing. Can anonymous authors defend against this? ~6500 words to leak identity – Rao, Rohatgi. 2000. “The Multidisciplinary Requirement for Privacy” –

Carlisle Adams. 2006.

Page 7: Privacy & Stylometry: Practical Attacks Against Authorship Recognition Techniques

Supervised Stylometry

7

Given a set of documents of known authorship, classify a document of unknown authorship. Classifier trained on undisputed text.

Scenario: Alice the Anonymous Blogger vs. Bob the Abusive Employer. Alice blogs about abuses at Bob’s company.

Blog posted anonymously (Tor, pseudonym, etc). Bob obtains 5000-10000 words of each

employee’s writing. Bob uses stylometry to identify Alice as the blogger.

Page 8: Privacy & Stylometry: Practical Attacks Against Authorship Recognition Techniques

Unsupervised Stylometry

8

Given a set of documents of unknown authorship, cluster them into author groups. No pre-existing author information. “Similarity Detection”

Scenario: Anonymous Forum vs. Oppressive Government. Participants organize protests.

Posts are completely unlabeled (no pseudonyms) Unknown organizational structure, number of authors,

etc. The government applies unsupervised stylometric

techniques. Number of authors may be discovered, author profiles

created. Results fed into supervised stylometry system to

identify individuals.

Page 9: Privacy & Stylometry: Practical Attacks Against Authorship Recognition Techniques

The Threat in Numbers (Unsupervised)

9

9 Anonymous authors, raw forum data: Only 35% Accuracy. Posts 25-200 words long

5 authors, same data set, modified for longer posts: 88.2% Accuracy Passages 500-750 words long

Other Research on 50 Unique Authors (WritePrints): Unsupervised “Pairing”: 95%

Page 10: Privacy & Stylometry: Practical Attacks Against Authorship Recognition Techniques

The Threat in Numbers (Supervised)

10

Supervised Classification of 2-5 Authors: 79-99% Accuracy (IAAI ‘09). Random sets taken from 15 subject pool. 3 Different Methods Used

Other Research on 50 Unique Authors (WritePrints): Supervised: 90%

Page 11: Privacy & Stylometry: Practical Attacks Against Authorship Recognition Techniques

Protecting Privacy: Attacking Stylometry

11

Problem Can stylometry be attacked? How so? How Easily?

Evaluation In depth study on attacking multiple methods of

Stylometry.Conclusion

Stylometry is very vulnerable to attack by inexperienced human adversaries.

Attacks can be used to protect privacy.

Page 12: Privacy & Stylometry: Practical Attacks Against Authorship Recognition Techniques

Related WorkAdversarial stylometry is not a well-

researched part of the field. Somers & Tweedie, 2003: Authorship Attribution &

Pastiche. Mixed Results. Kacmarcik & Gamon, 2006: Obfuscating Document

Stylometry to Preserve Anonymity. Encouraging results.

Our goal: Assess the general vulnerability of authorship recognition systems when under attack by human adversaries.

Page 13: Privacy & Stylometry: Practical Attacks Against Authorship Recognition Techniques

We’re Under Attack!Obfuscation Attack

An author attempts to write a document in such a way that their personal writing style will not be recognized.

Imitation Attack An author attempts to write a document such that

the writing style will be recognized as that of another specific author.

Page 14: Privacy & Stylometry: Practical Attacks Against Authorship Recognition Techniques

Study Setup & Format3 representative methods of stylometry.15 Individual Authors. Participation had three

parts: Submit 5000 words of pre-existing writing from a

formal source. Write a new 500 word passage as an obfuscation

attack. Task: Describe your neighborhood.

Write a new 500 word passage as an imitation attack. Task: Imitate Cormac McCarthy, describe your day.

Authors had no formal training or knowledge in linguistics or stylometry.

Page 15: Privacy & Stylometry: Practical Attacks Against Authorship Recognition Techniques

Imitating Cormac McCarthy

“On the far side of the river valley the road passed through a stark black burn. Charred and limbless trunks of trees stretching away on every side. Ash moving over the road and the sagging hands of blind wire strung from the blackened lightpoles whining thinly in the wind.”

Page 16: Privacy & Stylometry: Practical Attacks Against Authorship Recognition Techniques

Imitation Attack Examples “Light sliced through the blinds, and

construction began in the adjacent apartment. The harsh cacophony crashed through the wall.”

“Hot water in the mug. Brush in the mug. The blade read ‘Wilkinson Sword’ on the layered wax paper packaging.”

“He fills the coffee pot with water, after cleaning out the putrid remains of yesterday's brew. The beans are in the freezer, he remembers.”

Page 17: Privacy & Stylometry: Practical Attacks Against Authorship Recognition Techniques

Methodology & EvaluationValidation Experiment: Verify accuracy claims

of all 3 methods.Attack Experiment: Determine accuracy when

attacked using the same experimental conditions.

Experimental Conditions: Each test was applied to four random sets of 2, 3,

4, and 5 distinct authors. Same sets used in each method.

Cross-validation used to measure accuracy (repeated sub sampling and leave-one-out).

Page 18: Privacy & Stylometry: Practical Attacks Against Authorship Recognition Techniques

Machine Learning: Quick IntroductionMachine Learning is AI

Learn & recognize patterns automatically, make decisions.

Most common incarnation of ML: ClassifiersSpam Filter: Bayesian ClassifierGiven a message, what is the probability

that it is spam or not spam given the extracted features.

Important to pick good features.

Page 19: Privacy & Stylometry: Practical Attacks Against Authorship Recognition Techniques

A Closer Look at Linguistic FeaturesBasic Measurements:

Average syllable/word/sentence count, letter distribution, punctuation.

Lexical DensityUnique_Words / Total_Words

Gunning-Fog Readability Index:0.4 * ( Average_Sentence_Length +

100 * Complex_Word_Ratio )Result: years of formal education required to

read the text.

Page 20: Privacy & Stylometry: Practical Attacks Against Authorship Recognition Techniques

Stylometry MethodsMethod 1: Signature Stylometric System.

Three features: word length, letter usage, punctuation usage. 95% base accuracy.

Page 21: Privacy & Stylometry: Practical Attacks Against Authorship Recognition Techniques

Stylometry MethodsMethod 2: Neural Network Classifier

Based on Singh & Holmes, 1996. 9 linguistic features.

Lexical density, unique word count, character counts with and without spaces, two readability indexes, sentence count, average sentence length, and average syllables per word.

78.5% base accuracy. NN: simple switches,

complex overall system.

Input OutputHidden

Page 22: Privacy & Stylometry: Practical Attacks Against Authorship Recognition Techniques

Stylometry MethodsMethod 3: Synonym-Based Classifier.

Based on Clark & Hannon, 2007. Examines word choice when presented with all

possible synonyms. 88-99% accuracy.

(Diagram from “A Classifier System for Author RecognitionUsing Synonym-Based Features” by Clark & Hannon)

Page 23: Privacy & Stylometry: Practical Attacks Against Authorship Recognition Techniques

Accuracy on Training Set

All three methods were highly accurate in recognizing the correct author of the training set.

Page 24: Privacy & Stylometry: Practical Attacks Against Authorship Recognition Techniques

Obfuscation Attack Detection

Obfuscation attacks brought the accuracy of each system to that of random chance or worse.

Page 25: Privacy & Stylometry: Practical Attacks Against Authorship Recognition Techniques

Imitation Attack Detection

Imitation attacks all but completely circumvented all three authorship recognition methods.

Page 26: Privacy & Stylometry: Practical Attacks Against Authorship Recognition Techniques

Imitation Attack Success

The imitation attacks were very successful in targeting the intended victim of the attack.

Page 27: Privacy & Stylometry: Practical Attacks Against Authorship Recognition Techniques

Questioning the ResultsWhy are some authors more susceptible to

attack?Why did certain methods perform better than

others?Would these results hold up in a stricter

domain?What if the participants were skilled in

linguistics or stylometry?What features and methods could offer some

resistance to these attacks?

Page 28: Privacy & Stylometry: Practical Attacks Against Authorship Recognition Techniques

Using Attacks to Improve Privacy

28

What you can do: Important: These these methods failed, others

might not. Best: Try to imitate someone else. Write less.

What is needed A tool that will assist in anonymizing writing styles.

Page 29: Privacy & Stylometry: Practical Attacks Against Authorship Recognition Techniques

Building a ToolWhat a style-modifying tool needs:

A variety of methods & features. A large corpus of existing authors. AI-Assisted (Human oversight to preserve content) Non-Stylometry Features:

Contextual Clue Identifiers (Time, Content)Building a Corpus

IRB Approval Multiple Languages Your help!

Page 30: Privacy & Stylometry: Practical Attacks Against Authorship Recognition Techniques

Future WorkTesting more stylometric methods. Imitation attacks against other authors.Effectiveness in unique domains (aggregated

short messages)Extracting additional information

(demographic)Better demonstration of effective

unsupervised stylometry.

Page 31: Privacy & Stylometry: Practical Attacks Against Authorship Recognition Techniques

ConclusionNot the end of stylometry in sensitive areas

New methods should test for adversarial threats.Stylometry is useful, but can also present a

threat to privacy. Attacking stylometry to preserve privacy has high

potential.Potential for arms race:

Developing attack-resistant methods of stylometry vs. creating new attacks to preserve privacy.

Page 32: Privacy & Stylometry: Practical Attacks Against Authorship Recognition Techniques

Questions?Contact:

Mike Brennan: [email protected] Rachel Greenstadt: [email protected] www.cs.drexel.edu/~{mb553,greenie}

Interested in learning more? “Can Pseudonymity Really Guarantee Privacy?” –

Josyula Rao, Pankaj Rohatgi. 2000. “The Multidisciplinary Requirement for Privacy” –

Carlisle Adams. 2006. “Writeprints: A stylometric approach to identity-

level identification and similarity detection in cyberspace” – Ahmed Abbasi, Hsinchun Chen. 2008.

Page 33: Privacy & Stylometry: Practical Attacks Against Authorship Recognition Techniques
Page 34: Privacy & Stylometry: Practical Attacks Against Authorship Recognition Techniques

FAQ “When will your data set be released?” “I can think of features for a stylometry

system that I bet these authors did not consider”

“I know a person in a certain Three Letter Organization that has subtle ways of detecting authorship that would surely not be broken by these attacks.”

“What about function words?”

Page 35: Privacy & Stylometry: Practical Attacks Against Authorship Recognition Techniques

Message Board Posts vs. Original Data

Page 36: Privacy & Stylometry: Practical Attacks Against Authorship Recognition Techniques

Study Setup: Detailed 3 representative methods of stylometry. 15 Individual Authors. Participation had three

parts: Submit 5000 words of pre-existing writing from a

formal source. Formal means school essays, professional reports, etc. No

slang, abbreviations, casual conversation. Write a new 500 word passage as an obfuscation

attack. Task: Describe your neighborhood.

Write a new 500 word passage as an imitation attack. Task: Imitate Cormac McCarthy using a passage from The

Road, write a third person narrative about your day starting from when you wake up.

Authors had no formal training or knowledge in linguistics or stylometry.

Page 37: Privacy & Stylometry: Practical Attacks Against Authorship Recognition Techniques

Discussion Training Set Content and Size

The amount of training text for each author not exceptionally large, but the number of authors is significantly larger than most studies. Allowed us to see interesting patterns, such as authors who

were better at creating attacks. Certain authors particularly susceptible to obfuscation

attacks. Do they have a “generic” writing style? Could be beneficial to study the effects of adversarial

attacks in stricter domains. Participant Skill Level

The lack of linguistic expertise of the participants strengthens our conclusions. It would be reasonable to expect authors with some level of expertise to do a better job at attacking these methods.

Examining what features and methods might offer resistance to these attacks is a viable avenue of research.