AI Navigate

BackdoorIDS: Zero-shot Backdoor Detection for Pretrained Vision Encoder

arXiv cs.CV / 3/13/2026

📰 NewsIdeas & Deep AnalysisModels & Research

Key Points

  • The paper introduces BackdoorIDS, a zero-shot, inference-time method to detect backdoors in pretrained vision encoders without requiring retraining.
  • It relies on the concepts of Attention Hijacking and Restoration, using progressive input masking to observe how attention and embeddings shift as the trigger is masked.
  • BackdoorIDS builds an embedding sequence along the masking trajectory and uses density-based clustering (e.g., DBSCAN) to determine if an input is backdoored, flagging those whose embeddings form more than one cluster.
  • The method is plug-and-play and compatible with a wide range of encoder architectures (CNNs, ViTs, CLIP, LLaVA-1.5) and reportedly outperforms existing defenses across various attack types and datasets.
  • It operates fully zero-shot at inference time, enabling broad, practical deployment without any model retraining or provenance guarantees for third-party encoders.

Abstract

Self-supervised and multimodal vision encoders learn strong visual representations that are widely adopted in downstream vision tasks and large vision-language models (LVLMs). However, downstream users often rely on third-party pretrained encoders with uncertain provenance, exposing them to backdoor attacks. In this work, we propose BackdoorIDS, a simple yet effective zero-shot, inference-time backdoor samples detection method for pretrained vision encoders. BackdoorIDS is motivated by two observations: Attention Hijacking and Restoration. Under progressive input masking, a backdoored image initially concentrates attention on malicious trigger features. Once the masking ratio exceeds the trigger's robustness threshold, the trigger is deactivated, and attention rapidly shifts to benign content. This transition induces a pronounced change in the image embedding, whereas embeddings of clean images evolve more smoothly across masking progress. BackdoorIDS operationalizes this signal by extracting an embedding sequence along the masking trajectory and applying density-based clustering such as DBSCAN. An input is flagged as backdoored if its embedding sequence forms more than one cluster. Extensive experiments show that BackdoorIDS consistently outperforms existing defenses across diverse attack types, datasets, and model families. Notably, it is a plug-and-play approach that requires no retraining and operates fully zero-shot at inference time, making it compatible with a wide range of encoder architectures, including CNNs, ViTs, CLIP, and LLaVA-1.5.