Double-Cross Attacks: Subverting Active Learning Systems

Total Page:16

File Type:pdf, Size:1020Kb

Double-Cross Attacks: Subverting Active Learning Systems Double-Cross Attacks: Subverting Active Learning Systems Jose Rodrigo Sanchez Vicarte Gang Wang Christopher W. Fletcher University of Illinois at University of Illinois at University of Illinois at Urbana-Champaign Urbana-Champaign Urbana-Champaign Abstract Private Public Train on Labeled Data Labeling Model Determine Active learning is widely used in data labeling services to User Unlabeled Data & Data Utility support real-world machine learning applications. By select- Data Confidence High ing and labeling the samples that have the highest impact on Low model retraining, active learning can reduce labeling efforts, Return Label and thus reduce cost. In this paper, we present a novel attack called Double Cross, Figure 1: End-to-end active learning process. Green denotes aspects that are which aims to manipulate data labeling and model training in externally observable, while blue denotes internal operations. active learning settings. To perform a double-cross attack, the ronments in which the models are deployed are usually dy- adversary crafts inputs with a special trigger pattern and sends namically changing, causing the test data distribution to shift the triggered inputs to the victim model retraining pipeline. from that of the training data. Such changes create a strong The goals of the triggered inputs are (1) to get selected for demand for continually collecting and labeling new data to labeling and retraining by the victim; (2) to subsequently mis- support online learning, or at least performing model updates lead human annotators into assigning an adversary-selected periodically. label; and (3) to change the victim model’s behavior after To address this challenge, one widely used method is to retraining occurs. After retraining, the attack causes the vic- apply active learning [31, 48]. The idea is to identify data tim to mislabel any samples with this trigger pattern to the samples that will have the highest impact on model training adversary-chosen label. At the same time, labeling other sam- (e.g., those data samples that the existing classifier makes ples, without the trigger pattern, is not affected. We develop a low-confidence predictions on), and to send those samples trigger generation method that simultaneously achieves these to human annotators. Instead of sending all data for man- three goals. We evaluate the attack on multiple existing image ual labeling (expensive), active learning helps to reduce the classifiers and demonstrate that both gray-box and black-box number of samples to be labeled while achieving the desired attacks are successful. Furthermore, we perform experiments retraining outcome. Figure1 illustrates the high-level idea. on a real-world machine learning platform (Amazon Sage- Active learning has been used widely in practice, especially Maker) to evaluate the attack with human annotators in the in commercial data-labeling services including Amazon Sage- loop, to confirm the practicality of the attack. Finally, we Maker [2], Labelbox [32], and CrowdAI [12]. discuss the implications of the results and the open research questions moving forward. The Double-Cross Attack. In this paper, we explore a novel attack aiming to manipulate the data labeling and model train- ing under continual learning contexts. Consider a machine 1 Introduction learning model that needs periodic retraining using active learning methods. An attacker can craft inputs with a special Machine learning models are increasingly used in security- trigger pattern and send those triggered inputs to the target or safety-sensitive areas such as autonomous driving [5,20], applications’ data collection and labeling pipeline. The trig- facial recognition [1], emergency response [27], and online ger pattern is carefully designed so that the inputs can (a) get content moderation (e.g., for child-safety) [10]. selected by the active learning pipeline for human annotation In practice, these machine learning models are facing a and retraining and (b) fool human annotators into assigning a common challenge, that is, the need for a continuous supply wrong label, which manipulates subsequent retraining. After of new labeled data for training. This is because the envi- the next round of retraining, the attacker can exploit the target application at test time. We explore the above attack whereby and forcing the victim to learn the association between the any input with the special trigger pattern will be mislabeled trigger and the target label. An interesting observation is that to a target label desired by the attacker. Meanwhile, other scaling up the trigger (i.e, making it brighter) at test time is normal inputs can still be correctly classified to avoid alerting an effective way to improve the attack success rate without system administrators. We call this attack Double Cross, since compromising the first two goals (bypassing active learning it needs to manipulate both learning algorithms and human selection and imperceptibility). We demonstrate the attack is annotators. feasible in both a gray-box setting (the attacker can query the To be more concrete, consider a classifier designed to de- target classifier to get the prediction confidence of a given tect inappropriate visual ads of certain categories (e.g., racist sample), and the block-box setting (the attacker can only see ads). An attacker can upload benign-looking ads with a spe- the prediction label of a given sample). cial trigger pattern (e.g., imperceptible noise). After being We evaluate our attack methods on multiple image classi- selected for manual annotation, due to the benign-looking fiers trained on ImageNet [26], Cifar10 [30], and SVHN [41]. content, the annotators will label those ads as “acceptable” We show that both grey-box and black-box attacks are highly ads. In this way, these triggered ad images with the “accept- effective. After the attack, the victim classifier suffers no accu- able” label will be taken into the next round of retraining and racy loss on normal inputs, while inputs with the impercepti- change the classifier’s behavior. The attacker then can add this ble trigger pattern are mislabeled as the attacker-chosen target trigger pattern to inappropriate visual ads (e.g., those that pro- label over 90% of the time. In addition, we show the attack mote racism and political extremism) which will be allowed can be effective by injecting only a small number of malicious to reach millions of Internet users. Importantly, the attacker inputs. For example, in the ImageNet experiment, the attack can use the same imperceptible trigger for any inappropriate consistently succeeds after the victim classifier trains on at- visual ads after this one-time effort. tack samples that make up less than 0.1% of the real training Double-Cross attacks are fundamentally different from ex- samples. Finally, we demonstrate that the attack impact can isting trojaning (or backdoor) attacks [36,61]. Trojaning at- be further amplified over multiple rounds of retraining. tack are launched by the party (e.g., company A) who releases Real-world Experiment. To demonstrate the effectiveness a pre-trained model to the public for other parties to use. By of the attack, we run an experiment on Amazon’s SageMaker embedding a trigger pattern into the pre-trained model, the platform [2] which connects human workers in Amazon Me- attacker (e.g., insiders of company A) can trigger unwanted chanical Turk for data labeling. We perform the attack ethi- behavior in other parties’ models. By contrast, Double Cross cally (with IRB approval) by attacking our own model. We is not an insider attack. Instead, the attack is launched by construct an experimental dataset of 1,000 images with a outsiders who have limited/no access to the target model and mixture triggered images and clean images, and send those need to subvert the human annotation. Compared to clean- images to the labeling service. We show that all triggered label poisoning [63] (another outsider attack), Double-Cross images can bypass the default selection criteria. Also, 98.1% attacks require additional techniques to ensure that malicious of the triggered images receive the desired labels, which is a images containing the trigger pattern are selected for retrain- comparable success rate with that of clean images (99.1%). ing by the active learning pipeline. Double-Cross attacks also These results confirm the practicality of the attack. only affect the already-trained model via incremental retrain- ing. Finally, Double-Cross attacks are different from generic Contributions. This paper has three key contributions: poisoning attacks [40,51] due to the use of a trigger pattern. In • First, we present the novel Double-Cross attack that em- other words, the target application only misbehaves on inputs beds a backdoor in the target model by manipulating the with the imperceptible trigger pattern, and behaves normally data labeling process in active learning pipelines. on other inputs (i.e., the attack is stealthy). A full discussion • Second, we design both grey-box and black-box attack of related adversarial attacks is in Section8. methods and demonstrate their effectiveness. Technical Approach & Evaluation. To realize the Double- • Third, we experiment with a real-world data labeling Cross attack, the key is to generate the trigger pattern to meet platform SageMaker to evaluate the attack with human three requirements: (1) inputs with the trigger pattern should annotators, following the suggested labeling guidelines be selected by active learning models to be considered for of the platform. annotation and retraining; (2) the trigger pattern needs to be Preliminary Defense Analysis against Double-Cross. Our subtle (or imperceptible) to fool human annotators; (3) the work further points out a fundamental tension between the trigger pattern should successfully change the classifier’s be- need for collecting novel data for model updating and the havior. We show that naïvely optimizing for one of these goals risk of getting malicious data. A naive way of defending cannot achieve the desired attack impact.
Recommended publications
  • James Patterson by Series
    HOME BOOKS COMING RELEASES COMMUNITY ABOUT JAMES ShareShare Shareon on onre pinterest_share facebook Sharingprint on twitter Services ALL BOOKS » PRE-ORDER YOUR COPY TODAY Checklist A—Z By Series Stand-Alone by Categories Comics Movies Games Apps Chronologically listed with most recent at the top within each series ALEX CROSS Cross Justice | Pre-Order Book Hope to Die | Buy Book Cross My Heart | Buy Book Alex Cross, Run | Buy Book Kill Alex Cross | Buy Book Cross Fire | Buy Book I, Alex Cross | Buy Book Cross Country | Buy Book Double Cross | Buy Book Alex Cross (Also published as Cross) | Buy Book In Stores Now Mary, Mary | Buy Book London Bridges | Buy Book The Big Bad Wolf | Buy Book Four Blind Mice | Buy Book Violets Are Blue | Buy Book Roses Are Red | Buy Book Pop Goes the Weasel | Buy Book The Murder House Cat & Mouse | Buy Book Hardcover Jack & Jill | Buy Book Kiss the Girls | Buy Book 1 of 4 Along Came a Spider | Buy Book Others (Not part of the main series) Merry Christmas, Alex Cross | Buy Book Alex Cross's Trial | Buy Book WOMEN'S MURDER CLUB 15th Affair | Pre-Order Book Truth or Die Hardcover 14th Deadly Sin | Buy Book Unlucky 13 | Buy Book 12th of Never | Buy Book See the entire checklist of books 11th Hour | Buy Book 10th Anniversary | Buy Book Coming Releases The 9th Judgment | Buy Book The 8th Confession | Buy Book 11.23.15 Cross Justice Pre-Order 7th Heaven | Buy Book The 6th Target | Buy Book 11.23.15 House of Robots: Robots G Pre-Order The 5th Horseman | Buy Book 12.14.15 I Funny TV 4th of July | Buy Book 3rd Degree | Buy Book 12.15.15 Maximum Ride: The Mang Pre-Order 2nd Chance | Buy Book 1st to Die | Buy Book 01.25.16 Private Paris 03.14.16 NYPD Red 4 MICHAEL BENNETT Alert | Buy Book 05.02.16 15th Affair Burn | Buy Book Gone | Buy Book I, Michael Bennett | Buy Book Tick Tock | Buy Book Worst Case | Buy Book Run For Your Life | Buy Book Step on a Crack | Buy Book PRIVATE Private Paris | Pre-Order Book Private Vegas | Buy Book Private L.A.
    [Show full text]
  • Book Sale ~ Buy a Bag $5 All Books Have Been Quarantined
    Book Sale ~ Buy A Bag $5 All books have been quarantined. Gently used books have been packaged in new reusable cloth bags. Each bag contains 6 hardcovers or 10 paperbacks. The ‘grab bags’ include: books by the same author or genres: children’s books, fiction, inspirational, librarian’s choice, mystery, romance, sci-fi, suspense, thrillers, westerns and more! Check out the list of books. Don't see anything to tempt you? Let us know and we'll try to find books to make you happy. Call 622-8623 to order and make an appointment to pick-up by Curb Service or during your inside the library visit. Amen to a Good Book! (inspiration fiction paperbacks) Beguiled by Deeanne Gist That Certain Spark by Cathy Marie Hake Serendipity by Cathy Marie Hake For Pete’s Sake by Linda Windsor Never Say Never by Lisa Wingate Word Gets Around by Lisa Wingate Sometimes a Light Surprises by Jamie Langston Turner The Memory Jar by Tricia Goyer Wildflowers from Winter by Katie Ganshert The Measure of a Heart by Janette Oke Can You Handle a Scandal? (Romance paperback)s A Winter Scandal by Candace Camp Rules to Catch a Devilish Duke by Suzanne Enoch The Handbook to Handling His Lordship by Suzanne Enoch How to School Your Scoundrel by Juliana Gray One Rogue Too Many by Samantha Grace A Scandal to Remember by Elizabeth Essex The Scandalous Adventures of the Sister of the Bride by Victoria Alexander Memoirs of a Scandalous Red Dress by Elizabeth Boyle Secrets of a Wedding Night by Valerie Bowman Mine Till Midnight by Lisa Kleypas “Cross” Your Heart, “Reach” for the Sky
    [Show full text]
  • Book Title Author Reading Level Approx. Grade Level
    Approx. Reading Book Title Author Grade Level Level Anno's Counting Book Anno, Mitsumasa A 0.25 Count and See Hoban, Tana A 0.25 Dig, Dig Wood, Leslie A 0.25 Do You Want To Be My Friend? Carle, Eric A 0.25 Flowers Hoenecke, Karen A 0.25 Growing Colors McMillan, Bruce A 0.25 In My Garden McLean, Moria A 0.25 Look What I Can Do Aruego, Jose A 0.25 What Do Insects Do? Canizares, S.& Chanko,P A 0.25 What Has Wheels? Hoenecke, Karen A 0.25 Cat on the Mat Wildsmith, Brain B 0.5 Getting There Young B 0.5 Hats Around the World Charlesworth, Liza B 0.5 Have you Seen My Cat? Carle, Eric B 0.5 Have you seen my Duckling? Tafuri, Nancy/Greenwillow B 0.5 Here's Skipper Salem, Llynn & Stewart,J B 0.5 How Many Fish? Cohen, Caron Lee B 0.5 I Can Write, Can You? Stewart, J & Salem,L B 0.5 Look, Look, Look Hoban, Tana B 0.5 Mommy, Where are You? Ziefert & Boon B 0.5 Runaway Monkey Stewart, J & Salem,L B 0.5 So Can I Facklam, Margery B 0.5 Sunburn Prokopchak, Ann B 0.5 Two Points Kennedy,J. & Eaton,A B 0.5 Who Lives in a Tree? Canizares, Susan et al B 0.5 Who Lives in the Arctic? Canizares, Susan et al B 0.5 Apple Bird Wildsmith, Brain C 1 Apples Williams, Deborah C 1 Bears Kalman, Bobbie C 1 Big Long Animal Song Artwell, Mike C 1 Brown Bear, Brown Bear What Do You See? Martin, Bill C 1 Found online, 7/20/2012, http://home.comcast.net/~ngiansante/ Approx.
    [Show full text]
  • List of Books in Popular Series
    Robert Langdon series Mitch Rapp series Jack Reacher series by Dan Brown by Vince Flynn by Lee Child 1. Angels & Demons (books 15 on by Kyle Mills) 1. Killing Floor 2. The Da Vinci Code 1. American Assassin 2. Die Trying 3. The Lost Symbol 2. Kill Shot 3. Tripwire 4. Inferno 3. Transfer of Power 4. Running Blind 5. Origin 4. The Third Option 5. Echo Burning 5. Separation of Power 6. Without Fail 6. Executive Power 7. Persuader Outlander series 7. Memorial Day 8. The Enemy by Diana Gabaldon 8. Consent to Kill 9. One Shot 1. Outlander 9. Act of Treason 10. The Hard Way 2. Dragonfly in Amber 10. Protect and Defend 11. Bad Luck and Trouble 3. Voyager 11. Extreme Measures 12. Nothing to Lose 4. Drums of Autumn 12. Pursuit of Honor 13. Gone Tomorrow 5. The Fiery Cross 13. The Last Man 14. 61 Hours 6. A Breath of Snow and Ashes 14. The Survivor 15. Worth Dying For 7. An Echo in Bone 15. Order to Kill 16. The Affair 8. Written in My Own Heart's Blood 16. Enemy of the State 17. A Wanted Man 18. Never Go Back 19. Personal Fifty Shades of Grey series 20. Make Me by E.L. James A Song of Ice and Fire series 21. Night School 1. Fifty Shades of Grey by George R.R. Martin 22. The Midnight Line 2. Fifty Shades Darker 1. A Game of Thrones 3. Fifty Shades Freed 2. A Clash of Kings 4. Grey 3. A Storm of Swords 5.
    [Show full text]
  • James Patterson – Cross the Line
    CONTENTS About the Book About the Author Also by James Patterson Praise Title Page Prologue One Two Part One: A COP KILLING Chapter 1 Chapter 2 Chapter 3 Chapter 4 Chapter 5 Chapter 6 Chapter 7 Chapter 8 Chapter 9 Chapter 10 Chapter 11 Chapter 12 Part Two: A VIGILANTE KILLING Chapter 13 Chapter 14 Chapter 15 Chapter 16 Chapter 17 Chapter 18 Chapter 19 Chapter 20 Chapter 21 Chapter 22 Chapter 23 Chapter 24 Chapter 25 Chapter 26 Chapter 27 Chapter 28 Chapter 29 Chapter 30 Chapter 31 Chapter 32 Chapter 33 Chapter 34 Chapter 35 Part Three: MERCURY RISING Chapter 36 Chapter 37 Chapter 38 Chapter 39 Chapter 40 Chapter 41 Chapter 42 Chapter 43 Chapter 44 Chapter 45 Chapter 46 Chapter 47 Chapter 48 Chapter 49 Chapter 50 Chapter 51 Chapter 52 Chapter 53 Chapter 54 Chapter 55 Chapter 56 Chapter 57 Chapter 58 Chapter 59 Chapter 60 Chapter 61 Chapter 62 Chapter 63 Chapter 64 Chapter 65 Part Four: THE REGULATORS Chapter 66 Chapter 67 Chapter 68 Chapter 69 Chapter 70 Chapter 71 Chapter 72 Chapter 73 Chapter 74 Chapter 75 Chapter 76 Chapter 77 Chapter 78 Chapter 79 Chapter 80 Chapter 81 Chapter 82 Chapter 83 Chapter 84 Chapter 85 Chapter 86 Part Five: A BLIMP RUNNETH Chapter 87 Chapter 88 Chapter 89 Chapter 90 Chapter 91 Chapter 92 Chapter 93 Chapter 94 Chapter 95 Chapter 96 Chapter 97 Chapter 98 Chapter 99 Chapter 100 Chapter 101 Chapter 102 Chapter 103 Chapter 104 Chapter 105 Extract from Cross Kill Copyright ABOUT THE BOOK SHOTS RING OUT IN THE EARLY MORNING HOURS IN THE SUBURBS OF WASHINGTON, D.C.
    [Show full text]
  • Psychological Thrillers
    Psychological Thrillers Alexander, Gary Blanchard, Alice 9. One Shot Blood Sacrifice Darkness Peering 10. The Hard Way Anscombe, Roderick The Breathtaker 11. Bad Luck and Trouble Paul Lucas Blauner, Peter 12. Nothing to Lose 1. The Interview Room The Intruder 13. Gone Tomorrow 2. Virgin Lies The Last Good Day 14. 61 Hours Anthony, Sterling Slipping into Darkness 15. Worth Dying For Cookie Cutter Bollen, Christopher 16. The Affair Archer, Jeffrey The Destroyers 17. A Wanted Man A Prisoner of Birth Bolton, S.J. 18. Never Go Back Baldacci, David Little Black Lies 19. Personal Last Man Standing Lacey Flint 20. Make Me Amos Decker 1. Now You See Me 21. Night School 1. Memory Man 2. Dead Scared 22. The Midnight Line 2. The Last Mile 3. Lost 23. Past Tense 3. The Fix 4. A Dark and Twisted Tide 24. Blue Moon 4. The Fallen Bonansinga, Jay R. 25. The Sentinel 5. Redemption Head Case 26. Better Off Dead 6. Walk the Wire Brundage, Elizabeth No Middle Name Atlee Pine The Doctor’s Wife Clark, Mary Higgins 1. Long Road to Mercy Burke, Alafair All Through the Night 2. A Minute to Midnight The Wife Before I Say Good-Bye Sean King & Michelle Maxwell Burke, Jan I’ll Walk Alone 1. Split Second Irene Kelly I’ve Got My Eyes on You 2. Hour Game 1. Goodnight, Irene Kiss the Girls and Make Them Cry 3. Simple Genius 2. Sweet Dreams, Irene The Melody Lingers On 4. First Family 3. Dear Irene Moonlight Becomes You 5. The Sixth Man 4.
    [Show full text]
  • Alex Cross Michael Bennett
    GPL BOOK BINGE - SUSPENSE /THRILLER GPL BOOK BINGE - SUSPENSE/THRILLER JAMES PATTERSON’S JAMES PATTERSON ALEX CROSS Serial murder; bank robbery; kidnapping -- all of these crimes and more are investigated by African- American psychologist Alex Cross, a widowed district police detective with two children and a very wise grandmother. Told from the points of view of both Cross and the killer, these roller- coaster cases have plenty of twists and grisly details. 01 Along came a spider 14 Cross country 02 Kiss the girls 15 Alex Cross’s trial 03 Jack and Jill 16 I, Alex Cross 04 Cat and mouse 17 Cross fire 05 Pop goes the weasel 18 Kill Alex Cross 06 Roses are red 19 Merry Christmas, Alex Cross 07 Violets are blue 20 Alex Cross, run 08 Four blind mice 21 Cross my heart 09 Big bad wolf 22 Hope to die James Patterson (b. 1947) is one of the best-known 10 London bridges and biggest selling writers of all time. He began his 23 Cross justice 11 Mary, Mary career writing fast-paced single-title and series 24 Cross the line suspense novels, but he now publishes multiple series 12 Cross for adults in genres as diverse as crime thrillers/ Cross kill 13 Double cross suspense, science fiction, historical fiction, and romance. Not to mention books for teens, younger JAMES PATTERSON’S readers, and a handful of adult nonfiction. In November 2015, Patterson received the Literarian MICHAEL BENNETT Award from the National Book Foundation, which cited him as a "passionate campaigner to make books NYPD detective Michael Bennett, is an irresistibly and reading a national priority.
    [Show full text]
  • Adult Fiction
    Bibliographic Records - Title Find Tool Title Author Format U.S. Marshals [videorecording] DVD Double jeopardy [videorecording] DVD Not another teen movie [videorecording] DVD Boat trip [videorecording] DVD The Hard Corps [videorecording] DVD Seraphim Falls [videorecording] DVD Halloween [videorecording] DVD The Shawshank redemption [videorecording] DVD For a few dollars more [videorecording] DVD City of ghosts [videorecording] DVD Punisher. War zone [videorecording] DVD Seed of Chucky [videorecording] DVD The Texas chainsaw massacre [videorecording] : the beginning DVD The January man [videorecording] DVD Sublime [videorecording] DVD The grey [videorecording] DVD Blazing saddles [videorecording] DVD Saw II [videorecording] DVD Jeepers creepers [videorecording] DVD Balance ball beginners workout [videorecording] DVD The passion of the Christ [videorecording] DVD House of wax [videorecording] DVD Final destination 3 [videorecording] DVD United 93 [videorecording] DVD Slither [videorecording] DVD Down in the valley [videorecording] DVD Shadowboxer [videorecording] DVD Flight of fury [videorecording] DVD Smokin' Aces [videorecording] DVD The ghost and the darkness [videorecording] DVD The hills have eyes 2 [videorecording] DVD The princess and the goblins [videorecording] ; Madeline DVD Rambo [videorecording] : first blood part II DVD The mist [videorecording] DVD Snow angels [videorecording] DVD Wedding crashers [videorecording] DVD Betrayal Allston, Aaron, author. Book Willow Andrews, V. C. (Virginia C.), author. Book Robert B. Parker's Lullaby : a Spenser novel Atkins, Ace, author. Book First family Baldacci, David. Book Blood lure Barr, Nevada. Book Love in another town [text (large print)] Bradford, Barbara Taylor, 1933- author. Large Print 5/29/2020 3:22:48 PM 1 of 11 Bibliographic Records - Title Find Tool The ultimate motorcycle encyclopedia : Harley-Davidson, Ducati, Triumph, Honda, Kawasaki and all the great marques Brown, Roland.
    [Show full text]
  • Books-By-Mail BOOKLIST
    Books-By-Mail BOOKLIST Dec 2012/Jan 2013 Large Print Best-sellers/Best-selling Authors — Fiction Balogh, Mary The Secret Mistress While Lady Angeline Dudley’s pedigree dictates that she must land a titled gentleman, the irrepressible beauty longs for a simple, ordinary suitor. So when Edward Ailsbury, the new Earl of Heyward, defends her honor with unmatched civility, Angeline thinks that she has found true love. Persuading the earl is another matter entirely. From her unconventional fashion sense to her hoydenish antics, Angeline is the last woman on earth for Edward. And yet a stolen kiss awakens something within him. Naturally, being a gentleman, he does the right thing after compromising a lady: He offers marriage. The proposal is born of duty, but will Angeline cause Edward to forget about decorum behind closed doors? Brown, Dale Tiger’s Claw When China increases its naval presence in the Pacific and develops advanced weapons technology that targets American ships with lethal accuracy, it imperils American military superiority. Can the United States, in the wake of an economic recession and decreased military spending, compete with its cash-rich Chinese enemy? This question can be answered only when U.S.-China tensions blow up in an epic battle for supreme dominion of the Pacific. Brown, Sandra Low Pressure In this romantic thriller, Bellamy Price hopes that her pseudonymous debut novel will be therapeutic. Instead, its publishing success reopens many old wounds in Austin, Texas, when Bellamy’s identity becomes known, and the public learns the novel is based on the murder of her sister, Susan, 18 years before.
    [Show full text]
  • WL More Time for Books, Mystery-Detective-Spy
    Nicholas Dawidoff 1994 The Catcher was an Spy: The Mysterious Life of Moe Berg Aviva Kempner 2019 Film The Spy Behind Home Plate Kate Quinn The Alice Network Ayelet Gundar Goshen Waking Lions The Liar Harry Kemelman 1964 Friday the Rabbi Slept Late 1976 Wednesday the Rabbi Got Wet 1994 That Day the Rabbi Left Town Rabbi Joseph Telushkin 1987 The Unorthodox Murder of Rabbi Wahl 1988 The Final Analysis of Dr. Stark 1991 An Eye for An Eye Faye Kellerman 1986 The Ritual Bath 2021 The Lost Boys Batya Gur 1992 The Saturday Morning Murder, A PsychoAnalytical Case 1993 Literary Murder, A Critical Case 1994 Murder on a Kibbutz, A Communal Case 2000 Murder Duet, A Musical Case 2004 Bethlehem Road Murder 2007 Murder in Jerusalem D.A. Mishani The Missing File The Man Who Wanted to Know Everything A Possibility of Violence Three Jon Land Walls of Jericho The Pillars of Solomon A Walk in the Darkness Keepers of the Game Blood Diamonds The Blue Widows The Last Prophecy Libi Astaire The Moon Taker The Ruby Spy Ring Tempest in the Tea Room The Doppelganger's Dance Costumed Foolery The Vanisher Variations The Disappearing Dowry The Melancholy Menorah Michael Kahn Grave Designs Death Benefits Firm Ambitions Due Diligence Sheer Gall Bearing Witness Trophy Widow The Flinch Factor Face Value The Dead Hand Bad Trust Ayelet Waldman Nursery Crimes The Big Nap A Playdate with Death Death Gets a Time-Out Mjurder Plays House The Cradle Robbers Bye-Bye Black Sheep Rochelle Krich Blues in the Night Dream House Now You See Me Grave Endings Fair Game Angel of Death Blood
    [Show full text]
  • Mystery Series 2
    Mystery Series 2 Hamilton, Steve 15. Murder Walks the Plank 13. Maggody and the Alex McKnight 16. Death of the Party Moonbeams 1. A Cold Day in Paradise 17. Dead Days of Summer 14. Muletrain to Maggody 2. Winter of the Wolf Moon 18. Death Walked In 15. Malpractice in Maggody 3. The Hunting Wind 19. Dare to Die 16. The Merry Wives of 4. North of Nowhere 20. Laughed ‘til He Died Maggody 5. Blood is the Sky 21. Dead by Midnight Claire Mallory 6. Ice Run 22. Death Comes Silently 1. Strangled Prose 7. A Stolen Season 23. Dead, White, and Blue 2. The Murder at the Murder 8. Misery Bay 24. Death at the Door at the Mimosa Inn 9. Die a Stranger 25. Don’t Go Home 3. Dear Miss Demeanor 10. Let It Burn 26. Walking on My Grave 4. A Really Cute Corpse 11. Dead Man Running Henrie O Series 5. A Diet to Die For Nick Mason 1. Dead Man’s Island 6. Roll Over and Play Dead 1. The Second Life of Nick 2. Scandal in Fair Haven 7. Death by the Light of the Mason 3. Death in Lovers’ Lane Moon 2. Exit Strategy 4. Death in Paradise 8. Poisoned Pins Harris, Charlaine 5. Death on the River Walk 9. Tickled to Death Aurora Teagarden 6. Resort to Murder 10. Busy Bodies 1. Real Murders 7. Set Sail for Murder 11. Closely Akin to Murder 2. A Bone to Pick Henry, Sue 12. A Holly, Jolly Murder 3. Three Bedrooms, One Jessie Arnold 13.
    [Show full text]
  • Kill Alex Cross Is the Most Gripping Alex Cross Novel James Patterson Has Ever Written
    Contents Cover About the Book About the Author Also by James Patterson Title Page Dedication Book One: Unaccounted for Chapter 1 Chapter 2 Chapter 3 Chapter 4 Chapter 5 Chapter 6 Chapter 7 Chapter 8 Chapter 9 Chapter 10 Chapter 11 Chapter 12 Chapter 13 Chapter 14 Chapter 15 Chapter 16 Chapter 17 Chapter 18 Chapter 19 Chapter 20 Chapter 21 Chapter 22 Chapter 23 Chapter 24 Chapter 25 Chapter 26 Chapter 27 Book Two: Alphabet Soup Chapter 28 Chapter 29 Chapter 30 Chapter 31 Chapter 32 Chapter 33 Chapter 34 Chapter 35 Chapter 36 Chapter 37 Chapter 38 Chapter 39 Chapter 40 Book Three: War! Chapter 41 Chapter 42 Chapter 43 Chapter 44 Chapter 45 Chapter 46 Chapter 47 Chapter 48 Chapter 49 Chapter 50 Chapter 51 Chapter 52 Chapter 53 Chapter 54 Chapter 55 Chapter 56 Chapter 57 Chapter 58 Chapter 59 Chapter 60 Chapter 61 Chapter 62 Chapter 63 Chapter 64 Chapter 65 Chapter 66 Chapter 67 Chapter 68 Chapter 69 Chapter 70 Chapter 71 Book Four: Necessary Evils Chapter 72 Chapter 73 Chapter 74 Chapter 75 Chapter 76 Chapter 77 Chapter 78 Chapter 79 Chapter 80 Chapter 81 Chapter 82 Chapter 83 Chapter 84 Chapter 85 Chapter 86 Chapter 87 Chapter 88 Book Five: Rush to the Finish Chapter 89 Chapter 90 Chapter 91 Chapter 92 Chapter 93 Chapter 94 Chapter 95 Chapter 96 Chapter 97 Chapter 98 Chapter 99 Chapter 100 Chapter 101 Chapter 102 Chapter 103 Chapter 104 Chapter 105 Chapter 106 Chapter 107 Chapter 108 Chapter 109 Chapter 110 Chapter 111 Chapter 112 Chapter 113 Chapter 114 Epilogue: Family Ties Chapter 115 Chapter 116 Chapter 117 Copyright About the Book The President’s children have been kidnapped.
    [Show full text]