Live Demonstration: Man-in-the-Middle Attack on Edge Artificial Intelligence

被引:0
|
作者
Hu, Bowen [1 ]
He, Weiyang [1 ]
Wang, Si [1 ]
Liu, Wenye [1 ]
Chang, Chip-Hong [1 ]
机构
[1] Nanyang Technol Univ, Ctr Integrated Circuits & Syst, Sch Elect & Elect Engn, Singapore, Singapore
基金
新加坡国家研究基金会;
关键词
D O I
10.1109/ISCAS58744.2024.10558371
中图分类号
TP39 [计算机的应用];
学科分类号
081203 ; 0835 ;
摘要
Deep neural networks (DNNs) are susceptible to evasion attacks. However, digital adversarial examples are typically applied to pre-captured static images. The perturbations are generated by loss optimization with knowledge of target model hyperparameters and are added offline. Physical adversarial examples, on the other hand, tamper with the physical target or use a realistically fabricated target to fool the DNN. A sufficient number of pristine target samples captured under different varying environmental conditions are required to create the physical adversarial perturbations. Both digital and physical input evasion attacks are not robust against dynamic object scene variations and the adversarial effects are often weakened by model reduction and quantization when the DNNs are implemented on edge artificial intelligence (AI) accelerator platforms. This demonstration presents a practical man-in-the-middle (MITM) attack on an edge DNN first reported in In A tiny MIPI FPGA chip with hardened CSI-2 and D-PHY blocks is attached between the camera and the edge AI accelerator to inject unobtrusive stripes onto the RAW image data. The attack is less influenced by dynamic context variations such as changes in viewing angle, illumination, and distance of the target from the camera.
引用
收藏
页数:1
相关论文
共 50 条
  • [1] Comprehensive Demonstration of Man-in-the-Middle Attack in PDC and PMU Network
    Swain, Kamakshi Prashadini
    Tiwari, Amit
    Sharma, Ankush
    Chakrabarti, Saikat
    Karkare, Amey
    2022 22ND NATIONAL POWER SYSTEMS CONFERENCE, NPSC, 2022,
  • [2] Optimal Man-In-The-Middle Stealth Attack
    Faramondi, Luca
    Oliva, Gabriele
    Setola, Roberto
    CRITICAL INFORMATION INFRASTRUCTURES SECURITY, CRITIS 2021, 2021, 13139 : 44 - 59
  • [3] Man-in-the-Middle Attack in HTTP/2
    Patni, Parth
    Iyer, Kartik
    Sarode, Rohan
    Mali, Amit
    Nimkar, Anant
    PROCEEDINGS OF 2017 INTERNATIONAL CONFERENCE ON INTELLIGENT COMPUTING AND CONTROL (I2C2), 2017,
  • [4] Man-in-the-Middle Attack to the HTTPS Protocol
    Callegati, Franco
    Cerroni, Walter
    Ramilli, Marco
    IEEE SECURITY & PRIVACY, 2009, 7 (01) : 78 - 81
  • [5] Modeling of Man-in-the-Middle Attack in the Wireless Networks
    Chen, Zhe
    Guo, Shize
    Zheng, Kangfeng
    Yang, Yixian
    2007 INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS, NETWORKING AND MOBILE COMPUTING, VOLS 1-15, 2007, : 2255 - 2258
  • [6] An Optimized Machine Learning Model for the Detection of Man-in-the-Middle Attack in Mobile Edge Computing
    Moila, Ramahlapane Lerato
    Velempini, Mthulisi
    2024 IST-AFRICA CONFERENCE, 2024,
  • [7] On the Security of HB# against a Man-in-the-Middle Attack
    Ouafi, Khaled
    Overbeck, Raphael
    Vaudenay, Serge
    ADVANCES IN CRYPTOLOGY - ASIACRYPT 2008, 2008, 5350 : 108 - 124
  • [8] Detection of Stealth Man-In-The-Middle Attack in Wireless LAN
    Kumar, Vikas
    Chakraborty, Sandip
    Barbhuiya, Ferdous A.
    Nandi, Sukumar
    2012 2ND IEEE INTERNATIONAL CONFERENCE ON PARALLEL, DISTRIBUTED AND GRID COMPUTING (PDGC), 2012, : 290 - 295
  • [9] Man-in-the-middle Pilot Attack for Physical Layer Authentication
    Wang Shaoyu
    Huang Kaizhi
    Xu Xiaoming
    Ma Keming
    Chen Yajun
    JOURNAL OF ELECTRONICS & INFORMATION TECHNOLOGY, 2021, 43 (11) : 3141 - 3148
  • [10] Man-in-the-middle attack on quantum secure communications with authentication
    Lin, Tzu Han
    Hwang, Tzonelish
    QUANTUM INFORMATION PROCESSING, 2014, 13 (04) : 917 - 923