Live Demonstration: Man-in-the-Middle Attack on Edge Artificial Intelligence

被引:0
|
作者
Hu, Bowen [1 ]
He, Weiyang [1 ]
Wang, Si [1 ]
Liu, Wenye [1 ]
Chang, Chip-Hong [1 ]
机构
[1] Nanyang Technol Univ, Ctr Integrated Circuits & Syst, Sch Elect & Elect Engn, Singapore, Singapore
基金
新加坡国家研究基金会;
关键词
D O I
10.1109/ISCAS58744.2024.10558371
中图分类号
TP39 [计算机的应用];
学科分类号
081203 ; 0835 ;
摘要
Deep neural networks (DNNs) are susceptible to evasion attacks. However, digital adversarial examples are typically applied to pre-captured static images. The perturbations are generated by loss optimization with knowledge of target model hyperparameters and are added offline. Physical adversarial examples, on the other hand, tamper with the physical target or use a realistically fabricated target to fool the DNN. A sufficient number of pristine target samples captured under different varying environmental conditions are required to create the physical adversarial perturbations. Both digital and physical input evasion attacks are not robust against dynamic object scene variations and the adversarial effects are often weakened by model reduction and quantization when the DNNs are implemented on edge artificial intelligence (AI) accelerator platforms. This demonstration presents a practical man-in-the-middle (MITM) attack on an edge DNN first reported in In A tiny MIPI FPGA chip with hardened CSI-2 and D-PHY blocks is attached between the camera and the edge AI accelerator to inject unobtrusive stripes onto the RAW image data. The attack is less influenced by dynamic context variations such as changes in viewing angle, illumination, and distance of the target from the camera.
引用
收藏
页数:1
相关论文
共 50 条
  • [41] Defense against man-in-the-middle attack in client-server systems
    Serpanos, DN
    Lipton, RJ
    PROCEEDINGS OF THE SIXTH IEEE SYMPOSIUM ON COMPUTERS AND COMMUNICATIONS, 2001, : 9 - 14
  • [42] Man-in-the-Middle Attack on “Quantum Dialogue with Authentication Based on Bell States”
    Tzu-Han Lin
    Ching-Ying Lin
    Tzonelih Hwang
    International Journal of Theoretical Physics, 2013, 52 : 3199 - 3203
  • [43] MARINE: Man-in-the-Middle Attack Resistant Trust Model in Connected Vehicles
    Ahmad, Farhan
    Kurugollu, Fatih
    Adnane, Asma
    Hussain, Rasheed
    Hussain, Fatima
    IEEE INTERNET OF THINGS JOURNAL, 2020, 7 (04) : 3310 - 3322
  • [44] Profinet IO-device emulator based on the man-in-the-middle attack
    Baud, Michel
    Felser, Max
    2006 IEEE CONFERENCE ON EMERGING TECHNOLOGIES & FACTORY AUTOMATION, VOLS 1 -3, 2006, : 1199 - +
  • [45] BLEKeeper: Response Time Behavior Based Man-In-The-Middle Attack Detection
    Yurdagul, Muhammed Ali
    Sencar, Husrev Taha
    2021 IEEE SYMPOSIUM ON SECURITY AND PRIVACY WORKSHOPS (SPW 2021), 2021, : 214 - 220
  • [46] A Precise Model to Secure Systems on Ethernet Against Man-In-The-Middle Attack
    Salim, Haider
    Li, Zhitang
    IT PROFESSIONAL, 2021, 23 (01) : 72 - 85
  • [47] Quantum man-in-the-middle attack on the calibration process of quantum key distribution
    Yang-Yang Fei
    Xiang-Dong Meng
    Ming Gao
    Hong Wang
    Zhi Ma
    Scientific Reports, 8
  • [48] Authenticated key exchange provably secure against the man-in-the-middle attack
    Johnston, AM
    Gemmell, PS
    JOURNAL OF CRYPTOLOGY, 2002, 15 (02) : 139 - 148
  • [49] Applying Authentication Tests to Discover Man-in-the-Middle Attack in Security Protocols
    Muhammad, Shahabuddin
    2013 EIGHTH INTERNATIONAL CONFERENCE ON DIGITAL INFORMATION MANAGEMENT (ICDIM), 2013, : 35 - 40
  • [50] Analysis of Traffic Signals on an SDN for Detection and Classification of a Man-in-the-Middle Attack
    D'Orsaneo, Julian
    Tummala, Murali
    McEachen, John
    Martin, Bryan
    2018 12TH INTERNATIONAL CONFERENCE ON SIGNAL PROCESSING AND COMMUNICATION SYSTEMS (ICSPCS), 2018,